On December 1, 2025, the Qilin ransomware group added business services company B Dynamic to its list of victims on its dark web data leak site. This action is a hallmark of the group's double-extortion strategy, where they not only encrypt a victim's files but also exfiltrate sensitive data and threaten to publish it if the ransom is not paid. While details of the breach are not yet public, this development confirms that B Dynamic has been successfully compromised. The incident is another example of the ongoing, persistent threat posed by Ransomware-as-a-Service (RaaS) operations targeting organizations of all sizes.
Qilin is a known RaaS operation that has been active for several years, targeting various industries worldwide. The group provides its affiliates with the ransomware payload, infrastructure, and a negotiation platform in exchange for a share of the profits. Their primary TTP is double extortion.
T1486 - Data Encrypted for Impact).T1048 - Exfiltration Over Alternative Protocol).T1657 - Financial Cryptanalysis).While specific TTPs for the B Dynamic breach are unknown, Qilin's general methodology is well-documented. Affiliates often use common post-exploitation tools like Cobalt Strike for command and control and lateral movement. They frequently abuse legitimate tools like PsExec and RDP to move across the network. Privilege escalation is often achieved by exploiting local vulnerabilities or using tools like Mimikatz to dump credentials. The ransomware itself is typically written in Go or Rust, making it more difficult to reverse engineer.
For B Dynamic, the impact is severe. The company is facing significant business disruption due to encrypted systems, coupled with the threat of a major data breach if their stolen information is released. This can lead to substantial financial costs from ransom payments, recovery efforts, regulatory fines (e.g., under GDPR or CCPA), and legal action from affected customers or employees. The public nature of the leak site causes immediate and lasting reputational damage, eroding trust with clients and partners. This incident demonstrates that no industry is immune from the threat of ransomware.
vssadmin delete shadows), and the execution of tools like Cobalt Strike or Mimikatz.Decoy Object techniques by creating decoy 'honeypot' files and accounts. Place fake sensitive documents on file shares and create decoy domain admin accounts. Any access to these decoys should trigger a high-priority alert, as it is a strong signal of an intruder performing reconnaissance.M1051 - Update Software.M1032 - Multi-factor Authentication.M1030 - Network Segmentation.Qilin ransomware claims multiple new victims including Vlp Hellas, Nepes, Spitzer Auto Group, and Dan Technologies, expanding its global campaign.
The Qilin ransomware group, also known as Agenda, has significantly expanded its global campaign, claiming multiple new victims since December 1st. On December 14, 2025, Vlp Hellas, a Greek business services firm, was added to their leak site. This follows claims against Nepes (South Korea), Spitzer Auto Group (U.S.), and Dan Technologies (Denmark) on December 13. The group continues to employ double-extortion tactics, with updated TTPs including abusing legitimate remote access and backup tools, using PowerShell for execution, and exfiltrating data to cloud storage services (T1537) before encryption. This demonstrates Qilin's high operational tempo and broad targeting across diverse sectors.
Qilin ransomware group launched a post-holiday barrage, claiming over 15 new victims, including critical infrastructure, contributing to a record-breaking year for ransomware.
The Qilin ransomware group, previously noted for targeting B Dynamic, has significantly escalated its activity. A post-holiday surge between December 26-28, 2025, saw Qilin and other gangs claim over 15 new victims, including the Canadian software company Questica and the major Thai petroleum refiner Bangchak Corporation. This highlights cybercriminals exploiting reduced holiday staffing and the group's willingness to target critical infrastructure. The overall ransomware landscape for 2025 has seen nearly 8,000 victims, a 50% increase, with Qilin being a primary driver of this record-breaking year.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats