Qilin Ransomware Gang Adds Business Services Firm B Dynamic to Leak Site

Qilin Ransomware Group Claims B Dynamic as New Victim in Ongoing Double-Extortion Campaign

HIGH
December 1, 2025
December 29, 2025
5m read
RansomwareThreat ActorCyberattack

Related Entities(initial)

Threat Actors

Qilin

Other

B DynamicQilin Ransomware

Full Report(when first published)

Executive Summary

On December 1, 2025, the Qilin ransomware group added business services company B Dynamic to its list of victims on its dark web data leak site. This action is a hallmark of the group's double-extortion strategy, where they not only encrypt a victim's files but also exfiltrate sensitive data and threaten to publish it if the ransom is not paid. While details of the breach are not yet public, this development confirms that B Dynamic has been successfully compromised. The incident is another example of the ongoing, persistent threat posed by Ransomware-as-a-Service (RaaS) operations targeting organizations of all sizes.

Threat Overview

Qilin is a known RaaS operation that has been active for several years, targeting various industries worldwide. The group provides its affiliates with the ransomware payload, infrastructure, and a negotiation platform in exchange for a share of the profits. Their primary TTP is double extortion.

  1. Initial Access: Qilin affiliates are known to use various initial access methods, including exploiting public-facing vulnerabilities (e.g., in VPNs or other edge devices), phishing campaigns, and purchasing access from initial access brokers.
  2. Execution & Encryption: Once inside the network, the affiliates perform reconnaissance, escalate privileges, and move laterally to identify high-value data and systems. The Qilin ransomware payload is then deployed to encrypt files across the network (T1486 - Data Encrypted for Impact).
  3. Data Exfiltration: Before encryption, the attackers exfiltrate large volumes of sensitive data to their own servers (T1048 - Exfiltration Over Alternative Protocol).
  4. Impact: A ransom note is left on encrypted systems, and the victim is listed on Qilin's data leak site. This public shaming is used as leverage to force payment (T1657 - Financial Cryptanalysis).

Technical Analysis

While specific TTPs for the B Dynamic breach are unknown, Qilin's general methodology is well-documented. Affiliates often use common post-exploitation tools like Cobalt Strike for command and control and lateral movement. They frequently abuse legitimate tools like PsExec and RDP to move across the network. Privilege escalation is often achieved by exploiting local vulnerabilities or using tools like Mimikatz to dump credentials. The ransomware itself is typically written in Go or Rust, making it more difficult to reverse engineer.

Impact Assessment

For B Dynamic, the impact is severe. The company is facing significant business disruption due to encrypted systems, coupled with the threat of a major data breach if their stolen information is released. This can lead to substantial financial costs from ransom payments, recovery efforts, regulatory fines (e.g., under GDPR or CCPA), and legal action from affected customers or employees. The public nature of the leak site causes immediate and lasting reputational damage, eroding trust with clients and partners. This incident demonstrates that no industry is immune from the threat of ransomware.

Detection & Response

  • EDR/XDR: Deploy and monitor an EDR/XDR solution to detect common ransomware behaviors, such as rapid file modification, deletion of volume shadow copies (vssadmin delete shadows), and the execution of tools like Cobalt Strike or Mimikatz.
  • Network Monitoring: Monitor for large, unexpected data egress to unknown IP addresses. This can be an early indicator of data exfiltration, occurring before the final encryption stage.
  • Decoy Accounts & Files: Use D3FEND Decoy Object techniques by creating decoy 'honeypot' files and accounts. Place fake sensitive documents on file shares and create decoy domain admin accounts. Any access to these decoys should trigger a high-priority alert, as it is a strong signal of an intruder performing reconnaissance.

Mitigation

  • Patch Public-Facing Systems: The most common entry point for ransomware is an unpatched vulnerability in an internet-facing system (e.g., VPN, firewall, web server). Maintain a rigorous patch management program, prioritizing edge devices. This is a critical application of MITRE Mitigation M1051 - Update Software.
  • Multi-Factor Authentication (MFA): Enforce MFA on all external access points (VPN, RDP) and for all privileged accounts. This prevents attackers from using stolen credentials to gain initial access. This is MITRE Mitigation M1032 - Multi-factor Authentication.
  • Immutable Backups: Maintain offline and immutable backups of all critical data. The backups should follow the 3-2-1 rule (3 copies, 2 different media, 1 offsite). Regularly test your ability to restore from these backups. This ensures you can recover your data without paying the ransom.
  • Network Segmentation: Segment your network to limit an attacker's ability to move laterally. Critical servers should be in isolated network zones with strict access controls, preventing a compromise on a workstation from spreading to the entire network. This is MITRE Mitigation M1030 - Network Segmentation.

Timeline of Events

1
December 1, 2025
The Qilin ransomware group lists B Dynamic as a victim on its data leak site.
2
December 1, 2025
This article was published

Article Updates

December 14, 2025

Severity increased

Qilin ransomware claims multiple new victims including Vlp Hellas, Nepes, Spitzer Auto Group, and Dan Technologies, expanding its global campaign.

The Qilin ransomware group, also known as Agenda, has significantly expanded its global campaign, claiming multiple new victims since December 1st. On December 14, 2025, Vlp Hellas, a Greek business services firm, was added to their leak site. This follows claims against Nepes (South Korea), Spitzer Auto Group (U.S.), and Dan Technologies (Denmark) on December 13. The group continues to employ double-extortion tactics, with updated TTPs including abusing legitimate remote access and backup tools, using PowerShell for execution, and exfiltrating data to cloud storage services (T1537) before encryption. This demonstrates Qilin's high operational tempo and broad targeting across diverse sectors.

December 29, 2025

Severity increased

Qilin ransomware group launched a post-holiday barrage, claiming over 15 new victims, including critical infrastructure, contributing to a record-breaking year for ransomware.

The Qilin ransomware group, previously noted for targeting B Dynamic, has significantly escalated its activity. A post-holiday surge between December 26-28, 2025, saw Qilin and other gangs claim over 15 new victims, including the Canadian software company Questica and the major Thai petroleum refiner Bangchak Corporation. This highlights cybercriminals exploiting reduced holiday staffing and the group's willingness to target critical infrastructure. The overall ransomware landscape for 2025 has seen nearly 8,000 victims, a 50% increase, with Qilin being a primary driver of this record-breaking year.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Dark WebDouble ExtortionQilinRaaSRansomware

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading