Release Date: 2026-04-21
Author: Security Arsenal Threat Intelligence Unit
Source: Ransomware.live (Live Dark Web Feed)
Threat Actor Profile — QILIN
Aliases: Agenda, Qilin.B
Model: Ransomware-as-a-Service (RaaS).
Ransom Demands: Variable, typically ranging from $500,000 to multi-million USD demands depending on victim revenue and exfiltrated data volume.
TTPs & Behavior: Qilin operates as a sophisticated RaaS operation. They typically gain initial access through exposed vulnerabilities in internet-facing applications (recently Microsoft Exchange and email appliances) or via valid credentials obtained via phishing.
- Double Extortion: They aggressively exfiltrate sensitive data prior to encryption and utilize a dedicated leak site (DLS) to pressure victims.
- Dwell Time: Average dwell time is estimated between 3 to 7 days, allowing for extensive lateral movement and privilege escalation.
- Encryption: They use a custom Go-based ransomware that targets Windows and Linux ESXi hypervisors.
Current Campaign Analysis
Based on the 15 victims posted to the Qilin leak site on 2026-04-20 and 2026-04-21:
Sector Targeting
The current campaign shows a distinct pivot towards Manufacturing (27% of victims) and Business Services (20% of victims), followed by Transportation/Logistics.
- Manufacturing: Industrial Carrocera Arbuciense (ES), Kolin Turkey (TR), Heartland Steel Products (US), Safety Engineering Laboratories (US), Huonker GmbH (DE).
- Business Services: PTS Office Systems (US), City'Pro (FR), GUEGUEN Avocats (FR).
- Logistics: Sea Air International Forwarders (CA), Avitrans.
- Critical Infrastructure/Other: STERIMED (Healthcare), Roman Catholic Archdiocese of St John (Public Sector).
Geographic Distribution
The activity is globally dispersed but concentrated in North America and Europe:
- United States: 3 Victims
- France: 3 Victims
- Canada: 2 Victims
- Others: Spain, Turkey, Romania, Germany.
CVE Integration & Initial Access
The victims posted correlate with the active exploitation of several CISA Known Exploited Vulnerabilities (KEVs) added to the catalog recently. Qilin affiliates are actively scanning for and exploiting:
- CVE-2023-21529 (Microsoft Exchange): A deserialization vulnerability allowing authenticated attackers to execute code. This is likely used against Business Services and Legal sectors (e.g., GUEGUEN Avocats) heavily reliant on Exchange.
- CVE-2025-52691 & CVE-2026-23760 (SmarterTools SmarterMail): File upload and auth bypass vulnerabilities. These provide unauthenticated access to email servers, serving as a primary entry point for exfiltration and deployment of web shells.
- CVE-2026-20131 (Cisco Secure Firewall FMC): Deserialization flaw. Exploitation here allows bypassing perimeter defenses, likely explaining the successful compromise of Logistics and Manufacturing firms with robust network perimeters.
Detection Engineering
SIGMA Rules
---
title: Potential Exchange Server Deserialization Exploit (CVE-2023-21529)
id: b4c3e9f6-1a2b-4c5d-9e6f-1a2b3c4d5e6f
description: Detects potential exploitation of Microsoft Exchange Server deserialization vulnerabilities often used by Qilin for initial access.
status: experimental
date: 2026/04/21
author: Security Arsenal
references:
- https://cisa.gov/known-exploited-vulnerabilities-catalog
logsource:
product: windows
service: security
detection:
selection:
EventID: 5140 or 5145
ShareName|contains: 'Exchange'
RelativeTargetName|contains: '.config'
condition: selection
falsepositives:
- Administrative access to Exchange config files
level: high
---
title: SmarterMail Unrestricted File Upload Activity
id: d5e4f0g7-2b3c-4d5e-9f0a-2b3c4d5e6f7a
description: Detects suspicious file creation patterns in SmarterMail web directories indicative of web shell upload (CVE-2025-52691).
status: experimental
date: 2026/04/21
author: Security Arsenal
logsource:
product: windows
file:
creation: true
detection:
selection:
TargetFilename|contains:
- 'C:\Program Files (x86)\SmarterTools\SmarterMail\MRS\'
- 'C:\Program Files\SmarterTools\SmarterMail\MRS\'
TargetFilename|contains:
- '.aspx'
- '.ashx'
filter:
Image|contains:
- 'w3wp.exe'
condition: selection and not filter
falsepositives:
- Legitimate SmarterMail updates
level: critical
---
title: Suspicious PsExec Lateral Movement
id: e6f5g1h8-3c4d-5e6f-0a1b-3c4d5e6f7a8b
description: Detects the use of PsExec for lateral movement, a common tactic for Qilin operators to spread across a manufacturing network.
status: experimental
date: 2026/04/21
author: Security Arsenal
logsource:
product: windows
service: security
detection:
selection:
EventID: 5145
ShareName: 'ADMIN$'
RelativeTargetName|endswith: 'PSEXESVC.exe'
condition: selection
falsepositives:
- Legitimate administrative tasks using PsExec
level: high
KQL (Microsoft Sentinel)
Hunt for potential pre-encryption staging and lateral movement associated with Qilin tooling (PowerShell and Cobalt Strike beacons).
// Hunt for Qilin-associated lateral movement and staging
DeviceProcessEvents
| where Timestamp >= ago(7d)
| where ProcessCommandLine has_any ("Invoke-Expression", "IEX", "DownloadString", "FromBase64String")
| where ProcessCommandLine contains "-Enc" or ProcessCommandLine contains "EncodedCommand"
| where FileName in~ ("powershell.exe", "pwsh.exe", "cmd.exe", "rundll32.exe")
| summarize Count = count(), StartTime = min(Timestamp), EndTime = max(Timestamp) by DeviceName, AccountName, ProcessCommandLine, InitiatingProcessFileName
| where Count > 2
| project StartTime, DeviceName, AccountName, ProcessCommandLine, InitiatingProcessFileName
| order by Count desc
PowerShell Response Script
Rapid response script to identify recent persistence mechanisms and abnormal shadow copy activity (pre-encryption).
# Qilin Response Check: Persistence and VSS Anomalies
Write-Host "[*] Checking for Scheduled Tasks created in last 7 days..." -ForegroundColor Yellow
Get-ScheduledTask | Where-Object {$_.Date -ge (Get-Date).AddDays(-7)} | Select-Object TaskName, Author, Date, State, Action
Write-Host "[*] Checking for recent Volume Shadow Copy deletions or modifications..." -ForegroundColor Yellow
$Events = Get-WinEvent -FilterHashtable @{LogName='System'; ID=510, 514, 513; StartTime=(Get-Date).AddHours(-24)} -ErrorAction SilentlyContinue
if ($Events) {
$Events | Select-Object TimeCreated, Id, LevelDisplayName, Message | Format-Table -Wrap
} else {
Write-Host "No recent VSS events found." -ForegroundColor Green
}
Write-Host "[*] Checking for uncommon RDP logons (Type 10) in last 24h..." -ForegroundColor Yellow
Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4624; StartTime=(Get-Date).AddHours(-24)} -ErrorAction SilentlyContinue |
Where-Object {$_.Message -match 'Logon Type:\s*10'} |
Select-Object TimeCreated, @{n='User';e={$_.Properties[5].Value}}, @{n='IP';e={$_.Properties[19].Value}} | Format-Table
---
Incident Response Priorities
T-minus Detection Checklist:
- Exchange & Email Gateways: Immediate review of IIS/Exchange logs for deserialization payloads (CVE-2023-21529) and SmarterMail logs for unauthorized
aspxuploads (CVE-2025-52691). - Web Shell Detection: Scan web directories for recently modified
.aspx,.ashx, or.phpfiles. - Lateral Movement: Look for
PsExecorWMIexecution (wmic.exe process call create) from non-admin accounts or unusual times.
Critical Exfiltration Assets: Qilin historically prioritizes:
- Manufacturing blueprints and IP.
- Client databases (HR, CRM) in Business Services.
- Financial records and employee PII.
Containment Actions:
- Isolate: Segment off Exchange servers and email appliances from the network immediately if compromise is suspected.
- Revoke: Reset credentials for accounts that have recently logged into Exchange or Cisco FMC management consoles.
- Block: Firewall rules blocking outbound SMB (TCP 445) and RDP (TCP 3389) to non-internal IPs.
Hardening Recommendations
Immediate (24 Hours)
- Patch: Immediately apply patches for CVE-2023-21529 (Exchange), CVE-2025-52691, CVE-2026-23760 (SmarterMail), and CVE-2026-20131 (Cisco FMC).
- Disable: If patching is not possible immediately, disable external access to SmarterMail web interfaces and restrict Exchange EWS to internal IPs only via VPN.
- MFA: Enforce strict MFA on all management consoles (Cisco FMC, OWA) and VPNs.
Short-term (2 Weeks)
- Network Segmentation: Ensure Manufacturing OT/IoT networks are logically separated from IT email servers to prevent lateral movement.
- External Attack Surface Management: Scan for and disable unnecessary RDP/VPN endpoints exposed to the public internet.
- EDR Coverage: Ensure full EDR coverage is active on all email gateway servers and management appliances, not just endpoints.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.