Date: 2026-05-07
Source: Ransomware.live / Dark Web Leak Site Monitoring
Threat Level: CRITICAL
Threat Actor Profile — QILIN
- Known Aliases: Agenda (前身), Qilin.Burn
- Operational Model: Ransomware-as-a-Service (RaaS). The group operates an affiliate model, recruiting attackers who use the Qilin encryptor (written in Rust and Go) in exchange for a cut of the ransom.
- Ransom Demands: Highly variable, typically ranging from $500,000 to $5 million USD, depending on victim revenue and exfiltrated data volume.
- Initial Access Vectors: Historically relies heavily on exploitation of public-facing applications (VPN, RDP vulnerabilities) and phishing. Current intelligence indicates a specific pivot toward exploiting unpatched email servers (Microsoft Exchange, SmarterTools SmarterMail) and firewall management interfaces (Cisco FMC).
- Extortion Strategy: Double extortion. Victims' data is exfiltrated prior to encryption, and pressure is applied via the leak site (Tor) if negotiations fail or stall.
- Dwell Time: Short to moderate. Recent observations suggest a dwell time of 3–7 days between initial exploit (CVE usage) and detonation, used primarily for data staging and lateral movement.
Current Campaign Analysis
Victimology Snapshot (Last 100 Postings): 16 recent postings analyzed.
-
Targeted Sectors:
The current campaign shows a distinct lack of sector bias, indicating opportunistic scanning for vulnerabilities rather than targeted espionage. Heavily hit sectors include:- Manufacturing: Complastex, Lexus, General Hardware.
- Business Services/Legal: Inox Market Service, Law Office of Steven R Smith, Rizzuto Law Firm.
- Critical Infrastructure/Public Sector: Le Maire de QUIBERON (Public Sector), BMTP (Logistics), Laclinic-Montreux (Healthcare).
- Financial Services: Panal Seguros S.A., Foxstone Financial.
-
Geographic Concentration:
Highly globalized footprint. Recent victims span 8 countries (IT, BR, US, FR, TH, CH, PY, ES). There is no specific regional focus, suggesting automated vulnerability scanners are driving initial access. -
Victim Profile:
The list ranges from mid-market entities (e.g., Asphalt Specialists) to large multinational corporations (e.g., Lexus). The inclusion of a Public Sector entity in France and a major clinic in Switzerland suggests the affiliates are indifferent to geopolitical backlash or GDPR/HIPAA implications. -
Escalation Patterns:
Posting frequency spiked on 2026-05-06, with 8 victims published simultaneously. This usually correlates with a weekend automated release mechanism where negotiations failed or deadlines expired. -
CVE Connection:
The presence of CVE-2023-21529 (Exchange), CVE-2025-52691 / CVE-2026-23760 (SmarterMail), and CVE-2026-20131 (Cisco FMC) in the CISA KEV list related to this group is the critical intelligence link. Qilin affiliates are likely using automated exploit kits to weaponize these specific deserialization and authentication bypass flaws to gain a foothold on the network perimeter.
Detection Engineering
The following detection logic is tailored to the specific TTPs observed in Qilin's recent campaigns, focusing on the web exploitation of mail servers and subsequent lateral movement.
SIGMA Rules
---
title: Potential SmarterMail Exploitation Webshell Upload
id: 4a3b2c1d-5e6f-7a8b-9c0d-1e2f3a4b5c6d
description: Detects potential exploitation of SmarterMail vulnerabilities (CVE-2025-52691) via suspicious file upload patterns or extension renames.
status: experimental
date: 2026/05/07
author: Security Arsenal Research
references:
- https://cisa.gov/known-exploited-vulnerabilities-catalog
logsource:
product: webserver
detection:
selection:
cs-uri-query|contains:
- 'fileupload'
- 'uploadfile'
- 'attachment'
cs-method|contains:
- 'POST'
filter_legit:
cs-user-agent|contains:
- 'Mozilla'
- 'Outlook'
condition: selection and not filter_legit
falsepositives:
- Legitimate administrative bulk uploads
level: high
---
title: Suspicious PowerShell Encoded Command via Exchange IIS
id: b2c3d4e5-6f7a-8b9c-0d1e-2f3a4b5c6d7e
description: Detects execution of encoded PowerShell commands often used after exploiting Exchange Server deserialization vulnerabilities (CVE-2023-21529).
status: experimental
date: 2026/05/07
author: Security Arsenal Research
logsource:
product: windows
service: security
detection:
selection:
EventID: 4688
NewProcessName|contains: 'powershell.exe'
CommandLine|contains:
- '-Enc '
- '-EncodedCommand'
ParentProcessName|endswith: '\w3wp.exe'
condition: selection
falsepositives:
- Exchange Server maintenance scripts
level: critical
---
title: Qilin Lateral Movement via PsExec or WMI
id: c3d4e5f6-7a8b-9c0d-1e2f-3a4b5c6d7e8f
description: Detects lateral movement patterns consistent with Qilin operators using PsExec or WMI for spreading the encryptor.
status: experimental
date: 2026/05/07
author: Security Arsenal Research
logsource:
product: windows
service: security
detection:
selection_psexec:
EventID: 4688
NewProcessName|endswith:
- '\psexec.exe'
- '\psexec64.exe'
CommandLine|contains: '-accepteula'
selection_wmi:
EventID: 4688
ParentProcessName|endswith: '\wmiprvse.exe'
NewProcessName|endswith:
- 'cmd.exe'
- 'powershell.exe'
condition: 1 of selection_
falsepositives:
- Legitimate system administration
level: high
KQL (Microsoft Sentinel)
// Hunt for suspicious processes spawned by IIS worker processes (Exchange/Web Exploit)
DeviceProcessEvents
| where Timestamp > ago(7d)
| where InitiatingProcessFileName endswith "w3wp.exe"
| where ProcessVersionInfoCompanyName != "Microsoft Corporation"
| where FileName in ("powershell.exe", "cmd.exe", "whoami.exe", "net.exe")
| project Timestamp, DeviceName, InitiatingProcessCommandLine, FileName, ProcessCommandLine, AccountName
| order by Timestamp desc
Rapid Response PowerShell Script
# Qilin Response: Check for Webshells in common web directories and VSS manipulation
Write-Host "[+] Initiating Qilin TTP Hunt..." -ForegroundColor Cyan
# 1. Check for recently modified files in Inetpub (Webshells)
$webRoots = @("C:\inetpub\wwwroot", "C:\Program Files\SmarterTools\SmarterMail")
$cutoffDate = (Get-Date).AddDays(-2)
foreach ($root in $webRoots) {
if (Test-Path $root) {
Write-Host "[?] Scanning $root for files modified in last 48h..." -ForegroundColor Yellow
Get-ChildItem -Path $root -Recurse -File -ErrorAction SilentlyContinue |
Where-Object { $_.LastWriteTime -gt $cutoffDate -and $_.Extension -in ('.aspx', '.ashx', '.asmx') } |
Select-Object FullName, LastWriteTime, Length | Format-Table -AutoSize
}
}
# 2. Check for VSS Deletion Events (ShadowCopy)
Write-Host "[?] Checking for Volume Shadow Copy (VSS) deletions in Event Log..." -ForegroundColor Yellow
$events = Get-WinEvent -FilterHashtable @{LogName='Application'; ProviderName='VSS'; ID=12343; StartTime=$cutoffDate} -ErrorAction SilentlyContinue
if ($events) { $events | Select-Object TimeCreated, Message | Format-List } else { Write-Host "No VSS deletion events found." -ForegroundColor Green }
# 3. Check for Suspicious Scheduled Tasks (Persistence)
Write-Host "[?] Checking for scheduled tasks created in last 7 days..." -ForegroundColor Yellow
Get-ScheduledTask | Where-Object { $_.Date -gt (Get-Date).AddDays(-7) } | Select-Object TaskName, Date, Author, Actions
---
Incident Response Priorities
Based on Qilin's rapid detonation timeline:
-
T-Minus Detection Checklist:
- Web Server Logs: Immediately review IIS/SMTP logs for SmarterMail and Exchange. Look for
POSTrequests to non-standard endpoints or200 OKresponses following anomalousUser-Agentstrings. - Process Spawning: Hunt for
w3wp.exespawningcmd.exeorpowershell.exe. - Authentication Logs: Audit VPNs and OWA for successful logins followed immediately by MFA failures (pass-the-cookie attempts).
- Web Server Logs: Immediately review IIS/SMTP logs for SmarterMail and Exchange. Look for
-
Critical Assets at Risk:
- Email Databases: .EDB and .PST files are primary targets for exfiltration.
- Financial Documents: Accounts payable/receivable (Excel, PDF).
- Source Code: IP theft is a frequent lever in Qilin negotiations.
-
Containment Actions (Ordered by Urgency):
- Isolate: Disconnect identified mail servers (Exchange/SmarterMail) from the network immediately if compromise is suspected.
- Revoke: Reset credentials for accounts that accessed the mail servers externally in the last 14 days.
- Segment: Ensure lateral movement protocols (SMB/RPC) are blocked between the DMZ/Perimeter and the internal LAN.
Hardening Recommendations
Immediate (Within 24 Hours):
- Patch: Patch CVE-2023-21529 (Exchange) and CVE-2025-52691 / CVE-2026-23760 (SmarterMail) immediately. These are the active entry points.
- Block External Access: Restrict external access to Cisco FMC (CVE-2026-20131) and Web Management interfaces to trusted IP ranges only.
- Disable: Disable unused features in SmarterMail (e.g., file upload handlers) if not business-critical.
Short-term (Within 2 Weeks):
- Network Segmentation: Move mail servers to a hardened VLAN with strict egress rules (allow only SMTP/HTTPS/HTTP to required destinations).
- MFA Enforcement: Enforce phishing-resistant MFA (FIDO2) for all remote access and admin interfaces.
- Web Application Firewall (WAF): Deploy or tune WAF rules to block known exploit patterns for Exchange and SmarterMail deserialization attacks.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.