Threat Actor Profile — QILIN
Aliases: Agenda, Qilin.B Operational Model: Ransomware-as-a-Service (RaaS). Qilin operates with an affiliate network model, offering a customized encryptor written in Rust and Go for cross-platform capabilities.
Typical Ransom Demands: Variable, generally ranging from $200,000 to $5 million USD depending on victim revenue. Qilin affiliates are known for aggressive negotiation tactics and swift data leaks if deadlines are missed.
Initial Access Vectors: Qilin affiliates aggressively exploit internet-facing vulnerabilities. Recent intelligence confirms a heavy reliance on:
- Valid Credentials: Phishing campaigns targeting IT staff to harvest VPN credentials.
- Vulnerability Exploitation: Specifically targeting unpatched Exchange servers and firewall management interfaces.
Double Extortion: Strictly adheres to the double-extortion playbook. Actors steal sensitive data (PII, CAD drawings, financial records) prior to encryption and threaten publication on their Tor leak site.
Average Dwell Time: Short. Recent observations suggest a dwell time of 3–5 days between initial access and detonation, indicating an automated or highly streamlined operation.
Current Campaign Analysis
Campaign Overview: Based on live dark web data from 2026-04-20 to 2026-04-21, Qilin has posted 15 new victims, indicating a high-volume deployment phase.
Targeted Sectors:
- Manufacturing (40%): The hardest hit sector. Victims include Industrial Carrocera Arbuciense, Kolin Turkey, Heartland Steel Products, Safety Engineering Laboratories, and Huonker GmbH.
- Business Services (20%): PTS Office Systems, City'Pro, GUEGUEN Avocats.
- Transportation/Logistics (13%): Sea Air International Forwarders, Avitrans.
- Healthcare (7%): STERIMED (FR) — a critical concern given the potential impact on patient care.
- Public Sector (7%): Roman Catholic Archdiocese of St John.
Geographic Concentration: The campaign is globally dispersed but shows density in North America (US, CA) and Europe (ES, FR, DE, RO, TR). This suggests a spray-and-pray approach targeting exposed internet-facing assets rather than geo-specific spear-phishing.
CVE Connection & Vectors: The surge correlates directly with the active exploitation of the following CISA KEV-listed vulnerabilities:
- CVE-2023-21529 (Microsoft Exchange): Used to gain initial access to email servers, facilitating internal spear-phishing or credential dumping.
- CVE-2026-20131 (Cisco Secure Firewall FMC): Exploited to bypass perimeter defenses and sniff traffic or establish persistence within network management layers.
- CVE-2025-52691 & CVE-2026-23760 (SmarterTools SmarterMail): The authentication bypass and file upload vulnerabilities are likely used to pivot from email infrastructure into the broader domain controller network.
Detection Engineering
SIGMA Rules
---
title: Potential Exchange Deserialization Exploit CVE-2023-21529
id: 4f8c9b2a-1d3e-4f5a-9b6c-1d3e4f5a9b6c
description: Detects suspicious deserialization activity in Microsoft Exchange Management interface, often associated with CVE-2023-21529 exploitation by Qilin affiliates.
status: experimental
date: 2026/04/22
author: Security Arsenal Research
logsource:
product: windows
service: msexchange-management
detection:
selection:
EventID: 6 # Generic PowerShell pipeline execution or similar log depending on config
ScriptBlockText|contains:
- 'System.Runtime.Serialization.Formatters.Binary'
- 'System.Management.Automation.Serialization'
condition: selection
falsepositives:
- Legitimate Exchange administration scripts
level: critical
---
title: SmarterMail Suspicious File Upload Activity
date: 2026/04/22
description: Detects potential exploitation of SmarterMail unrestricted file upload vulnerability (CVE-2025-52691) via web logs.
status: experimental
author: Security Arsenal Research
logsource:
product: webserver
service: iis
detection:
selection_uri:
cs-uri-stem|contains: '/MRS/'
selection_ext:
cs-uri-query|contains:
- '.aspx'
- '.ashx'
selection_method:
cs-method: 'POST'
condition: all of selection_*
falsepositives:
- Legitimate mailbox migration requests
level: high
---
title: Ransomware Pre-Encryption - VSS Admin Deletion
date: 2026/04/22
description: Detects the execution of vssadmin to delete shadow copies, a common precursor to Qilin encryption.
status: experimental
author: Security Arsenal Research
logsource:
product: windows
service: security
detection:
selection:
EventID: 4688
NewProcessName|endswith: '\vssadmin.exe'
CommandLine|contains: 'delete shadows'
condition: selection
falsepositives:
- Administrative disk maintenance (rare)
level: critical
KQL (Microsoft Sentinel)
// Hunt for lateral movement and data staging associated with Qilin
// Looks for unusual SMB access to administrative shares and mass file modification
DeviceProcessEvents
| where Timestamp > ago(7d)
| where ProcessName hasAny ("powershell.exe", "cmd.exe", "wmic.exe", "psexec.exe", "psexec64.exe")
| where ProcessCommandLine has_any ("admin$", "ipc$", "c$", /copy/, /move/, /robocopy/)
| project Timestamp, DeviceName, InitiatingProcessAccountName, ProcessCommandLine, FolderPath
| order by Timestamp desc
PowerShell Response Script
<#
.SYNOPSIS
Rapid Response Script for Qilin Ransomware Indicators
.DESCRIPTION
Checks for suspicious scheduled tasks created in the last 7 days and
recent modification of Volume Shadow Copies (VSS).
#>
Write-Host "[+] Checking for Scheduled Tasks created/modified in the last 7 days..." -ForegroundColor Cyan
$DateCutoff = (Get-Date).AddDays(-7)
Get-ScheduledTask | Where-Object { $_.LastRunTime -gt $DateCutoff -or $_.Date -gt $DateCutoff } |
Select-Object TaskName, TaskPath, LastRunTime, Date, Author
Write-Host "[+] Checking Volume Shadow Copy Storage usage..." -ForegroundColor Cyan
$vss = vssadmin list shadows
if ($vss -like "No shadow copies found") {
Write-Host "[!] WARNING: No shadow copies exist." -ForegroundColor Red
} else {
Write-Host $vss
}
Write-Host "[+] Checking for common Qilin persistence locations..." -ForegroundColor Cyan
$paths = @("C:\ProgramData\", "C:\Windows\Temp\", "C:\Users\Public\")
foreach ($path in $paths) {
Get-ChildItem -Path $path -Recurse -ErrorAction SilentlyContinue |
Where-Object { $_.LastWriteTime -gt $DateCutoff -and $_.Length -gt 5mb } |
Select-Object FullName, LastWriteTime
}
---
Incident Response Priorities
T-minus Detection Checklist:
- Exchange & Mail Server Logs: Immediate forensic review of IIS and Exchange logs for CVE-2023-21529 and SmarterMail exploitation indicators (April 2026 timeframe).
- Perimeter Firewall Audits: Check Cisco FMC logs for unauthorized administrative access or strange configuration changes related to CVE-2026-20131.
- Active Directory Auditing: Look for suspicious "DCSync" permissions or unexpected additions to Domain Admin groups.
Critical Assets at Risk:
- File Servers: Large repositories of CAD/Manufacturing designs (intellectual property).
- EMR/HIS Systems: Patient databases (high extortion value).
- Financial Systems: Accounting and payroll data.
Containment Actions (Order by Urgency):
- Isolate: Disconnect Exchange servers and Email gateways from the network immediately if compromise is suspected.
- Revoke: Force reset of all Service Account credentials, specifically those with access to Exchange and Cisco management consoles.
- Segment: Ensure VLAN segmentation separates Manufacturing ICS/OT networks from the corporate IT domain (Qilin often pivots from IT to OT).
Hardening Recommendations
Immediate (24h):
- Patch: Apply updates for CVE-2023-21529 (Exchange) and CVE-2026-20131 (Cisco FMC) immediately.
- Disable: If patching is not possible, disable Microsoft Exchange PowerShell (PowerShellVirtualDirectory) and restrict SmarterMail web management interfaces to internal VPN-only access.
- MFA Enforcement: Enforce FIDO2 hardware keys or Conditional Access policies for all remote access (VPN) and cloud admin consoles.
Short-term (2 weeks):
- Network Segmentation: Implement strict East-West traffic controls. Prevent file servers from initiating connections to the internet.
- EDR Deployment: Ensure comprehensive EDR coverage on all Exchange servers and edge devices.
- Vulnerability Management: Conduct a scan for all "SmarterTools" instances on the network to ensure no unauthorized mail servers exist.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.