Executive Summary
The QILIN ransomware gang (also known as Agenda) has escalated operations in mid-May 2026, posting 15 new victims between May 15 and May 18. This wave displays a distinct focus on Agriculture/Food Production, Healthcare, and Manufacturing sectors across geographies including the UK, Australia, North America, and Southeast Asia. Intelligence indicates the group is actively exploiting CVE-2024-1708 (ConnectWise ScreenConnect) and SmarterMail vulnerabilities (CVE-2026-23760, CVE-2025-52691) for initial access, bypassing traditional perimeter defenses.
Threat Actor Profile — QILIN
- Aliases: Agenda (historical), Qilin.
- Model: Ransomware-as-a-Service (RaaS). The gang operates an affiliate model, recruiting skilled access brokers who specialize in exploiting internet-facing appliances.
- Ransom Demands: Highly variable, typically ranging from $500,000 to $5 million, largely dependent on the victim's revenue and the sensitivity of exfiltrated data.
- Initial Access Vectors: Primary reliance on exploiting vulnerabilities in remote management software (ConnectWise ScreenConnect) and email gateways (SmarterMail). Secondary vectors include VPN exploits and valid credentials obtained via phishing.
- Tactics: Aggressive double extortion. Victims' data is leaked on the Tor site shortly after the deadline expires.
- Dwell Time: Short. Qilin affiliates typically move laterally and detonate encryption within 3-7 days of gaining initial access.
Current Campaign Analysis
Sector & Geographic Targeting
Based on the 15 victims posted between 2026-05-15 and 2026-05-18:
- High-Value Sectors: Agriculture/Food Production (20% of victims), Healthcare (20%), Manufacturing (13%), Construction (13%).
- Geographic Spread: A broad "spray and pray" approach targeting specific verticals globally. Hotspots include Australia (Construction, Education, Healthcare), Great Britain (Food, Health), North America (US/CA Manufacturing, Tourism), and Malaysia (Public Sector, Finance).
Victim Profile
The victims range from mid-market entities (e.g., Monir Precision Monitoring, Turner Supply) to public sector bodies (Majlis Perbandaran Alor Gajah). Revenue estimates generally fall between $10M and $200M, suggesting Qilin affiliates target organizations with sufficient cyber insurance coverage but potentially immature security postures regarding legacy internet-facing applications.
Observed TTPs & CVE Correlation
The campaign correlates directly with the exploitation of CISA Known Exploited Vulnerabilities (KEV):
- ConnectWise ScreenConnect (CVE-2024-1708): Used to establish a foothold on IT management networks, particularly in the Manufacturing and Construction sectors where remote support is common.
- SmarterMail (CVE-2026-23760 & CVE-2025-52691): Exploited for initial access in Healthcare and Finance sectors, leveraging authentication bypass to gain internal email server access.
- Cisco Secure Firewall (CVE-2026-20131): Likely used to bypass security controls or pivot into segmented networks.
Detection Engineering
The following detection rules and hunts are designed to identify Qilin activity associated with their current exploitation of ScreenConnect and SmarterMail, as well as their standard lateral movement and pre-encryption tactics.
Sigma Rules
---
title: Potential ConnectWise ScreenConnect Path Traversal Exploit (CVE-2024-1708)
id: 92d3d5c6-1a2b-4c3d-8e5f-6a7b8c9d0e1f
description: Detects potential exploitation of CVE-2024-1708 via suspicious URI patterns in web logs.
status: experimental
date: 2026/05/20
references:
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
author: Security Arsenal Research
logsource:
category: web
detection:
selection:
c-uri|contains: \"/LiveEvents/\"
cs-method: 'POST'
filter_main:
c-uri|contains:
- '..%2F'
- '%2f..%2f'
- 'AssemblyInjection'
condition: selection and filter_main
falsepositives:
- Potential false positives if specific API usage patterns match; verify user-agent context.
level: critical
tags:
- attack.initial_access
- cve.2024.1708
- ransomware.qilin
---
title: SmarterMail Suspicious File Upload or Auth Bypass
id: a1b2c3d4-5e6f-7a8b-9c0d-1e2f3a4b5c6d
description: Detects indicators of SmarterMail exploitation including Auth bypass patterns and unusual file uploads.
status: experimental
date: 2026/05/20
logsource:
category: web
detection:
selection_upload:
c-uri|contains: \"/Services/\"
cs-method: 'POST'
c-uri|endswith: '.aspx'
selection_bypass:
c-uri|contains:
- 'ResetPassword.aspx'
- 'Login.aspx'
cs-status: 200
sc-bytes: < 500
filter_legit:
cs-user-agent|contains:
- 'Mozilla'
- 'SmarterTools'
condition: (selection_upload and not filter_legit) or (selection_bypass and not filter_legit)
falsepositives:
- Legacy integration tools with incomplete user-agent strings.
level: high
tags:
- attack.initial_access
- cve.2026.23760
- cve.2025.52691
- ransomware.qilin
---
title: Qilin Pre-Encryption VSS Shadow Copy Deletion
id: b2c3d4e5-6f7a-8b9c-0d1e-2f3a4b5c6d7e
description: Detects commands used by Qilin affiliates to delete Volume Shadow Copies prior to encryption.
status: experimental
date: 2026/05/20
references:
- https://securityarsenal.com/darkside
author: Security Arsenal Research
logsource:
category: process_creation
product: windows
detection:
selection_vssadmin:
Image|endswith: '\\vssadmin.exe'
CommandLine|contains: 'delete shadows'
selection_wmic:
Image|endswith: '\\wbem\\WMIC.exe'
CommandLine|contains: 'shadowcopy delete'
condition: 1 of selection_*
falsepositives:
- System administrators manually managing disk space (rare in automated bulk).
level: critical
tags:
- attack.impact
- attack.t1490
- ransomware.qilin
KQL (Microsoft Sentinel)
// Hunt for Qilin lateral movement and staging activity
// Looks for large file movements to network shares and anomalous PowerShell execution
let TimeFrame = 1d;
let SuspiciousProcesses = dynamic([\"powershell.exe\", \"pwsh.exe\", \"cmd.exe\", \"cscript.exe\", \"wscript.exe\"]);
let ExfilExtensions = dynamic([\".zip\", \".rar\", \".7z\", \".tmp\", \".encrypted\"]);
DeviceProcessEvents
| where Timestamp > ago(TimeFrame)
| where InitiatingProcessFileName in~ SuspiciousProcesses
| where ProcessCommandLine has any(ExfilExtensions) or ProcessCommandLine has \"Copy-Item\" or ProcessCommandLine has \"Compress-Archive\"
| project Timestamp, DeviceName, AccountName, InitiatingProcessFileName, ProcessCommandLine, FolderPath
| join kind=inner (
DeviceFileEvents
| where Timestamp > ago(TimeFrame)
| where FileExtension in~ ExfilExtensions
| where FileSize > 1024 * 1024 // > 1MB
| project Timestamp, DeviceName, FileName, FolderPath, FileSize, InitiatingProcessAccountName
) on DeviceName, Timestamp
| summarize Timestamp = max(Timestamp), FileCount = count(), TotalSizeMB = sum(FileSize/1024/1024) by DeviceName, AccountName
| order by TotalSizeMB desc
PowerShell - Rapid Response Script
<#
.SYNOPSIS
Qilin Incident Response - Check for VSS Manipulation and Suspicious Scheduled Tasks.
.DESCRIPTION
Checks for recent deletion of Volume Shadow Copies and enumerates scheduled tasks
created in the last 7 days, common indicators of Qilin pre-encryption staging.
#>
Write-Host \"[+] QILIN RESPONSE CHECK - $(Get-Date)\" -ForegroundColor Cyan
# Check 1: VSS Shadow Copy Status
Write-Host \"\
[*] Checking Volume Shadow Copy Status...\" -ForegroundColor Yellow
try {
$shadows = vssadmin list shadows 2>&1
if ($shadows -match \"No shadow copies found\" -or $shadows -match \"There are no shadow copies\") {
Write-Host \"[!] CRITICAL: No Shadow Copies found. Possible deletion event.\" -ForegroundColor Red
} else {
$count = ($shadows | Select-String \"Shadow Copy Volume\").Count
Write-Host \"[+] Found $count shadow copies.\" -ForegroundColor Green
}
} catch {
Write-Host \"[!] Error checking VSS: $_\" -ForegroundColor Red
}
# Check 2: Scheduled Tasks created in last 7 days
Write-Host \"\
[*] Checking for Scheduled Tasks created/modified in last 7 days...\" -ForegroundColor Yellow
$cutoffDate = (Get-Date).AddDays(-7)
try {
$tasks = Get-ScheduledTask | Get-ScheduledTaskInfo
foreach ($task in $tasks) {
if ($task.LastRunTime -gt $cutoffDate -or $task.State -eq \"Running\") {
Write-Host \"[!] Suspicious Task: $($task.TaskName) | Last Run: $($task.LastRunTime) | Author: $((Get-ScheduledTask -TaskName $task.TaskName).Author)\" -ForegroundColor Red
}
}
Write-Host \"[*] Scheduled task check complete.\" -ForegroundColor Green
} catch {
Write-Host \"[!] Error checking Scheduled Tasks: $_\" -ForegroundColor Red
}
Incident Response Priorities
T-minus Detection Checklist (Pre-Encryption)
- Web Shell Hunt: Search IIS/SmarterMail logs for
AssemblyInjectionstrings or POST requests toResetPassword.aspxwith small response sizes (< 500 bytes). - Remote Access Logs: Audit ConnectWise ScreenConnect logs for logins from unfamiliar geo-locations (e.g., consecutive logins from AU and MY within minutes).
- PowerShell Auditing: Look for
EncryptedScriptcommand blocks or base64 encoded payloads in PowerShell logs.
Critical Assets for Exfiltration
Qilin historically prioritizes:
- Healthcare: Patient PII, medical records, insurance databases.
- Manufacturing: CAD designs, proprietary formulas, client supply chain data.
- Finance: ACH files, customer transaction logs.
Containment Actions
- Immediate: Isolate internet-facing servers hosting ScreenConnect or SmarterMail from the internal network.
- Urgent: Disable all domain/local admin accounts that were logged into the exploited servers within the last 48 hours.
- Secondary: Block outbound RDP (TCP 3389) and SMB (TCP 445) from non-admin workstations.
Hardening Recommendations
Immediate (24 Hours)
- Patch Management: Immediately patch CVE-2024-1708 (ScreenConnect) and CVE-2026-23760 / CVE-2025-52691 (SmarterMail). If patching is impossible, disable the services or move them behind a Zero Trust Network Access (ZTNA) gateway.
- Access Control: Enforce MFA on all remote access solutions, specifically ScreenConnect and VPNs. Implement Geo-blocking for management interfaces.
Short-term (2 Weeks)
- Network Segmentation: Ensure backup servers and critical domain controllers are on isolated VLANs with strict firewall rules (deny-all, allow-specific).
- EDR Tuning: Deploy detection rules specifically for
vssadmin.exeandwbem\\WMIC.exeinvocation to catch shadow copy deletion attempts early.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.