Back to Intelligence

QILIN Ransomware: Global Campaign Targets Manufacturing & Services — Exploitation of ConnectWise & Cisco Flaws

SA
Security Arsenal Team
May 14, 2026
5 min read

Aliases: Agenda, Bashe

Model: Ransomware-as-a-Service (RaaS)

Tactics: Qilin (formerly Bashe) operates a sophisticated RaaS model written in Rust, allowing for cross-platform encryption. They are known for aggressive double-extortion tactics, exfiltrating sensitive data before encryption and threatening public leaks. Recent intelligence indicates a shift towards exploiting known vulnerabilities in remote management and email software to gain initial access rather than relying solely on phishing.

Demands: Ransom demands typically range from $200,000 to several million dollars, largely dependent on victim revenue and the sensitivity of exfiltrated data.

Access Vectors: Initial access is frequently achieved through:

  1. Vulnerability Exploitation: Specifically targeting internet-facing appliances like ConnectWise ScreenConnect, Microsoft Exchange, and firewall management interfaces.
  2. Phishing: Spear-phishing with malicious macros or links.
  3. Valid Credentials: Brute-forcing exposed RDP or VPN services.

Dwell Time: Average dwell time is estimated between 3 to 7 days, allowing for extensive reconnaissance, credential dumping, and data staging before detonation.


Current Campaign Analysis

Sector Targeting: The recent victim list (May 11-14, 2026) shows a distinct pivot toward Manufacturing (e.g., Schulte-Lindhorst, Fab-Masters) and Business Services (e.g., LTJ Industrial Services, One Legal). Healthcare and Energy remain secondary but consistent targets.

Geographic Concentration: While Qilin operates globally, the current wave is heavily concentrated in the United States (6 recent victims), followed by significant activity in Germany, Australia, and Canada.

Victim Profile: Victims range from mid-market law firms and specialized construction services to larger technology entities like AppDirect. Revenue estimates likely range from $10M to $500M USD, indicating Qilin targets organizations with sufficient insurance coverage but potentially less mature security postures than Fortune 500s.

Escalation Patterns: Posting frequency is high, with 14 victims listed within a 48-hour window. This suggests an automated process or a highly active affiliate network utilizing commodity exploits.

CVE Correlation: There is a strong correlation between the recent KEV additions (notably CVE-2024-1708 - ConnectWise ScreenConnect and CVE-2026-20131 - Cisco FMC) and the victim surge. We assess with high confidence that affiliates are actively scanning for and exploiting unpatched ScreenConnect instances to bypass perimeter defenses.


Detection Engineering

Sigma Rules

YAML
title: Potential ScreenConnect Path Traversal Exploitation (CVE-2024-1708)
id: 9a1c3d45-6b78-4c12-a89e-1f23a45b6c7d
description: Detects potential exploitation of CVE-2024-1708 in ConnectWise ScreenConnect via suspicious URL patterns in web logs.
status: experimental
date: 2026/05/14
author: Security Arsenal
references:
    - https://www.cisa.gov/known-exploited-vulnerabilities-catalog
logsource:
    category: webserver
detection:
    selection:
        cs-uri-query|contains:
            - 'SessionManager.ashx'
            - '../../..'
            - '%2e%2e%2f'
    condition: selection
falsepositives:
    - Unknown
level: critical
---
title: SmarterMail Suspicious File Upload Activity (CVE-2025-52691)
id: b2c4e678-9d01-4f5b-8a12-3c45d6e789f0
description: Detects potential exploit attempts targeting SmarterMail unrestricted file upload vulnerability.
status: experimental
date: 2026/05/14
author: Security Arsenal
logsource:
    product: smtp
    service: smtp
detection:
    selection:
        ImagePath|contains: 'SmartMail'
        TargetFilename|contains: '.aspx'
    condition: selection
falsepositives:
    - Legitimate administration
level: high
---
title: Suspicious PowerShell Encoded Command Execution
description: Detects Base64 encoded PowerShell command lines often used by Qilin for staging and exfil.
status: experimental
date: 2026/05/14
author: Security Arsenal
logsource:
    category: process_creation
detection:
    selection:
        Image|endswith: '\powershell.exe'
        CommandLine|contains: ' -e '
    filter_legit:
        ParentImage|endswith:
            - '\explorer.exe'
            - '\cmd.exe'
    condition: selection and not filter_legit
falsepositives:
    - Administrative scripts
level: high

KQL (Microsoft Sentinel)

KQL — Microsoft Sentinel / Defender
// Hunt for lateral movement and staging indicators associated with Qilin
let TimeFrame = 1d;
DeviceProcessEvents
| where Timestamp > ago(TimeFrame)
// Look for Qilin common tools: PsExec, WMI, Rclone
| where ProcessName in~ ('psexec.exe', 'psexec64.exe', 'wmic.exe', 'rclone.exe')
| extend AccountCustomEntity = AccountName, HostCustomEntity = DeviceName, ProcessCustomEntity = ProcessName
| project Timestamp, DeviceName, AccountName, ProcessName, InitiatingProcessFileName, CommandLine
| order by Timestamp desc

PowerShell Hardening Script

PowerShell
# Qilin Response Hardening: Identify Scheduled Tasks for Persistence and Check Volume Shadow Copies
Write-Host "Checking for suspicious scheduled tasks created in the last 7 days..." -ForegroundColor Yellow

$suspiciousTasks = Get-ScheduledTask | Where-Object { $_.Date -gt (Get-Date).AddDays(-7) }

if ($suspiciousTasks) {
    Write-Host "[ALERT] Found recently created scheduled tasks:" -ForegroundColor Red
    $suspiciousTasks | Select-Object TaskName, Date, Author | Format-Table
} else {
    Write-Host "[INFO] No recent suspicious scheduled tasks found." -ForegroundColor Green
}

Write-Host "Checking Volume Shadow Copy status..." -ForegroundColor Cyan
try {
    $vss = vssadmin list shadows
    if ($vss -like "No shadow copies found") {
        Write-Host "[WARNING] No Shadow Copies exist. Recovery options may be limited." -ForegroundColor Red
    } else {
        Write-Host "[INFO] Shadow Copies are present." -ForegroundColor Green
    }
} catch {
    Write-Host "[ERROR] Could not query VSS." -ForegroundColor Red
}


---

# Incident Response Priorities

**T-Minus Detection Checklist:**
1.  **Web Server Logs:** Immediately scan IIS/Apache logs for indicators of **CVE-2024-1708** (ConnectWise) or **CVE-2026-20131** (Cisco FMC).
2.  **MFA Bypass:** Review VPN and Remote Access logs for successful logins immediately followed by bulk file access.
3.  **PowerShell Auditing:** Search for encoded commands ( `-enc ` or `-e `) executed by `SYSTEM` or `IIS AppPool` accounts.

**Critical Assets for Exfil:**
Qilin historically prioritizes:
*   **PII/PHI:** From healthcare and legal services (e.g., One Legal).
*   **IP/Proprietary Data:** CAD files and schematics from manufacturing targets (e.g., Schulte-Lindhorst).
*   **Financial Data:** Payroll and tax information.

**Containment Actions:**
1.  **Isolate:** Disconnect any suspected ConnectWise ScreenConnect servers from the network immediately.
2.  **Reset Credentials:** Force reset of privileged domain admin accounts and local admin accounts on exposed servers.
3.  **Block IP:** Implement firewall rules blocking inbound traffic from regions outside operational necessity if Geo-IP is not already enforced.

---

# Hardening Recommendations

**Immediate (24h):**
*   **Patch ConnectWise ScreenConnect:** Ensure all instances are updated to the latest build to mitigate **CVE-2024-1708**.
*   **Disable Internet-Facing RDP:** Enforce VPN with MFA for all remote administrative access.
*   **Audit Email Gateways:** Patch SmarterMail (**CVE-2025-52691**) and Exchange servers (**CVE-2023-21529**) if in use.

**Short-term (2 weeks):**
*   **Network Segmentation:** Move critical SCADA and manufacturing control systems (OT) to isolated VLANs, separate from the IT network.
*   **EDR Rollout:** Ensure Endpoint Detection and Response is deployed on all servers, particularly file servers and domain controllers.
*   **Attack Surface Reduction:** Implement ASR rules in Microsoft Defender to block macro execution from the internet and unauthorized usage of PowerShell.

---

Related Resources

Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub

darkwebransomware-gangqilinransomwarecve-2024-1708manufacturingscreenconnectinitial-access

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.