Threat Actor Profile — QILIN
Aliases: Agenda, Agenda Ransomware
Model: Ransomware-as-a-Service (RaaS). Qilin operates as an affiliate-heavy operation, offering a custom Rust-based encryptor to partners. They are distinct for their aggressive "double extortion" tactics, often threatening to leak data within 24-48 hours if contact is not established.
Typical Ransom Demands: Highly variable, generally ranging from $500,000 to multi-million dollars depending on victim revenue.
Initial Access Vectors: Historically reliant on valid credentials obtained via phishing or initial access brokers (IABs). However, recent intelligence indicates a shift toward exploiting critical internet-facing infrastructure, specifically vulnerabilities in Email servers (Microsoft Exchange, SmarterMail) and Firewall management consoles.
Dwell Time: Qilin affiliates typically maintain access for 3 to 10 days before detonating encryption, using this time for extensive data staging and lateral movement.
Current Campaign Analysis
Sector Targeting: Data from the last 100 postings indicates a broad scope, but the most recent wave (April 24-25, 2026) shows a distinct pivot toward Manufacturing (Buckley Powder, Leistritz, Denso) and Financial Services (KEMBA Indianapolis FCU, First County FCU). Agriculture (SanCor, Cahbo) and Healthcare remain secondary targets.
Geographic Concentration: The campaign is globally dispersed, with significant hits in North America (US, CA) and Europe (DE, GB, SE). The targeting of Denso (JP) and victims in Argentina/Philippines suggests an opportunistic but technically sophisticated affiliate network scanning for specific vulnerable assets worldwide rather than geo-political targeting.
Victim Profile:
- Manufacturing: High-value targets (e.g., Denso) with complex OT/IT environments and low tolerance for downtime.
- Financial: Regional Credit Unions, which often operate on thinner margins and may rely on legacy on-premise mail solutions like Exchange or SmarterMail.
Observed Frequency: High-volume posting. The group published 15 victims across 48 hours (April 24-25), indicating a successful automated exploitation tool or a highly active affiliate group.
CVE Connection: The recent victims strongly correlate with the actively exploited CVEs listed in CISA KEV:
- CVE-2023-21529 (Microsoft Exchange): Likely the vector for the Financial and Business Services victims.
- CVE-2025-52691 / CVE-2026-23760 (SmarterMail): Critical vector for smaller enterprises and MSPs hosting mail.
- CVE-2026-20131 (Cisco FMC): A potential vector for lateral movement or perimeter bypass in larger manufacturing environments.
Detection Engineering
SIGMA Rules
---
title: Potential Microsoft Exchange Deserialization Exploitation CVE-2023-21529
id: 4c2f3b1d-8a9e-4b2c-9f1d-3a4b5c6d7e8f
description: Detects suspicious command line arguments or process execution patterns associated with deserialization attacks on Microsoft Exchange Server.
status: experimental
date: 2026/04/27
author: Security Arsenal Research
references:
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
logsource:
product: windows
service: security
detection:
selection:
EventID: 4688
NewProcessName|endswith: \\w3wp.exe
CommandLine|contains:
- 'Microsoft.Exchange.Management'
- 'System.Management.Automation.Serialization'
- 'BinaryFormatter'
condition: selection
falsepositives:
- Legitimate Exchange management scripts
level: high
tags:
- attack.initial_access
- attack.t1190
- cve-2023-21529
---
title: SmarterMail Unrestricted File Upload or Auth Bypass Attempt
id: 5d3e4c2a-9b0f-5c3d-0e2f-4b5c6d7e8f9a
description: Detects suspicious file creation or web access patterns indicative of SmarterMail exploitation (CVE-2025-52691, CVE-2026-23760).
status: experimental
date: 2026/04/27
author: Security Arsenal Research
logsource:
product: web
service: iis
detection:
selection_uri:
cs-uri-query|contains:
- 'fileupload'
- 'saveattachment'
- 'resetpassword'
selection_method:
cs-method: 'POST'
selection_status:
sc-status: 200
filter:
cs-uri-stem|contains: '/MailService/'
condition: all of selection_* and filter
falsepositives:
- Legitimate administrative file uploads
level: critical
tags:
- attack.initial_access
- attack.t1190
- cve-2025-52691
---
title: Ransomware Lateral Movement via PsExec and WMI
id: 6e4f5d3b-0c1g-6d4e-1f3g-5c6d7e8f9a0b
description: Detects the use of PsExec or WMI for lateral movement, commonly used by Qilin affiliates to spread across a network before encryption.
status: experimental
date: 2026/04/27
author: Security Arsenal Research
logsource:
product: windows
service: security
detection:
selection_psexec:
EventID: 4688
NewProcessName|contains: '\\PsExec.exe'
CommandLine|contains: '\\'
selection_wmi:
EventID: 4688
NewProcessName|endswith: \\wmiprvse.exe
ParentProcessName|endswith: \\svchost.exe
condition: 1 of selection*
falsepositives:
- System administration tasks
level: high
tags:
- attack.lateral_movement
- attack.t1021.002
KQL (Microsoft Sentinel)
// Hunt for suspicious lateral movement and data staging prior to encryption
let TimeFrame = 1d;
let ProcessList = dynamic(["psexec.exe", "wmic.exe", "powershell.exe", "cmd.exe", "csc.exe", "rundll32.exe"]);
DeviceProcessEvents
| where Timestamp >= ago(TimeFrame)
| where FileName in~ ProcessList
| where InitiatingProcessFileName !in~ ("explorer.exe", "services.exe")
| where ProcessCommandLine contains "-enc" or ProcessCommandLine contains "DownloadString" or ProcessCommandLine contains "IEX"
| summarize count(), arg_min(Timestamp, *) by DeviceId, AccountName, FileName, ProcessCommandLine
| project Timestamp, DeviceId, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName, FolderPath
| order by Timestamp desc
PowerShell Response Script
# Qilin Ransomware Triage Script
# Checks for recent suspicious scheduled tasks and Shadow Copy manipulation
Write-Host "[+] Checking for Shadow Copy deletion events (Event ID 403)..." -ForegroundColor Cyan
Get-WinEvent -FilterHashtable @{LogName='System'; ID=403; StartTime=(Get-Date).AddHours(-24)} -ErrorAction SilentlyContinue | Select-Object TimeCreated, Message | Format-List
Write-Host "[+] Enumerating Scheduled Tasks created in the last 7 days..." -ForegroundColor Cyan
$schTasks = Get-ScheduledTask
foreach ($task in $schTasks) {
$taskInfo = $task | Get-ScheduledTaskInfo
if ($taskInfo.LastRunTime -gt (Get-Date).AddDays(-7)) {
$action = $task.Actions.Execute
Write-Host "Task: $($task.TaskName) | Action: $action | Last Run: $($taskInfo.LastRunTime)" -ForegroundColor Yellow
}
}
Write-Host "[+] Checking for recently modified System32/Drivers binaries..." -ForegroundColor Cyan
Get-ChildItem "C:\Windows\System32\drivers" -Filter "*.sys" | Where-Object {$_.LastWriteTime -gt (Get-Date).AddHours(-24)} | Select-Object Name, LastWriteTime
---
Incident Response Priorities
-
T-minus Detection Checklist:
- Mail Server Logs: Immediate grep of IIS/SMTP logs for
POSTrequests to/MailService/containingsaveattachmentor similar parameters (SmarterMail). - Exchange Backend: Review
MSExchange Managementlogs for unexpected deserialization errors or webshell creation in/aspnet_client/. - Firewall Logs: Check outbound traffic on non-standard ports (often used for exfiltration) and connections to known IP addresses associated with Qilin C2.
- Mail Server Logs: Immediate grep of IIS/SMTP logs for
-
Critical Assets Prioritized for Exfiltration:
- Financial: Customer PII, loan databases, ACH/wire transfer logs.
- Manufacturing: Proprietary CAD drawings, IP, ERP databases (SAP/Oracle).
- Healthcare: Patient PHI (HIPAA data).
-
Containment Actions:
- Immediate: Isolate identified mail servers (Exchange/SmarterMail) from the network. Do not power off; snapshot memory for forensic analysis.
- Urgent: Revoke credentials for service accounts found in recent logs (specifically those used for Exchange/SQL services).
- Network: Segment VLANs to prevent lateral movement from the IT network into OT (Manufacturing) environments.
Hardening Recommendations
Immediate (24h):
- Patch Management: Apply patches for CVE-2023-21529 (Exchange), CVE-2025-52691 (SmarterMail), and CVE-2026-20131 (Cisco FMC) immediately. These are confirmed active exploitation vectors.
- Access Control: Disable internet-facing management interfaces for Cisco Firewalls and restrict Exchange ECP/OWA access to internal VPN only or strict IP whitelists.
- MFA Enforcement: Ensure all mail admin and VPN accounts have FIDO2/Phishing-resistant MFA enabled.
Short-term (2 weeks):
- Architecture: Implement a Secure Web Gateway (SWG) to inspect outbound traffic and block command-and-control (C2) callbacks.
- Segregation: Move critical backup repositories to an immutable storage tier (object lock) that is logically air-gapped from the production network.
- Monitoring: Deploy a deception campaign (canary tokens/honeypots) around file shares and mail servers to detect lateral movement attempts early.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.