Aliases: Agenda, Quill Model: Ransomware-as-a-Service (RaaS) utilizing a Rust-based encryptor (Go/Rust). Ransom Demands: Typically ranges from $200,000 to $5 million USD, negotiated via a .onion portal. Initial Access: Known for aggressive exploitation of public-facing applications (VPN, RDP) and remote management software. Recent campaigns heavily leverage valid credentials obtained via info-stealers and exploitation of critical vulnerabilities in remote support tools (ScreenConnect) and email gateways. Tactics: Qilin employs a double-extortion model. They exfiltrate sensitive data prior to encryption and utilize customized leak sites to pressure victims. Their malware is written in Rust/Golang, making signature-based detection difficult. They frequently use system tools like PowerShell and Cobalt Strike beacons for lateral movement. Dwell Time: Short. Qilin operators often move from initial access to encryption within 3–7 days to minimize defender response windows.
Current Campaign Analysis
Sectors Targeted: The current campaign shows a distinct pivot towards Business Services (Porter W Yett, WNS Lowery) and Construction (CJ Architects, RCR Industrial Flooring). This aligns with Qilin's strategy of targeting mid-market organizations that rely heavily on third-party IT management and business continuity.
Geographic Concentration: While global, there is a heavy concentration in GB, US, CA, and AU. The inclusion of victims in New Zealand and Argentina suggests a "spray and pray" vulnerability exploitation phase rather than purely targeted geopolitical espionage.
Victim Profile: The victims range from small-to-medium businesses (SMBs) like local HVAC and stucco contractors to mid-sized entities in agriculture and manufacturing (Buckeye Paper, Vial Agro). Revenue estimates for the current cluster generally fall between $10M and $100M USD—organizations large enough to pay a ransom but often lacking dedicated 24/7 SOC monitoring.
Posting Frequency: High velocity. The gang posted 4 victims on May 20th alone, with consistent activity through May 17-18. This indicates an automated or highly efficient operational tempo.
CVE Correlation: The victimology strongly correlates with the exploitation of CVE-2024-1708 (ConnectWise ScreenConnect). The high number of "Business Services" and "Construction" victims suggests compromises via Managed Service Providers (MSPs) or internal IT teams using ScreenConnect for remote management. Additionally, the exploitation of SmarterMail (CVE-2025-52691, CVE-2026-23760) is likely a key vector for the Business Services sector, where email security perimeter control is vital.
Detection Engineering
The following detection rules and queries are designed to identify the specific exploitation chains and lateral movement tactics observed in Qilin's recent operations.
SIGMA Rules
---
title: Potential ScreenConnect Path Traversal Exploitation (CVE-2024-1708)
id: 8c5d3f12-1a2b-4c3d-9e0f-1a2b3c4d5e6f
description: Detects potential exploitation of ConnectWise ScreenConnect path traversal vulnerability via suspicious URI patterns.
status: experimental
date: 2026/05/20
author: Security Arsenal Research
references:
- https://cisa.gov/known-exploited-vulnerabilities-catalog
logsource:
category: webserver
detection:
selection:
c-uri|contains:
- '/App_Extensions/'
- '.aspx'
cs-method: 'POST'
filter:
sc-status:
- 200
- 500
condition: selection and filter
falsepositives:
- Legitimate ScreenConnect administration usage
level: high
tags:
- attack.initial_access
- cve.2024.1708
- ransomware.qilin
---
title: SmarterMail Suspicious File Upload or Auth Bypass
id: d4e5f678-9a0b-1c2d-3e4f-5a6b7c8d9e0f
description: Detects suspicious file upload activity or authentication bypass attempts associated with SmarterMail CVEs.
status: experimental
date: 2026/05/20
author: Security Arsenal Research
logsource:
category: webserver
detection:
selection_uri:
c-uri|contains:
- '/Services/'
- '/Runtime/'
selection_extension:
c-uri|contains:
- '.ashx'
- '.aspx'
selection_method:
cs-method: 'POST'
condition: all of selection_*
falsepositives:
- Legitimate email client access
level: high
tags:
- attack.initial_access
- cve.2025.52691
- cve.2026.23760
---
title: Microsoft Exchange Deserialization Exploitation (CVE-2023-21529)
id: a1b2c3d4-e5f6-4a5b-8c9d-0e1f2a3b4c5d
description: Detects potential deserialization attacks on Microsoft Exchange Server.
status: experimental
date: 2026/05/20
author: Security Arsenal Research
logsource:
product: windows
service: security
detection:
selection:
EventID: 5140 or 5145
ShareName|contains: 'Exchange'
condition: selection
falsepositives:
- High
level: medium
tags:
- attack.initial_access
- cve.2023.21529
- ransomware.qilin
KQL (Microsoft Sentinel)
This hunt query identifies potential lateral movement and data staging activities often preceding Qilin encryption, specifically looking for unusual process execution patterns associated with Cobalt Strike and data exfiltration tools.
let TimeFrame = 1h;
let SuspiciousProcesses = dynamic(["powershell.exe", "cmd.exe", "rundll32.exe", "regsvr32.exe", "certutil.exe"]);
let NetworkTools = dynamic(["rclone.exe", "winscp.exe", "pscp.exe", "sftp.exe"]);
DeviceProcessEvents
| where Timestamp > ago(TimeFrame)
| where ProcessVersionInfoOriginalFileName in (SuspiciousProcesses) or FileName in (NetworkTools)
| where InitiatingProcessFileName in ("explorer.exe", "winword.exe", "excel.exe", "powershell.exe")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName
| order by Timestamp desc
PowerShell Hardening Script
A rapid-response script to enumerate scheduled tasks created or modified in the last 7 days—a common persistence mechanism for Qilin—and check for exposed RDP configurations.
# Check for Scheduled Tasks created/modified in the last 7 days
$DateCutoff = (Get-Date).AddDays(-7)
Write-Host "Checking for Scheduled Tasks modified since $DateCutoff..." -ForegroundColor Yellow
Get-ScheduledTask | ForEach-Object {
$Task = $_
$TaskInfo = $Task | Get-ScheduledTaskInfo
if ($TaskInfo.LastRunTime -gt $DateCutoff -or $TaskInfo.LastTaskResult -ne 0) {
Write-Host "Potential Persistence Detected:" -ForegroundColor Red
Write-Host "Task Name: $($Task.TaskName)"
Write-Host "Last Run: $($TaskInfo.LastRunTime)"
Write-Host "Action: $($Task.Actions.Execute)"
Write-Host "--------------------------------"
}
}
# Check for Active RDP Sessions (Sign of lateral movement)
Write-Host "Checking for active RDP sessions..." -ForegroundColor Yellow
$queryUser = query user
if ($queryUser) {
Write-Host $queryUser
} else {
Write-Host "No active RDP sessions found." -ForegroundColor Green
}
Incident Response Priorities
Based on Qilin's current playbook involving rapid data exfiltration and encryption:
-
T-minus Detection Checklist:
- Inspect ConnectWise ScreenConnect logs immediately for
Path Traversalsignatures (CVE-2024-1708). - Hunt for SmarterMail IIS logs indicating unauthorized file uploads or authentication bypasses.
- Look for large-scale data transfers (egress) to non-standard ports or cloud storage IPs.
- Inspect ConnectWise ScreenConnect logs immediately for
-
Critical Assets for Exfiltration:
- Qilin prioritizes Customer Databases (PII), Financial Records (HR/Payroll), and CAD/Blueprint files (Construction sector).
-
Containment Actions:
- Immediate: Isolate internet-facing management servers (ScreenConnect, RDP gateways) from the internal network.
- Urgent: Revoke all API keys and administrative credentials associated with email gateways if SmarterMail exploitation is suspected.
- Secondary: Force-reset passwords for all service accounts used for scheduled tasks.
Hardening Recommendations
Immediate (24 Hours):
- Patch Critical Vulnerabilities: Apply patches for CVE-2024-1708 (ScreenConnect), CVE-2025-52691, and CVE-2026-23760 (SmarterMail) immediately. If patching is impossible, disable the services or restrict access to specific source IPs via firewall.
- Disable Public RDP: Ensure RDP (TCP 3389) is not exposed to the internet. Enforce MFA for all remote access solutions.
Short-term (2 Weeks):
- Network Segmentation: Separate IT management infrastructure from user data segments. Prevent a compromised ScreenConnect server from being a pivot point to the entire domain.
- Web Application Firewall (WAF): Deploy or tune WAF rules to specifically block known exploit patterns for ScreenConnect and Exchange.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.