Date: 2026-05-08 Source: Ransomware.live Live Feed Analyst: Security Arsenal Intel Team
Threat Actor Profile — QILIN
- Aliases: Agenda, Qilin
- Operational Model: Ransomware-as-a-Service (RaaS). The group operates an affiliate-driven model, recruiting skilled access brokers to breach networks before deploying the encryptor.
- Ransom Demands: Typically varies between $500,000 and $5 million USD depending on victim revenue. They are known for aggressive negotiation tactics.
- Initial Access Vectors: Historically relies on phishing campaigns with macros, exploitation of exposed VPN services (e.g., FortiGate, Pulse Secure), and recently, a heavy pivot towards exploiting unpatched external-facing services like Microsoft Exchange and edge firewalls.
- Extortion Strategy: Strict "Double Extortion" model. Victims are given a short countdown (usually 3-7 days) before sensitive data (CAD drawings, financial records, client PII) is leaked on their .onion site.
- Average Dwell Time: Approximately 4 to 10 days. Qilin affiliates typically spend time enumerating Active Directory and exfiltrating large volumes of data before detonating the payload.
Current Campaign Analysis
Based on the last 100 postings and activity through 2026-05-08:
Sector Targeting
The campaign shows a distinct pivot towards industrial and professional services.
- Top Targets: Manufacturing (20%), Construction (20%), Business Services (13%), Technology (13%).
- Notable Victims:
- Exco Technologies (CA): Manufacturing—CAD systems likely targeted for IP theft.
- Fogel Capital Management (US): Financial Services—high value for sensitive data exfiltration.
- CCD Interiors & DL Cohen Construction (GB/US): Construction—targeting project blueprints and contracts.
Geographic Concentration
- Primary Zones: North America (US, CA, MX) and Europe (GB, DE, ES).
- Observation: While US and UK entities are prime targets, there is a noticeable expansion into Latin America (Argentina, Chile, Brazil), suggesting affiliates are leveraging language-specific phishing lures or scanning for exposed infrastructure in these regions.
Campaign Velocity
- Frequency: High intensity. The group posted 8 victims on 2026-05-08 alone, indicating multiple simultaneous intrusions or a backlog of "processed" victims.
- CVE Linkage: There is a high correlation between the recent victims and the actively exploited CVEs listed in CISA KEV.
- CVE-2023-21529 (Exchange): Likely used for the Business Services and Technology victims (e.g., CAD-IT UK, Time-Cap Labs) who rely heavily on email servers.
- CVE-2026-20131 (Cisco FMC): Critical for the Transportation/Logistics sector, where Cisco firewall management consoles are frequently internet-exposed for remote management.
Detection Engineering
The following detection logic targets Qilin's specific TTPs observed in this campaign, focusing on the exploit vectors (Exchange/Cisco) and their lateral movement/pre-encryption behavior.
SIGMA Rules
---
title: Potential Qilin Initial Access - Exchange Deserialization Exploit
description: Detects exploitation attempts of Microsoft Exchange deserialization vulnerabilities (CVE-2023-21529) often used by Qilin for initial access.
status: experimental
date: 2026/05/08
references:
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
logsource:
product: windows
service: security
detection:
selection:
EventID: 5140 or 5145
ShareName|contains: 'Exchange'
RelativeTargetName|contains: '.dll'
condition: selection
falsepositives:
- Administrative Exchange maintenance
level: critical
---
title: Qilin Lateral Movement - PsExec and WMI Execution
description: Detects the use of PsExec or WMI for lateral movement, a hallmark of Qilin affiliates moving from the initial jump host to domain controllers.
status: experimental
date: 2026/05/08
logsource:
product: windows
service: security
detection:
selection_psexec:
EventID: 5145
ShareName: 'ADMIN$'
RelativeTargetName|endswith: 'PSEXESVC.exe'
selection_wmi:
EventID: 4688
NewProcessName|endswith:
- '\wmiprvse.exe'
- '\scrcons.exe'
CommandLine|contains: 'Invoke-CimMethod'
condition: 1 of selection_*
falsepositives:
- Legitimate system administration
level: high
---
title: Ransomware Pre-Encryption - Volume Shadow Copy Deletion
description: Detects commands used to delete Volume Shadow Copies to prevent recovery, seen immediately before Qilin encryption begins.
status: experimental
date: 2026/05/08
logsource:
product: windows
service: process_creation
detection:
selection:
Image|endswith:
- '\vssadmin.exe'
- '\wbadmin.exe'
CommandLine|contains:
- 'delete shadows'
- 'delete catalog'
condition: selection
falsepositives:
- Backup system maintenance (rare)
level: critical
KQL (Microsoft Sentinel)
// Hunt for Qilin pre-encryption staging and lateral movement
// Looks for large file modifications followed by VSS deletion within a short timeframe
let FileStaging = DeviceFileEvents
| where Timestamp > ago(24h)
| where FileName endswith ".qilin" or FileName endswith ".encrypted" // Known extensions or generic mass encryption
| summarize arg_max(Timestamp, *) by DeviceId, FileName;
DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any ("delete shadows", "delete catalog") and FileName in~ ("vssadmin.exe", "wbadmin.exe")
| join kind=inner FileStaging on DeviceId
| project Timestamp, DeviceName, FileName, ProcessCommandLine, InitiatingProcessAccountName
| order by Timestamp desc
PowerShell Response Script
# Qilin Rapid Response Check
# 1. Check for recently created Scheduled Tasks (Persistence)
# 2. Check for 'Qilin' named processes or unusual encrypted files
Write-Host "[*] Checking for Scheduled Tasks created in last 48 hours..." -ForegroundColor Cyan
Get-ScheduledTask | Where-Object {$_.Date -gt (Get-Date).AddDays(-2)} | Select-Object TaskName, Date, Author, Actions
Write-Host "[*] Scanning for Qilin Ransomware Processes..." -ForegroundColor Cyan
$processes = @("Qilin", "point", "locker")
Get-Process | Where-Object { $processes -contains $_.ProcessName } | Select-Object ProcessName, Id, CPU
Write-Host "[*] Checking for VSS Admin recent executions..." -ForegroundColor Cyan
Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4688; StartTime=(Get-Date).AddHours(-6)} -ErrorAction SilentlyContinue |
Where-Object {$_.Message -like '*vssadmin*' -and $_.Message -like '*delete*'} |
Select-Object TimeCreated, Message
---
Incident Response Priorities
If you suspect Qilin activity, execute the following immediately:
-
T-Minus Detection Checklist:
- Check IIS logs on Exchange servers for anomalous POST requests to
/ecp/or/owa/(deserialization attempts). - Monitor for mass file renaming operations in
\Users\and shared drives. - Hunt for PsExec service installations (
PSEXESVC.exe) on domain controllers.
- Check IIS logs on Exchange servers for anomalous POST requests to
-
Critical Assets for Exfil:
- Manufacturing: Product designs (CAD/CAM files), Intellectual Property, Supply Chain contracts.
- Construction: Project blueprints, bidding documents, client financial data.
- Financial: Investor data, AML reports, transaction histories.
-
Containment Actions:
- Immediately disconnect Exchange and VPN infrastructure from the internet if patching status for CVE-2023-21529 / CVE-2026-20131 is unknown.
- Disable the accounts of any users found in the VSS deletion logs (usually compromised service accounts).
- Suspend all non-essential scheduled tasks pending review.
Hardening Recommendations
Immediate (24 Hours)
- Patch Critical CVEs: Immediately apply patches for CVE-2023-21529 (Exchange), CVE-2026-20131 (Cisco FMC), and CVE-2026-23760 (SmarterMail). These are confirmed active vectors.
- Internet-Facing Hygiene: Block internet access to management interfaces (RDP-3389, SSH-22, Cisco FMC UI) from untrusted IPs via firewall ACLs.
Short-term (2 Weeks)
- Network Segmentation: Isolate CAD/Design servers and Exchange servers from the general user network to prevent lateral movement.
- MFA Enforcement: Enforce FIDO2/WebAuthn MFA for all VPN and remote access solutions. Phishing-resistant MFA prevents the credential theft component of their access.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.