Threat Level: CRITICAL
Date: 2026-04-26
Source: Ransomware.live / Dark Web Leak Sites
Threat Actor Profile — QILIN
Qilin (formerly known as Agenda prior to rebranding) operates a highly aggressive Ransomware-as-a-Service (RaaS) model. The group is distinguished by its use of the Go programming language for cross-platform encryption capabilities, allowing them to target both Windows and Linux environments effectively.
- Operating Model: RaaS with affiliates specializing in initial access vectors.
- Ransom Demands: Highly variable, typically ranging from $500k to $10M, heavily influenced by the victim's revenue and stolen data sensitivity.
- Tactics: Known for double extortion. They aggressively threaten data leaks and utilize DDoS attacks to pressure victims during negotiations.
- Dwell Time: Average dwell time is approximately 3–5 days, though recent observations suggest a "smash-and-grab" trend where encryption occurs within 24 hours of detection to bypass EDR containment.
- Initial Access: Historically relies on phishing, compromised VPN credentials (FortiGate/SSL-VPNs), and recently, exploitation of unpatched edge services (Exchange, Email gateways).
Current Campaign Analysis
Victimology Overview: In the last 48 hours, Qilin has posted a significant volume of victims (15+), marking a spike in activity. The campaign is heavily transcontinental but shows distinct sector convergence.
-
Targeted Sectors:
- Manufacturing (40%): High-value targets including Buckley Powder (explosives/mining), Leistritz Turbine Technology (DE), and notably Denso (JP). Denso represents a critical supply chain risk for the automotive sector.
- Financial Services (20%): Specifically targeting Credit Unions (KEMBA Indianapolis, First County FCU), suggesting a pivot toward financial data exfiltration.
- Agriculture & Food: Cahbo Produkter (SE) and SanCor (AR) indicate a desire to disrupt time-sensitive supply chains.
-
Geographic Concentration: The attack pattern is globally dispersed with heavy concentration in the US, GB, and DACH region (Germany/Sweden).
-
CVE Exploitation & Vectors: Based on the CISA KEV list correlated with recent victim sectors, the following exploitation vectors are highly probable for this campaign:
- CVE-2023-21529 (Microsoft Exchange): Likely used for initial access in business services and manufacturing environments to deploy web shells.
- CVE-2025-52691 & CVE-2026-23760 (SmarterTools SmarterMail): Given the targeting of Credit Unions and Business Services, unauthenticated file upload and auth bypass on email gateways are a primary lateral movement vector.
- CVE-2025-55182 (Meta React Server Components): A newer RCE vulnerability potentially exploited against SaaS-heavy victims to gain a foothold in web-facing infrastructure.
Detection Engineering
SIGMA Rules (YAML)
title: Potential Qilin Ransomware Activity - Exchange Deserialization
description: Detects deserialization exploitation attempts on Microsoft Exchange Server related to CVE-2023-21529 often used by Qilin affiliates.
status: experimental
date: 2026/04/26
author: Security Arsenal
references:
- https://cisa.gov/known-exploited-vulnerabilities-catalog
logsource:
product: windows
service: security
detection:
selection:
EventID: 5140 or 5145
ShareName|contains: 'Exchange'
RelativeTargetName|contains: '..\'
condition: selection
falsepositives:
- Administrative access
level: high
title: SmarterMail Unrestricted Upload and Auth Bypass
description: Detects suspicious file creation patterns associated with CVE-2025-52691 and successful authentication bypass patterns on SmarterMail servers.
status: experimental
date: 2026/04/26
author: Security Arsenal
logsource:
product: web
service: iis
detection:
selection_uri:
cs-uri-query|contains:
- 'UserTicket'
- 'Live.aspx'
selection_ext:
cs-uri-stem|endswith: '.aspx'
selection_status:
sc-status: 200
condition: all of selection_*
falsepositives:
- Legitimate admin access
level: critical
title: Qilin Lateral Movement via PsExec and WMI
description: Detects remote execution patterns used by Qilin for lateral movement prior to encryption.
status: experimental
date: 2026/04/26
author: Security Arsenal
logsource:
product: windows
service: security
detection:
selection_psexec:
EventID: 5145
ShareName: 'IPC$'
RelativeTargetName|contains: 'PSEXESVC'
selection_wmi:
EventID: 4688
NewProcessName|endswith: '\wmiprvse.exe'
CommandLine|contains: '-embedded'
condition: 1 of selection_
falsepositives:
- System administration
level: high
KQL (Microsoft Sentinel)
// Hunt for Qilin Pre-Encryption Staging & Lateral Movement
// Looks for high volume file modifications and PsExec usage within a short timeframe
let TimeFrame = 1h;
DeviceProcessEvents
| where Timestamp > ago(TimeFrame)
| where ProcessName has "psexec.exe" or ProcessName has "wmic.exe" or FileName has "powershell.exe"
| where InitiatingProcessAccountName != "SYSTEM"
| extend HostName = DeviceName
| join (
DeviceFileEvents
| where Timestamp > ago(TimeFrame)
| where ActionType == "FileCreated" or ActionType == "FileModified"
| summarize FileCount = count(), ModifiedFiles = makeset(FileName) by DeviceName, bin(Timestamp, 5m)
) on HostName
| where FileCount > 50
| project Timestamp, HostName, InitiatingProcessAccountName, ProcessCommandLine, FileCount, ModifiedFiles
| order by FileCount desc
PowerShell (Rapid Response)
<#
.SYNOPSIS
Qilin Ransomware Indicator Hunt
.DESCRIPTION
Checks for suspicious Scheduled Tasks (persistence) and Volume Shadow Copy manipulation.
#>
Write-Host "[+] Hunting for Qilin Persistence Indicators..." -ForegroundColor Cyan
# 1. Check for Scheduled Tasks created in the last 7 days
$suspiciousTasks = Get-ScheduledTask | Where-Object {
$_.Date -gt (Get-Date).AddDays(-7) -and
$_.Author -notmatch "Microsoft|System|Admin"
}
if ($suspiciousTasks) {
Write-Host "[WARNING] Detected recently created non-Microsoft Scheduled Tasks:" -ForegroundColor Red
$suspiciousTasks | Select-Object TaskName, Author, Date, Action | Format-Table
} else {
Write-Host "[INFO] No suspicious scheduled tasks found." -ForegroundColor Green
}
# 2. Check for VSS Deletion attempts (Common in Qilin playbook)
Write-Host "[+] Checking Event Logs for VSS Deletion (Event ID 1234/etc)..." -ForegroundColor Cyan
$vssEvents = Get-WinEvent -FilterHashtable @{LogName='Application'; ID=1234; StartTime=(Get-Date).AddHours(-24)} -ErrorAction SilentlyContinue
if ($vssEvents) {
Write-Host "[CRITICAL] Volume Shadow Copy Deletion detected!" -ForegroundColor Red
} else {
Write-Host "[INFO] No VSS deletion events found in the last 24h." -ForegroundColor Green
}
---
Incident Response Priorities
T-Minus Detection Checklist (Pre-Encryption):
- Exchange Server Logs: Hunt for
CmdletorServerobject deserialization errors (Event ID 4001 in MSExchange Management or similar). - Web Server Artifacts: Scan IIS logs for SmarterMail
UserTicketanomalies or largePOSTrequests resulting in 200 OK statuses. - Phishing Inbox: Quarantine and inspect emails containing malicious macros or links associated with recent campaign lures.
Critical Asset Prioritization for Exfiltration:
- Manufacturing: CAD drawings, proprietary schematics (IP theft), and ERP databases (SAP/Oracle).
- Financial: Customer PII, SSNs, transaction logs, and ACH routing files.
Containment Actions (Order of Urgency):
- Isolate: Immediately disconnect Exchange and Email Gateway servers from the network if anomalies are detected.
- Revoke: Reset credentials for service accounts associated with the identified victims (especially if VPN access was used).
- Block: Implement firewall rules blocking outbound C2 traffic (Qilin often uses Cobalt Strike beacons).
Hardening Recommendations
Immediate (Within 24 Hours):
- Patch Management: Apply patches for CVE-2023-21529 (Exchange) and CVE-2025-52691 (SmarterMail) immediately. These are confirmed active exploitation paths.
- Network Segmentation: Ensure email servers are in a distinct VLAN with strict egress rules; they should not be able to initiate RDP/WinRM to internal workstations.
- MFA Enforcement: Enforce phishing-resistant MFA (FIDO2) on all VPN and OWA portals.
Short-Term (Within 2 Weeks):
- Edge Security: Deploy Web Application Firewalls (WAF) with specific signatures for SmarterMail and Exchange deserialization attacks.
- EDR Tuning: Configure EDR to alert on
PsExec,WMIremote execution, and unexpected PowerShell child processes from web server services.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.