Aliases: Agenda (historical), Qilin.B
Operating Model: RaaS (Ransomware-as-a-Service). Qilin operates an affiliate-based model, providing a custom Go/Rust-based encryptor to partners. They are known for aggressive "double extortion" tactics, threatening data leaks alongside encryption.
Ransom Demands: Historically variable, ranging from $200,000 to multi-million dollars depending on victim revenue. Recent demands on mid-market Construction and Business Services targets suggest an average ask of $500k–$800k.
Initial Access Vectors: Qilin affiliates aggressively weaponize known vulnerabilities in remote access and email infrastructure. The current campaign shows a heavy reliance on:
- Exploited Public-Facing Applications: Specifically ConnectWise ScreenConnect (CVE-2024-1708) and SmarterTools SmarterMail (CVE-2025-52691, CVE-2026-23760).
- Valid Credentials: Phishing for VPN/RDP credentials remains a staple for persistence.
Double Extortion: Standard practice. Victims are given a short window (usually 3-7 days) to pay before data is published on their .onion site.
Dwell Time: Short. When exploiting CVEs like ScreenConnect, Qilin affiliates often move to encryption within 48–72 hours of initial access.
Current Campaign Analysis
Campaign Overview: As of 2026-05-21, Qilin has posted 27 new victims. The tempo indicates a high-volume, automated affiliate operation.
Targeted Sectors:
- Construction & Trades (38%): Heavy targeting of engineering firms (CJ Architects), industrial flooring (RCR), and specialized trade contractors (HVAC, Drywall, Stucco).
- Business Services (25%): Professional services and B2B support organizations.
- Critical Infrastructure Adjacent: Agriculture (Vial Agro, Fruits Queralt) and Healthcare (Salter HealthCare).
Geographic Distribution:
- Primary: United States (US), United Kingdom (GB).
- Secondary: Canada (CA), Australia (AU), New Zealand (NZ), and Europe (AT, CZ, AR).
Victim Profile: The victims are predominantly mid-market enterprises (SMEs). These organizations typically have IT budgets sufficient for enterprise software (ScreenConnect, Exchange, SmarterMail) but often lag in patch management, making them ideal targets for N-day vulnerability exploitation.
Observed TTPs & CVE Correlation: There is a direct correlation between the recent spike in victims and the exploitation of CVE-2024-1708 (ConnectWise ScreenConnect) and SmarterMail vulnerabilities. Qilin affiliates are scanning for exposed management interfaces and deploying webshells for immediate execution.
Detection Engineering
SIGMA Rules
title: Potential Qilin ScreenConnect Webshell Activity CVE-2024-1708
id: 9c8e2a1d-f4e5-4c88-9b12-a5c0d3f8e9a1
description: Detects potential webshell activity or suspicious authentication bypass patterns associated with CVE-2024-1708 on ConnectWise ScreenConnect servers.
status: experimental
date: 2026/05/21
author: Security Arsenal Research
references:
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
logsource:
product: windows
service: security
detection:
selection:
EventID: 5140 or 5145
ShareName|contains: 'ScreenConnect'
RelativeTargetName|contains:
- 'Web.config'
- '.aspx'
- '.ashx'
condition: selection
falsepositives:
- Legitimate administrative updates
level: high
tags:
- attack.initial_access
- attack.t1190
- cve.2024.1708
- ransomware.qilin
---
title: SmarterMail Unrestricted File Upload Exploitation Attempt
id: b7d3e4f1-2a6c-4d8b-9e0f-1a2b3c4d5e6f
description: Detects suspicious file upload patterns or authentication bypass indicators associated with SmarterMail CVE-2025-52691 exploited by Qilin affiliates.
status: experimental
date: 2026/05/21
author: Security Arsenal Research
logsource:
product: web server
detection:
selection_uri:
cs-uri-query|contains:
- 'aspx/\.asmx'
- 'Services/Mail.asmx'
selection_method:
cs-method: 'POST'
selection_ext:
cs-uri-query|contains:
- '.dll'
- '.aspx'
- '.ashx'
condition: all of selection_*
falsepositives:
- Legitimate SmarterMail API usage
level: high
tags:
- attack.initial_access
- attack.t1190
- cve.2025.52691
- ransomware.qilin
---
title: Qilin Ransomware Process Execution Patterns
description: Detects suspicious process execution patterns consistent with Qilin ransomware activity, including disabling of security services and shadow copy deletion.
status: experimental
date: 2026/05/21
author: Security Arsenal Research
logsource:
category: process_creation
detection:
selection_vss:
CommandLine|contains: 'delete shadows /all /quiet'
selection_backup:
Image|endswith:
- '\\wbadmin.exe'
- '\\veeam.exe'
CommandLine|contains: 'delete'
selection_qilin_crypto:
Image|endswith: '.exe'
CommandLine|contains: '-m crypto' # Observed in some Qilin variants
condition: 1 of selection_*
falsepositives:
- Legitimate system administration
level: critical
tags:
- attack.impact
- attack.t1486
- ransomware.qilin
KQL (Microsoft Sentinel)
// Hunt for lateral movement and staging indicative of Qilin pre-encryption
DeviceProcessEvents
| where Timestamp >= ago(7d)
// Look for common tools used by Qilin for lateral movement
| where FileName in~ (\"psexec.exe\", \"psexec64.exe\", \"wmic.exe\", \"powershell.exe\", \"cmd.exe\")
// Filter for suspicious command line arguments
| where ProcessCommandLine has_any (\"-i\", \"-s\", \"-accepteula\", \"process call\", \"create\", \"Invoke-Expression\", \"IEX\")
// Correlate with network connections to non-standard ports
| join kind=inner (DeviceNetworkEvents
| where Timestamp >= ago(7d)
| where RemotePort in (445, 135, 139, 3389, 5985, 5986)
| summarize Count=count() by DeviceId, RemoteIP, RemotePort
| where Count > 10) on DeviceId
| project Timestamp, DeviceName, FileName, ProcessCommandLine, RemoteIP, RemotePort, InitiatingProcessFileName
PowerShell Hardening Script
# Qilin Response Hardening: Audit Scheduled Tasks and Web Shells
# Run as Administrator
Write-Host \"[+] Initiating Qilin Hardening Audit...\" -ForegroundColor Cyan
# 1. Check for recently modified Scheduled Tasks (common for persistence)
Write-Host \"[*] Checking for Scheduled Tasks modified in the last 7 days...\" -ForegroundColor Yellow
$dateThreshold = (Get-Date).AddDays(-7)
Get-ScheduledTask | Where-Object { $_.Date -gt $dateThreshold } | Select-Object TaskName, Date, Author, Actions | Format-Table -AutoSize
# 2. Scan for suspicious ASPX/ASHX files in web roots (SmarterMail/ScreenConnect webshell indicators)
Write-Host \"[*] Scanning common web directories for recently created web shells (ASPX/ASHX)...\" -ForegroundColor Yellow
$webPaths = @(
\"C:\\inetpub\\wwwroot\",
\"C:\\Program Files\\ConnectWise\\ScreenConnect\",
\"C:\\Program Files (x86)\\SmarterTools\\SmarterMail\"
)
foreach ($path in $webPaths) {
if (Test-Path $path) {
Write-Host \"Scanning $path...\" -ForegroundColor Gray
Get-ChildItem -Path $path -Recurse -Include *.aspx, *.ashx, *.asmx -ErrorAction SilentlyContinue |
Where-Object { $_.LastWriteTime -gt $dateThreshold -and $_.Length -lt 50kb } |
Select-Object FullName, LastWriteTime, Length
}
}
Write-Host \"[+] Audit Complete.\" -ForegroundColor Green
---
Incident Response Priorities
T-Minus Detection Checklist (Pre-Encryption):
- Remote Access Logs: Immediately review ConnectWise ScreenConnect logs for the "Login" event with suspicious UserAgents or empty UserAgents (indicator of CVE-2024-1708 exploitation).
- Web Server Logs: Check IIS/SmarterMail logs for
POSTrequests toServices/Mail.asmxor abnormalasp.netrequests leading to 200 OK statuses. - Volume Shadow Copies: Monitor for rapid deletion of VSS copies using
vssadminorwmic.
Critical Assets for Exfil: Based on the current Construction and Agriculture victims, Qilin targets:
- CAD/Project Files: AutoCAD drawings, blueprints, and project specifications.
- HR & Payroll: Employee SSNs and banking details.
- Client Databases: CRM systems containing PII of end-customers.
Containment Actions (Ordered by Urgency):
- Isolate: Disconnect internet access from all ScreenConnect and VPN jump servers immediately.
- Suspend: Suspend service accounts associated with SmarterMail and Exchange until patches are verified.
- Credential Reset: Force reset of all local administrator and domain admin credentials (assume they are cached or stolen).
Hardening Recommendations
Immediate (24 Hours):
- Patch CVE-2024-1708: Apply the ConnectWise ScreenConnect patch immediately or restrict access to the management interface via VPN/IP allow-listing.
- Patch SmarterMail: Update SmarterMail to the latest secure version to address CVE-2025-52691 and CVE-2026-23760.
- MFA Enforcement: Ensure all remote access (VPN, RDP, ScreenConnect) is protected by FIDO2 or hardware token MFA.
Short-term (2 Weeks):
- Network Segmentation: Move management interfaces (ScreenConnect, RDP) to a dedicated management VLAN that is inaccessible from the general corporate network.
- EDR Tuning: Update EDR rules to specifically flag processes spawned from
ScreenConnect.ServiceorSmarterMail.Servicebinaries that are not the standard application executables.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.