Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
Qilin Ransomware Escalates Attacks with Linux Payload and BYOVD Exploit
Advertisements

The ransomware group known as Qilin, which also operates under the aliases Agenda, Gold Feather, and Water Galura, has intensified its operations by employing a hybrid attack strategy. This method combines a Linux payload with a Bring Your Own Vulnerable Driver (BYOVD) exploit. Active since approximately July 2022, the ransomware-as-a-service (RaaS) operation has emerged as one of the most active threat groups of 2025.

Qilin’s Prolific Campaign in 2025

Qilin’s data leak site reveals a significant surge in activity throughout 2025. The group claimed over 40 victims every month of the year, with the exception of January. This activity reached a peak in June with 100 posted cases and remained high with 84 victims documented in both August and September. According to data compiled by Cisco Talos, Qilin’s campaigns have disproportionately affected specific countries and sectors. The most impacted nations include the U.S., Canada, the U.K., France, and Germany. The attacks have primarily targeted the manufacturing sector, which accounts for 23% of victims, followed by professional and scientific services at 18%, and wholesale trade at 10%.

Initial Access and Attack Methodology

The initial access vector for attacks conducted by Qilin affiliates involves the use of leaked administrative credentials. These credentials, obtained from the dark web, are leveraged to gain entry through a VPN interface. Following the initial breach, the attackers proceed by establishing Remote Desktop Protocol (RDP) connections to the domain. This established foothold allows for the deployment of their ransomware payload. This multi-stage process underscores the group’s methodical approach to network infiltration before executing the final ransomware attack, which leverages the combination of a Linux-based payload and a BYOVD exploit to maximize impact and evade security measures.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading