Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Malta’s growing resilient semiconductor ecosystem

RSPCA calls for greater transparency in animal testing

Awab law is enforced to protect tenants

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Qilin ransomware, a hybrid attack that combines Linux payload and BYOVD exploit
Identity

Qilin ransomware, a hybrid attack that combines Linux payload and BYOVD exploit

userBy userOctober 27, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Qilin ransomware

The ransomware group known as Qilin (also known as Agenda, Gold Feather, and Water Galura) has claimed more than 40 victims every month since the beginning of 2025, with the exception of January, and the number of posts on the data breach site reached a high of 100 in June.

The development comes as ransomware-as-a-service (RaaS) operations have emerged as one of the most active ransomware groups, with 84 victims each in August and September 2025. Qilin is known to have been active since around July 2022.

According to data compiled by Cisco Talos, some of the countries most affected by Qilin are the United States, Canada, the United Kingdom, France, and Germany. Attacks primarily targeted the manufacturing (23%), professional and scientific services (18%), and wholesale trade (10%) sectors.

Attacks launched by Qilin affiliates may have leveraged administrator credentials leaked on the dark web to perform initial access using a VPN interface, followed by RDP connections to domain controllers and successfully compromised endpoints.

DFIR retainer service

In the next phase, the attackers performed system reconnaissance and network discovery actions to map the infrastructure, ran tools such as Mimikatz, WebBrowserPassView.exe, BypassCredGuard.exe, and SharpDecryptPwd to facilitate collection of credentials from various applications, and used Visual Basic scripts to exfiltrate data to an external SMTP server.

“Commands executed via Mimikatz targeted a variety of sensitive data and system functions, including clearing the Windows event log, enabling SeDebugPrivilege, extracting saved passwords from Chrome’s SQLite database, recovering credentials from previous logons, and collecting credentials and configuration data related to RDP, SSH, and Citrix,” Talos said.

Further analysis revealed that the attackers used mspaint.exe, notepad.exe, and iexplore.exe to inspect files for sensitive information, and a legitimate tool called Cyberduck to transfer the targeted files to a remote server while hiding their malicious activity.

The stolen credentials have been found to enable privilege escalation and lateral movement, and exploit elevated access to install multiple remote monitoring and management (RMM) tools, including AnyDesk, Chrome Remote Desktop, Remote Desktop, GoToDesk, QuickAssist, and ScreenConnect. Talos said it cannot conclusively conclude whether the program was used for lateral movement.

To evade detection, the attack chain includes running PowerShell commands to disable AMSI, turn off TLS certificate validation, and enable limited administration, in addition to running tools such as dark-kill and HRSword to terminate security software. Cobalt Strike and SystemBC are also deployed on the host for persistent remote access.

The infection culminates in the launch of Qilin ransomware. Qilin ransomware encrypts files and drops a ransom note in each encrypted folder, but before doing so it clears event logs and deletes all shadow copies maintained by Windows Volume Shadow Copy Service (VSS).

This finding is consistent with the discovery of sophisticated Qilin attacks that deploy Linux ransomware variants on Windows systems and use a combination of bring-your-own-vulnerable-driver (BYOVD) techniques and legitimate IT tools to bypass security barriers.

“The attackers exploited legitimate tools, specifically installing AnyDesk and executing commands through Atera Networks’ remote monitoring and management (RMM) platform and ScreenConnect. They exploited Splashtop for the final ransomware execution,” Trend Micro said.

“They specifically targeted Veeam backup infrastructure using a specialized credential extraction tool, systematically harvesting credentials from multiple backup databases and compromising the organization’s disaster recovery capabilities before deploying the ransomware payload.”

In addition to using valid accounts to infiltrate target networks, some attacks use spear phishing or fake ClickFix-style CAPTCHA pages hosted on Cloudflare R2 infrastructure to trigger execution of malicious payloads. These pages have been assessed to provide a means to steal the information needed to collect the credentials used to gain initial access.

CIS build kit

Some of the key steps an attacker takes are:

Deploy a SOCKS proxy DLL to facilitate remote access and command execution Abuse ScreenConnect’s remote management capabilities to execute discovery commands and run network scanning tools to identify potential lateral movement targets Target Veeam backup infrastructure to harvest credentials Use the ‘eskle.sys’ driver as part of a BYOVD attack to disable security solutions, terminate processes, and evade detection Deploy PuTTY on Linux SSH clients to facilitate lateral movement into systems Use SOCKS proxy instances between various system directories and obfuscate command and control (C2) traffic with COROXY backdoors Use WinSCP to transfer Linux ransomware binaries to Windows Securely transfer files to your system Run Linux ransomware binaries directly on Windows systems using Splashtop Remote’s management service (SRManager.exe)

“Linux ransomware binaries offered cross-platform capabilities, allowing attackers to use a single payload to affect both Windows and Linux systems in an environment,” Trend Micro researchers noted.

“The updated samples incorporate Nutanix AHV detection and expand targets to include hyperconverged infrastructure platforms, demonstrating that threat actors are moving beyond traditional VMware deployments and adapting to modern enterprise virtualization environments.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleInnovation for a safer food future
Next Article Awab law is enforced to protect tenants
user
  • Website

Related Posts

ChatGPT Atlas browser can be tricked into executing hidden commands with fake URLs

October 27, 2025

Smishing Triad links to 194,000 malicious domains in global phishing operation

October 24, 2025

Critical, newly patched Microsoft WSUS flaw exploited

October 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Malta’s growing resilient semiconductor ecosystem

RSPCA calls for greater transparency in animal testing

Awab law is enforced to protect tenants

Qilin ransomware, a hybrid attack that combines Linux payload and BYOVD exploit

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.