Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

One corner that generates revenue in the energy market is well maintained

Police say two students turned themselves back after a fatal stab wound outside a California high school

The documentary sheds light on Biden’s reaction to the murder of Shireen Abuakure | News in the Occupy West Bank

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Qilin ransomware ranked best in April 2025 with over 45 data leak disclosures
Identity

Qilin ransomware ranked best in April 2025 with over 45 data leak disclosures

userBy userMay 8, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 8, 2025Ravi LakshmananThreat Intelligence/Ransomware

Netxloader Malware

Threat actors with ties to the Qilin Ransomware family leveraged malware known as Smokeloader, along with a previously undocumented .NET compiled Loader CodeNead NetxLoader, as part of a campaign observed in November 2024.

“Netxloader is a new .NET-based loader that plays a key role in cyberattacks,” Trend Micro researchers Jacob Santos, Raymart Yanbot, John Reinienabat, Sarah Pearl Camilling and Nell Joan Nathaniel Aguas said in an analysis Wednesday.

“While hidden, it secretly deploys additional malicious payloads such as agenda ransomware and smoke loaders. NetxLoaders protected by .NET Reactor 6 are difficult to analyze.”

Qilin, also known as the agenda, has been an aggressive ransomware threat since it emerged in the threat landscape in July 2022. Last year, cybersecurity company Halcyon discovered an improved version of the ransomware named Qilin.B.

Cybersecurity

Recent data shared by Group-IB shows that Qilin’s data leak site disclosure has more than doubled since February 2025, becoming the top ransomware group in April, surpassing other players such as Akira, Play and Lynx.

“From July 2024 to January 2025, Qilin affiliates did not disclose more than 23 companies per month,” the Singapore cybersecurity company said later last month. “but, […] Since February 2025, the volume of disclosure has increased significantly, up from 48 in February, 44 in March, and 45 in April. ”

Qilin ransomware

It is also said that Giraffe benefited from an influx of affiliate marketing following a sharp shutdown of Ransom Hub earlier last month. According to Flashpoint, Ransomhub is the second most active ransomware group in 2024, claiming 38 casualties in the financial sector between April 2024 and April 2025.

“Agenda ransomware activity was observed primarily in the healthcare, technology, financial services and telecommunications sectors,” according to Trend Micro data in the first quarter of 2025.

Netxloader said it is a highly obfuscated loader designed to launch next stage payloads obtained from external servers (e.g. bloglake7[.]CFD), used to drop smoke rackers and agenda ransomware.

Protected by .NET Reactor Version 6, it incorporates numerous tricks to bypass traditional detection mechanisms, resisting analytical efforts such as the use of just-in-time (JIT) hooking techniques, seemingly meaningless method names, and cause of control flow.

Cybersecurity

“Using NetxLoader operators is a huge leap in how malware is delivered,” Trend Micro said. “We’re using a heavily obfuscated loader that hides the actual payload. This means we can’t know what it really is without running the code and analyzing it in memory. Even string-based analysis is useless as obfuscation usually scrambles cues that reveal the identity of the payload.”

The attack chain is known to use valid accounts and phishing as initial access vectors to drop NetXLoader, deploying the Smoker to the host. The Smokeloader malware performs a series of steps to perform virtualization and sandbox avoidance, and terminates the hard coding list of running processes at the same time.

In the final stage, Smokeloader establishes contact with the Command and Control (C2) server to obtain the NetxLoader and launches the agenda ransomware using a technique known as reflective DLL loading.

“The Agenda Ransomware Group is continuously evolving by adding new features designed to cause confusion,” the researchers said. “Its diverse targets include domain networks, mounted devices, storage systems, and vCenter ESXI.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleStanchart analyst apologises for calling a $120,000 Bitcoin price “Too Low”
Next Article SONICWALL Patch 3 flaws in SMA 100 devices allow attackers to execute code as root
user
  • Website

Related Posts

Over 38,000 Freedrain subdomains have been discovered after exploiting SEO to steal crypto wallet seed phrases

May 8, 2025

SONICWALL Patch 3 flaws in SMA 100 devices allow attackers to execute code as root

May 8, 2025

Security tools alone won’t protect you – the control effect

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

One corner that generates revenue in the energy market is well maintained

Police say two students turned themselves back after a fatal stab wound outside a California high school

The documentary sheds light on Biden’s reaction to the murder of Shireen Abuakure | News in the Occupy West Bank

Key Takeout: Documentary name is Al Jazeera’s Abuakure Murderer | Crime News

Trending Posts

The documentary sheds light on Biden’s reaction to the murder of Shireen Abuakure | News in the Occupy West Bank

May 8, 2025

Key Takeout: Documentary name is Al Jazeera’s Abuakure Murderer | Crime News

May 8, 2025

US-UK Trade Contract: How is Trump’s global tariff talks formed? | International Trade News

May 8, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Health Technology Startup Kouper emerges from $10 million stealth in funding to transform the patient care transition

Did Figma kill Webflow and Framer with the release of the Figma site?

Metaworld Congress 2025: Madrid Takes Center Stage in Digital Innovation

Coinbase wins DeRibit for $2.9 billion and earns a major push to crypto derivatives

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.