One phished admin, a dozen victims: Ransomware multiplier.


Qilin isn’t the biggest name in ransomware history, but in 2024–2025 it’s the one that kept showing up where it hurts. When the group (aka Agenda) hit Synnovis the lab provider for major London hospitals in June 2024, thousands of procedures were postponed, hundreds of gigabytes of patient data surfaced online, and UK authorities later confirmed the attack contributed to a patient’s death (a grim first for the NHS). Estimated cost to the provider: about £32.7 million. This is what “operational pressure” really looks like when a threat group picks a choke point.
Qilin’s victims span awkward places for public sympathy and business continuity: Court Services Victoria in Australia warned that weeks of court-hearing recordings were exposed (imagine the privacy fallout for witnesses and defendants); Cobb County, Georgia faced threats to dump 150 GB / 400k files (officials disputed the scope while confirming a breach classic claims-vs-confirmation theatre); Yanfeng, a Tier-1 auto supplier, was knocked hard enough that downstream production felt it and litigation followed; even UK charity The Big Issue saw ~550 GB of sensitive data paraded as proof. The thread through all of these: Qilin excels at turning other people’s stakeholders into leverage.
What makes Qilin different (and dangerous)
1) An extortion machine with a PR arm.
Qilin runs a conventional Tor leak site and promotes a cheekily named “WikiLeaksV2” mirror aimed at amplifying pressure outside the dark web. In 2025, researchers also flagged a new “Call Lawyer” feature inside the victim chat portal, affiliates can summon a “legal advisor” to rattle off regulatory exposure and raise perceived risk. It’s theatre, but effective theatre.
2) Hostile to your virtualisation spine.
Trend Micro’s reverse-engineering shows Qilin’s Rust variant can propagate across vCenter/ESXi, change ESXi root passwords, terminate VM clusters, and even print ransom notes on your office printers. If your business lives on ESXi, this turns a ransomware incident into a full-on infrastructure outage.
3) Supply-chain blast radius via RMM.
In early 2025, a Qilin affiliate phished an MSP’s ScreenConnect admin with an adversary-in-the-middle kit, grabbed MFA tokens, pushed an attacker-controlled RMM, raided backups, exfiltrated archives via public file-sharing, and then rolled Qilin across downstream customers, each with a unique binary password and chat ID. This is why one compromised admin can turn into twenty “separate” incidents by Monday.
4) Keen on edge-device entry (Fortinet).
Multiple teams reported Qilin actively exploiting critical FortiOS/FortiProxy flaws this summer (including auth-bypass and RCE bugs). If you’ve got aging SSL-VPN gear hanging off the perimeter, patching and segmentation aren’t optional.
5) A loader stack built for stealth and speed.
Qilin activity has leveraged SmokeLoader and a heavily obfuscated NETXLOADER to stage payloads in memory and confuse static detection. The campaign telemetry in Q1–Q2 2025 spanned healthcare, tech, finance and telecom, consistent with the victim mix trackers have been seeing.
6) Cross-pollination with state actors.
Since February 2025, Microsoft has observed North Korea’s Moonstone Sleet deploying Qilin in limited attacks, an unusual swap-in of a RaaS payload by a state-aligned crew. Translation: techniques and infrastructure from crimeware and APT worlds are blurring further.
7) Volume and momentum.
By mid-2025, independent tracking consistently placed Qilin among the most active crews, topping some quarterly counts by victim postings. Here is a roundup of trends seen so far in 2025 for some of the major players in ransomware attacks.
A plausible “first 24 hours” if Qilin lands in your network
(Summary based on incident reports and malware analysis.)
Initial access via a phished admin on a remote-access or RMM portal; adversary-in-the-middle kit steals session cookies and TOTP to defeat MFA. New ScreenConnect/AnyDesk sessions appear that your IT team didn’t deploy.
Enumeration & staging: PsExec/WinRM light up; Veeam creds are scraped to map and neutralize backups; large RAR archives start building in temp paths. Exfiltration goes to disposable easyupload-style services.
Virtualization hit: VM clusters stop behaving; ESXi hosts reject your root password (actors changed it); SSH suddenly enabled on hosts.
Impact: Windows endpoints boot to Safe Mode with Networking; VSS is wiped; event logs cleared; a unique per-victim Qilin binary runs with a password parameter.
Extortion pressure: ransom notes print on physical printers; the negotiation portal references a clear-web leak mirror and hints at regulatory blowback, now with a “lawyer” on call.
Subscribe to my newsletter
Read articles from Shak directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
