Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Qilin Ransomware Activity Surges as Attacks Target Small Businesses
News

Qilin Ransomware Activity Surges as Attacks Target Small Businesses

Team-CWDBy Team-CWDNovember 11, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A rise in ransomware incidents linked to the Qilin ransomware group, one of the longest-running ransomware-as-a-service (RaaS) operations, has been observed by cybersecurity researchers.

According to S-RM’s latest intelligence, Qilin continues to exploit weaknesses such as unpatched VPN appliances, lack of multi-factor authentication (MFA) and exposed management interfaces to gain initial access to corporate networks.

In an advisory published on Monday, the firm noted that while major breaches, such as the 2024 Synnovis attack on UK healthcare systems, drew widespread attention, most of Qilin’s victims are small-to-medium-sized businesses in the construction, healthcare and financial sectors.

Growing Collaboration Among Cybercrime Groups

Although Qilin has been active for several years, it has largely avoided widespread publicity.

S-RM has now observed that affiliates of the Scattered Spider group are deploying Qilin’s RaaS platform, suggesting deeper collaboration between prominent cybercrime organizations.

Key findings from S-RM’s investigation show that Qilin has operated as a RaaS group since 2023, leasing its tools and infrastructure to affiliates.

The study also showed that initial access is typically gained through unpatched VPNs or single-factor remote access tools.

Additionally, S-RM noted that in 2025, 88% of observed Qilin cases involved both data theft and file encryption, with victims’ data published on dark-web leak sites if no ransom was paid.

Qilin had also begun experimenting with new extortion channels, including Telegram and public sites such as WikiLeaksV2.

Read more on ransomware-as-a-service trends: Ransomware Group Uses AI Chatbot to Intensify Pressure on Victims

A Tech Business, Not Just Hackers

“Qilin is part of a new generation of ransomware groups that operate more like tech businesses than hackers,” said Ted Cowell, head of cybersecurity UK at S-RM.

“Their affiliates rent the tools, share the profits and constantly test new ways to break into networks.”

Cowell added that Qilin’s quiet operations make it particularly dangerous.

“It doesn’t always grab headlines, but it’s increasingly being used by other threat groups, including Scattered Spider […]. That makes attribution harder and defense even more complex,” he explained.

S-RM also emphasized that many breaches still originate from basic security gaps.

To mitigate risks, the firm urges all organizations to:

  • Regularly patch and update VPNs and remote access devices

  • Apply MFA to all accounts

  • Limit or remove exposed management interfaces

  • Segment networks to isolate critical systems

  • Monitor proactively for lateral movement or signs of intrusion

S-RM’s findings highlight the growing professionalism of ransomware networks and the continued need for strong cyber-hygiene across all sectors.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea
Next Article Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Data
Team-CWD
  • Website

Related Posts

News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Find your weak spots before attackers do

November 21, 2025

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

What parents should know to protect their children from doxxing

November 28, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.