Researchers warn of Qilin ransomware gang after group hit hundreds of orgs this year

The Qilin ransomware gang has emerged as one of the most active cybercriminal operations in 2025, listing hundreds of victims throughout the year that include large companies, local governments and hospitals.

In October alone, the suspected Russia-based group added more than 185 victims to its leak site — claiming to be behind recent cybersecurity incidents at Japanese beverage giant Asahi, the Texas city of Sugar Land, a county government in North Carolina and multiple power companies in Texas.

Incident responders at cybersecurity firm Cisco Talos published a study of the group this weekend, warning that in the second half of 2025, Qilin has published the information of about 40 victims per month. 

The group has existed since July 2022 but expanded its operations in the last few years, now operating through the ransomware-as-a-service (RaaS) business model. 

Nearly a quarter of the group’s attacks impact the manufacturing sector, with another 18% of attacks hitting the professional and scientific services industry and 10% of attacks targeting wholesale trade firms.

Cisco Talos said it has responded to multiple incidents involving Qilin but is unable to identify a singular intrusion technique used in each attack. In many cases, the attackers used stolen administrative credentials found on the dark web — allowing them to access VPNs. 

Cybersecurity research firm Comparitech tracked more than 700 Qilin attacks in 2025, with 118 being confirmed. About half of the attacks targeted the U.S., while France, Canada, South Korea and Spain also had a large proportion of organizations that dealt with Qilin incidents. 

Rebecca Moody, head of data research at Comparitech, said the shift to operating as a RaaS group has allowed Qilin to scale up rapidly and target more organizations with a higher level of success. 

The group has also upped its ransom demands this year. Malaysian officials were outraged in March, with the country’s Prime Minister telling the press that it rejected a $10 million ransom demand after Kuala Lumpur International Airport was attacked. 

One month earlier, the group demanded $4 million after shutting down Cleveland’s Municipal Court.

The group faced law enforcement scrutiny last year after a devastating attack on a British healthcare company that prompted major disruptions to services. 

But it quickly returned with attacks on the government of Palau and one of the largest newspaper chains in the United States.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

New Android malware mimics human typing to evade detection, steal money

Next Post

New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves

Related Posts

Automating Pentest Delivery: 7 Key Workflows for Maximum Impact

Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time we automate the delivery of these results. The way results are delivered hasn’t kept up with today’s fast-moving threat landscape. Too often, findings are packaged into static reports, buried in PDFs or spreadsheets, and handed off manually to
Read More

Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the system to artificial intelligence (AI) model tampering and supply chain risks. The critical-rated vulnerabilities in question, discovered by Trend Micro, are listed below - CVE-2025-10643 (CVSS score: 9.1) - An authentication bypass vulnerability that
Read More

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, a solution for interactive malware analysis and threat intelligence, has uncovered one of North Korea’s most persistent infiltration schemes: a network of remote IT workers tied to Lazarus Group’s Famous Chollima division. For the first time, researchers managed
Read More