BusinessCybersecurityNewswireTechnology

Qilin Ransomware Exposes 40+ Victims Monthly

▼ Summary

– Qilin ransomware activity surged in late 2025, with over 40 victim listings published monthly on its leak site.
– The group primarily targeted manufacturing, followed by professional and scientific services and wholesale trade.
– Qilin uses a double-extortion model, encrypting data and threatening to leak stolen information if ransoms are unpaid.
– Since emerging in mid-2022 as Agenda, Qilin has expanded globally through a ransomware-as-a-service (RaaS) model.
– Affiliates use Qilin’s platform to compromise organizations in the US, Canada, UK, France, and Germany.

The Qilin ransomware group has escalated its global attacks, now listing over forty new victims each month on its dedicated data leak site. This alarming trend, documented through the latter half of 2025, solidifies its status as a top-tier cyber threat. Recent analysis from Cisco Talos reveals that the manufacturing industry bears the brunt of these assaults, with professional and scientific services and the wholesale trade sector also suffering significant targeting. The group’s persistent high-volume victim publication highlights its operational capacity and the severe financial damage it inflicts on businesses internationally.

Qilin employs a double-extortion tactic to maximize pressure on its targets. This method involves not only locking down a victim’s critical data with encryption but also stealing sensitive information beforehand. The criminals then threaten to publicly release this confidential data unless their ransom demands are met, creating a powerful incentive for organizations to pay.

The group, which originally operated under the name Agenda before rebranding, first appeared around the middle of 2022. It has dramatically widened its impact by adopting a ransomware-as-a-service (RaaS) framework. This business model allows other cybercriminals, known as affiliates, to lease Qilin’s sophisticated malicious software and supporting infrastructure. These affiliates then carry out attacks against a wide range of organizations, with a notable concentration in the United States, Canada, the United Kingdom, France, and Germany. This distributed network of attackers enables Qilin to maintain a relentless pace of intrusions across multiple continents.

(Source: Info Security)

Topics

ransomware activity 95% double extortion 90% manufacturing sector 85% ransomware-as-a-service 85% global operations 80% victim listings 80% data encryption 75% professional services 75% scientific services 75% information leakage 75%