Qilin Ransomware

Qilin Ransomware image
You are here:

Overview

Qilin (also tracked as Agenda / Gold Feather / Water Galura) has evolved its operational playbook to include a hybrid attack model that combines a Linux-compiled ransomware payload executed on Windows hosts together with a “Bring Your Own Vulnerable Driver” (BYOVD) technique to disable/hamper endpoint protection.

TECHNICAL DETAILS

  • Initial Access: Credential theft (phishing, reuse of credentials, leaked credentials, Fake CAPTCHA), compromised RMM tools and remote-access products.
  • Lateral Movement & Escalation: Abuse of legitimate remote management tools (AnyDesk, Splashtop, MeshAgent, WinSCP, RMM suites) and elevated credentials to move laterally and access backup systems and hypervisors.
  • Defense Evasion (BYOVD): Deployment of a signed but vulnerable kernel driver (reported as variants such as TPwSav.sys in observed cases) to disable or….

Download the Report

Date

Share

Previous Reports