Illustration of a hacker deploying Qilin ransomware using Linux binaries on Windows systems, showing code and alerts in a dark ops center.
Immagine generata dall'IA

Qilin ransomware deploys Linux binaries against Windows systems

Immagine generata dall'IA

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

The Qilin ransomware operation, active since 2022, has emerged as one of the most prolific ransomware-as-a-service groups in 2025, claiming over 40 victims monthly and peaking at 100 in June, according to Trend Micro's analysis. In a recent campaign detailed by security researchers, Qilin deployed a Linux ransomware binary on Windows systems via trusted tools like WinSCP for file transfer and Splashtop Remote for execution, bypassing traditional Windows-focused endpoint detection and response (EDR) systems.

Attackers gained initial access through fake Google CAPTCHA pages hosted on Cloudflare R2, which delivered obfuscated JavaScript leading to info-stealers that harvested credentials from command-and-control servers at 45.221.64.245/mot/ and 104.164.55.7/231/means.d. These stolen accounts enabled lateral movement, with reconnaissance conducted using ScreenConnect commands such as 'nltest /domain_trusts' and 'net group "domain admins" /domain'.

To maintain persistence, Qilin installed AnyDesk through ATERA RMM and ScreenConnect, disguising activity as administrative tasks. Defense evasion relied on bring-your-own-vulnerable-driver (BYOVD) techniques, loading signed drivers like eskle.sys—repurposed from a Chinese game vendor—and others such as rwdrv.sys and hlpdrv.sys via sideloaded DLLs like msimg32.dll executed by legitimate apps such as FoxitPDFReader.exe. These drivers performed VM checks, killed security processes, and terminated EDR tools.

A key focus was credential theft from Veeam backup infrastructure using Base64-encoded PowerShell scripts to extract usernames and passwords from SQL tables including Credentials, BackupRepositories, and WinServers. This allowed access to domain controllers, Exchange servers, and SQL databases. Lateral movement extended to Linux hosts via renamed PuTTY binaries like test.exe and 1.exe for SSH connections.

The Linux encryptor, requiring a password to run, whitelists processes, blocks file extensions, and excludes core directories, with updates adding Nutanix AHV detection. Distributed COROXY SOCKS proxies hidden in folders for Veeam, VMware, Adobe, and USOShared ensured resilient command-and-control.

"This attack challenges traditional Windows-focused security controls," Trend Micro reported. "The deployment of Linux ransomware on Windows systems demonstrates how threat actors are adapting to bypass endpoint detection systems not configured to detect or prevent Linux binaries executing through remote management channels." The tactic, also noted by Cisco Talos, underscores the need for visibility into RMM tools and hybrid environments to counter such low-noise operations.

Articoli correlati

Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Immagine generata dall'IA

Russian hackers use Linux VMs to hide malware on Windows

Riportato dall'IA Immagine generata dall'IA

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

The pro-Russia hacktivist group CyberVolk has reemerged with a new ransomware-as-a-service platform called VolkLocker, supporting both Linux and Windows systems. First documented in 2024 by SentinelOne, the group returned after a period of inactivity caused by Telegram bans. Despite advanced automation via Telegram bots, the malware features significant encryption flaws that could allow victims to recover files without payment.

Riportato dall'IA

A new ransomware-as-a-service operation called VanHelsing emerged on March 7, 2025, quickly claiming at least three victims. It supports attacks on Windows, Linux, BSD, ARM, and ESXi systems, with affiliates retaining 80% of ransoms after a $5,000 deposit. The group prohibits targeting entities in the Commonwealth of Independent States.

SentinelOne researchers have disclosed a critical flaw in CyberVolk's new VolkLocker ransomware-as-a-service: a hardcoded master key stored in plaintext, enabling victims to decrypt files without ransom payment. Following the group's August 2025 relaunch after Telegram bans, this weakness underscores quality issues in their RaaS ecosystem.

Riportato dall'IA

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

Researchers have attributed a failed cyberattack on Poland's electric grid to Russian state hackers, coinciding with the 10th anniversary of a similar assault on Ukraine. The wiper malware aimed to disrupt power distribution but did not succeed in knocking out electricity. Security firm ESET linked the incident to the notorious Sandworm group.

Riportato dall'IA

North Korean hackers have begun exploiting a critical vulnerability known as React2Shell in malware attacks. This follows similar actions by Chinese hackers, indicating a growing interest in this security flaw. The issue poses significant risks to affected systems.

 

 

 

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta