Illustration of a hacker deploying Qilin ransomware using Linux binaries on Windows systems, showing code and alerts in a dark ops center.
Picha iliyoundwa na AI

Qilin ransomware deploys Linux binaries against Windows systems

Picha iliyoundwa na AI

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

The Qilin ransomware operation, active since 2022, has emerged as one of the most prolific ransomware-as-a-service groups in 2025, claiming over 40 victims monthly and peaking at 100 in June, according to Trend Micro's analysis. In a recent campaign detailed by security researchers, Qilin deployed a Linux ransomware binary on Windows systems via trusted tools like WinSCP for file transfer and Splashtop Remote for execution, bypassing traditional Windows-focused endpoint detection and response (EDR) systems.

Attackers gained initial access through fake Google CAPTCHA pages hosted on Cloudflare R2, which delivered obfuscated JavaScript leading to info-stealers that harvested credentials from command-and-control servers at 45.221.64.245/mot/ and 104.164.55.7/231/means.d. These stolen accounts enabled lateral movement, with reconnaissance conducted using ScreenConnect commands such as 'nltest /domain_trusts' and 'net group "domain admins" /domain'.

To maintain persistence, Qilin installed AnyDesk through ATERA RMM and ScreenConnect, disguising activity as administrative tasks. Defense evasion relied on bring-your-own-vulnerable-driver (BYOVD) techniques, loading signed drivers like eskle.sys—repurposed from a Chinese game vendor—and others such as rwdrv.sys and hlpdrv.sys via sideloaded DLLs like msimg32.dll executed by legitimate apps such as FoxitPDFReader.exe. These drivers performed VM checks, killed security processes, and terminated EDR tools.

A key focus was credential theft from Veeam backup infrastructure using Base64-encoded PowerShell scripts to extract usernames and passwords from SQL tables including Credentials, BackupRepositories, and WinServers. This allowed access to domain controllers, Exchange servers, and SQL databases. Lateral movement extended to Linux hosts via renamed PuTTY binaries like test.exe and 1.exe for SSH connections.

The Linux encryptor, requiring a password to run, whitelists processes, blocks file extensions, and excludes core directories, with updates adding Nutanix AHV detection. Distributed COROXY SOCKS proxies hidden in folders for Veeam, VMware, Adobe, and USOShared ensured resilient command-and-control.

"This attack challenges traditional Windows-focused security controls," Trend Micro reported. "The deployment of Linux ransomware on Windows systems demonstrates how threat actors are adapting to bypass endpoint detection systems not configured to detect or prevent Linux binaries executing through remote management channels." The tactic, also noted by Cisco Talos, underscores the need for visibility into RMM tools and hybrid environments to counter such low-noise operations.

Makala yanayohusiana

Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Picha iliyoundwa na AI

Russian hackers use Linux VMs to hide malware on Windows

Imeripotiwa na AI Picha iliyoundwa na AI

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

The pro-Russia hacktivist group CyberVolk has reemerged with a new ransomware-as-a-service platform called VolkLocker, supporting both Linux and Windows systems. First documented in 2024 by SentinelOne, the group returned after a period of inactivity caused by Telegram bans. Despite advanced automation via Telegram bots, the malware features significant encryption flaws that could allow victims to recover files without payment.

Imeripotiwa na AI

A new ransomware-as-a-service operation called VanHelsing emerged on March 7, 2025, quickly claiming at least three victims. It supports attacks on Windows, Linux, BSD, ARM, and ESXi systems, with affiliates retaining 80% of ransoms after a $5,000 deposit. The group prohibits targeting entities in the Commonwealth of Independent States.

SentinelOne researchers have disclosed a critical flaw in CyberVolk's new VolkLocker ransomware-as-a-service: a hardcoded master key stored in plaintext, enabling victims to decrypt files without ransom payment. Following the group's August 2025 relaunch after Telegram bans, this weakness underscores quality issues in their RaaS ecosystem.

Imeripotiwa na AI

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

Researchers have attributed a failed cyberattack on Poland's electric grid to Russian state hackers, coinciding with the 10th anniversary of a similar assault on Ukraine. The wiper malware aimed to disrupt power distribution but did not succeed in knocking out electricity. Security firm ESET linked the incident to the notorious Sandworm group.

Imeripotiwa na AI

North Korean hackers have begun exploiting a critical vulnerability known as React2Shell in malware attacks. This follows similar actions by Chinese hackers, indicating a growing interest in this security flaw. The issue poses significant risks to affected systems.

Ijumaa, 30. Mwezi wa kwanza 2026, 21:23:53

Researchers uncover ShadowHS Linux exploitation framework

Jumatano, 14. Mwezi wa kwanza 2026, 21:57:45

Check Point discovers advanced VoidLink Linux malware for clouds

Jumatatu, 12. Mwezi wa kwanza 2026, 01:03:02

Gobruterforcer botnet targets Linux servers with brute-force attacks

Jumatano, 7. Mwezi wa kwanza 2026, 09:35:24

Gobruteforcer botnet targets Linux servers worldwide

Jumapili, 21. Mwezi wa kumi na mbili 2025, 12:02:47

Chinese hackers install backdoors via Cisco email zero-day

Jumamosi, 13. Mwezi wa kumi na mbili 2025, 02:22:17

Rust-based Luca stealer targets Linux and Windows systems

Ijumaa, 12. Mwezi wa kumi na mbili 2025, 08:50:00

Russian cybercriminals release new ransomware

Jumatano, 10. Mwezi wa kumi na mbili 2025, 15:36:03

React2Shell flaw exploited for PeerBlight malware on Linux

Jumatano, 29. Mwezi wa kumi 2025, 11:29:39

Malicious npm packages steal developer credentials on multiple platforms

Jumatano, 29. Mwezi wa kumi 2025, 07:35:36

New gentlemen's raas advertised on underground forums

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa