Illustration of a hacker deploying Qilin ransomware using Linux binaries on Windows systems, showing code and alerts in a dark ops center.
Illustration of a hacker deploying Qilin ransomware using Linux binaries on Windows systems, showing code and alerts in a dark ops center.
Picha iliyoundwa na AI

Qilin ransomware deploys Linux binaries against Windows systems

Picha iliyoundwa na AI

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

The Qilin ransomware operation, active since 2022, has emerged as one of the most prolific ransomware-as-a-service groups in 2025, claiming over 40 victims monthly and peaking at 100 in June, according to Trend Micro's analysis. In a recent campaign detailed by security researchers, Qilin deployed a Linux ransomware binary on Windows systems via trusted tools like WinSCP for file transfer and Splashtop Remote for execution, bypassing traditional Windows-focused endpoint detection and response (EDR) systems.

Attackers gained initial access through fake Google CAPTCHA pages hosted on Cloudflare R2, which delivered obfuscated JavaScript leading to info-stealers that harvested credentials from command-and-control servers at 45.221.64.245/mot/ and 104.164.55.7/231/means.d. These stolen accounts enabled lateral movement, with reconnaissance conducted using ScreenConnect commands such as 'nltest /domain_trusts' and 'net group "domain admins" /domain'.

To maintain persistence, Qilin installed AnyDesk through ATERA RMM and ScreenConnect, disguising activity as administrative tasks. Defense evasion relied on bring-your-own-vulnerable-driver (BYOVD) techniques, loading signed drivers like eskle.sys—repurposed from a Chinese game vendor—and others such as rwdrv.sys and hlpdrv.sys via sideloaded DLLs like msimg32.dll executed by legitimate apps such as FoxitPDFReader.exe. These drivers performed VM checks, killed security processes, and terminated EDR tools.

A key focus was credential theft from Veeam backup infrastructure using Base64-encoded PowerShell scripts to extract usernames and passwords from SQL tables including Credentials, BackupRepositories, and WinServers. This allowed access to domain controllers, Exchange servers, and SQL databases. Lateral movement extended to Linux hosts via renamed PuTTY binaries like test.exe and 1.exe for SSH connections.

The Linux encryptor, requiring a password to run, whitelists processes, blocks file extensions, and excludes core directories, with updates adding Nutanix AHV detection. Distributed COROXY SOCKS proxies hidden in folders for Veeam, VMware, Adobe, and USOShared ensured resilient command-and-control.

"This attack challenges traditional Windows-focused security controls," Trend Micro reported. "The deployment of Linux ransomware on Windows systems demonstrates how threat actors are adapting to bypass endpoint detection systems not configured to detect or prevent Linux binaries executing through remote management channels." The tactic, also noted by Cisco Talos, underscores the need for visibility into RMM tools and hybrid environments to counter such low-noise operations.

Makala yanayohusiana

Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Picha iliyoundwa na AI

Russian hackers use Linux VMs to hide malware on Windows

Imeripotiwa na AI Picha iliyoundwa na AI

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

The pro-Russia hacktivist group CyberVolk has reemerged with a new ransomware-as-a-service platform called VolkLocker, supporting both Linux and Windows systems. First documented in 2024 by SentinelOne, the group returned after a period of inactivity caused by Telegram bans. Despite advanced automation via Telegram bots, the malware features significant encryption flaws that could allow victims to recover files without payment.

Imeripotiwa na AI

A new ransomware-as-a-service operation called VanHelsing emerged on March 7, 2025, quickly claiming at least three victims. It supports attacks on Windows, Linux, BSD, ARM, and ESXi systems, with affiliates retaining 80% of ransoms after a $5,000 deposit. The group prohibits targeting entities in the Commonwealth of Independent States.

Cisco Talos has reported a China-linked threat actor known as UAT-7290 that has been spying on telecommunications companies since 2022. The group uses Linux malware, exploits on edge devices, and ORB infrastructure to maintain access to targeted networks.

Imeripotiwa na AI

Researchers at Check Point have revealed that VoidLink, a sophisticated Linux malware targeting cloud servers, was largely built by a single developer using AI tools. The framework, which includes over 30 modular plugins for long-term system access, reached 88,000 lines of code in under a week despite plans suggesting a 20-30 week timeline. This development highlights AI's potential to accelerate advanced malware creation.

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

Imeripotiwa na AI

A new Linux botnet named SSHStalker is exploiting cloud servers for profit by employing the ancient IRC protocol. It targets Linux servers through automated scans, cron jobs, and IRC communications. The operation revives old-school methods to cut costs, as reported by TechRadar.

Alhamisi, 19. Mwezi wa pili 2026, 13:36:25

Researchers uncover new SysUpdate malware variant targeting Linux

Jumatano, 18. Mwezi wa pili 2026, 23:37:21

New SysUpdate malware variant targets Linux systems

Jumatano, 11. Mwezi wa pili 2026, 00:43:36

Researchers discover SSHStalker botnet infecting Linux servers

Jumanne, 10. Mwezi wa pili 2026, 19:39:23

New Linux botnet SSHStalker uses IRC for command-and-control

Jumatano, 4. Mwezi wa pili 2026, 19:25:39

Russian hackers exploit Microsoft Office vulnerability days after patch

Jumatano, 14. Mwezi wa kwanza 2026, 21:57:45

Check Point discovers advanced VoidLink Linux malware for clouds

Jumanne, 16. Mwezi wa kumi na mbili 2025, 23:12:04

React2Shell exploits continue with large-scale Linux backdoor deployments and cloud credential theft

Jumamosi, 13. Mwezi wa kumi na mbili 2025, 18:43:35

CyberVolk's VolkLocker hampered by plaintext master key flaw

Jumamosi, 13. Mwezi wa kumi na mbili 2025, 02:22:17

Rust-based Luca stealer targets Linux and Windows systems

Jumatano, 29. Mwezi wa kumi 2025, 07:35:36

New gentlemen's raas advertised on underground forums

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa