Qilin did not come out of nowhere. The group matured into a high-tempo ransomware-as-a-service operation in 2025, scaling attacks across public agencies, education, healthcare, manufacturing, and large enterprises. Multiple intelligence roundups place Qilin among the most active groups this year, with double-digit share of monthly victim postings and triple-digit growth year over year. Security teams in France and the United States felt this surge directly, from regional councils and school districts to sheriff’s offices and manufacturers.

Who Qilin is, in Practical Terms
Qilin runs a classic RaaS model. Core operators maintain malware, leak sites, and negotiation portals. Affiliates gain initial access, move laterally, steal data, deploy the locker, then pressure victims with publication threats. Public research and vendor analyses describe Qilin using Windows, Linux, and ESXi-capable payloads, originally associated with the Agenda family, along with tooling that favors fast deployment and anti-defense steps.
In short, the specific affiliate and entry vector may vary, but Qilin’s operational arc is consistent. Expect credential-driven access, quiet lateral movement, batch deployment, data theft, and then extortion.
The Anatomy of a Qilin Attack
Qilin’s operations follow a recognizable chain of activity. Each phase reveals a detection opportunity that often goes unnoticed by conventional tools.
Each step below represents a behavioral fingerprint that AI-driven analytics can surface — but that rule-based tools often overlook.
1. Initial Access
Qilin affiliates rely on social engineering and access exploitation to breach targets.
Common techniques include:
- Spearphishing: Targeted phishing emails deliver malicious payloads or credential-harvesting links. Qilin often weaponizes legitimate cloud file-sharing platforms to appear trustworthy.
- Remote Monitoring & Management (RMM) exploitation: Attackers hijack or mimic trusted RMM tools such as AnyDesk or ConnectWise to gain persistence under the guise of IT support.
- Lateral Movement & Exploitation: Once inside, Qilin probes connected systems and pivots across network shares or domain trusts, looking for weak credentials or misconfigurations.
- Multifactor Authentication (MFA) Bombing: Repeated MFA push requests overwhelm a user, tricking them into approving a fraudulent login.
- SIM Swapping: In some cases, Qilin affiliates use SIM-swapping to intercept MFA tokens, particularly in targeted executive or administrator accounts.
Why it works: Each of these techniques abuses legitimate user behavior — not malware signatures. Without continuous identity analytics and behavioral baselining, SOC teams see these as “normal logins.”
2. Establishing Foothold and Privilege Escalation
After gaining access, Qilin affiliates focus on consolidating control:
- Creating new local or domain admin accounts to ensure persistence.
- Deploying remote shells or scripts to maintain ongoing connectivity.
- Disabling or tampering with endpoint defenses and logging services.
In many cases, they disable antivirus, suspend logging, and plant secondary access points through scheduled tasks or service creation. This phase can last days, giving them ample time to identify where sensitive data resides.
Detection gap: These activities blend into normal IT workflows. Without AI models trained to identify unusual privilege escalation or privilege reuse, such anomalies are rarely prioritized.
3. Lateral Movement and Domain Control
Once inside the network, Qilin moves deliberately to gain full administrative control. They use:
- Remote Desktop Protocol (RDP) and Windows Management Instrumentation (WMI) for host-to-host pivoting.
- Active Directory enumeration to identify high-value systems and domain controllers.
- Group Policy Object (GPO) abuse to distribute payloads network-wide.
Detection challenge: Many of these actions mirror legitimate admin functions. Only platforms that continuously model identity and privilege relationships can highlight this behavior in real time.
4. Data Exfiltration
Before encryption, Qilin systematically exfiltrates sensitive data for double extortion. Common tools include Rclone, SMB shares, and cloud storage APIs.
These transfers typically originate from high-privilege service accounts or backup servers — systems that rarely trigger exfiltration alerts. The attackers encrypt or compress archives before uploading them to cloud endpoints to reduce detection likelihood.
5. Impact and Encryption
In 2025, Qilin introduced major upgrades to its ransomware payloads, increasing both performance and resilience:
Encryption Enhancements
- AES-256-CTR: Uses 256-bit keys in Counter (CTR) mode, enabling high-speed symmetric encryption.
- Optimal Asymmetric Encryption Padding (OAEP): Strengthens RSA key wrapping to resist cryptographic attacks.
- AES-NI Optimization: Leverages x86 AES New Instructions for near-instant encryption on modern CPUs.
- ChaCha20 Stream Cipher: Implements fast and secure encryption for certain communications and file types.
These features make decryption without keys nearly impossible. Combined with parallelized encryption, entire networks can be locked within minutes.
Security Evasion
Qilin variants are designed to hinder forensics and incident response:
- Clears Windows event logs to remove traces of execution.
- Deletes itself post-encryption to erase payload evidence.
- Kills security processes and disables telemetry reporting before execution.
Backup Corruption
- Deletes Windows Volume Shadow Copies (VSS) to prevent system restoration.
- Targets network-based backups, often corrupting or encrypting snapshots to maximize leverage.
The security gap Qilin exploits
Traditional tools depend on signatures, static indicators, or post-event correlation. Qilin thrives in environments where identity behavior, lateral movement, and exfiltration telemetry are not unified.
Agent-based detection struggles in hybrid environments — unmanaged servers, IoT, or SaaS applications often go unmonitored. Credential-based access evades endpoint detection entirely. And alert fatigue buries early behavioral clues that should have triggered containment.
SOC teams need a unified view of attacker behavior, correlated across network, identity, and cloud — exactly where the Vectra AI Platform delivers visibility.
Where visibility fails, AI detection changes the outcome
The Vectra AI Platform detects ransomware precursors by focusing on behavior, not signatures:
- Agentless visibility across hybrid environments, including unmanaged systems, ESXi, and cloud infrastructure.
- AI-driven correlation across identity, network, SaaS, and cloud surfaces to detect credential misuse, lateral movement, and exfiltration.
- Real-time triage and prioritization that consolidates weak signals into a single high-confidence incident.
- Seamless integration with existing SIEM, SOAR, and EDR tools to accelerate response.
By mapping attacker behaviors instead of waiting for indicators, Vectra AI enables SOC teams to disrupt Qilin-like campaigns before encryption and data exposure occur.
Qilin’s success in 2025 proves that ransomware no longer depends on new vulnerabilities. It depends on the blind spots between your tools. With AI-driven detection that continuously monitors behavior across identity, network, and cloud, your SOC team can surface the actions that define modern ransomware operators before the encryption begins.
See how the Vectra AI Platform detects what others miss. Watch the self-guided demo to experience behavior-driven detection in action.