BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
โ€ข
ยฉ 2026
โ€ข
blacktemple.net
Threat Actors/Qilin
๐Ÿ‡ท๐Ÿ‡บ

Qilin

Also known as: Qilin Ransomware ยท Agenda

ransomware
Nation
๐Ÿ‡ท๐Ÿ‡บ Russia
Active Since
2022
Targets
HealthcareManufacturingTechnologyGovernmentEducation
Known Tools
Qilin RansomwareCobalt StrikeMimikatzRcloneSystemBC
MITRE ATT&CK
T1190T1566.001T1078T1486T1490T1003T1021.001T1059.001T1112
References
Group-IB - QilinSophos - Qilin Chrome CredentialsBleepingComputer - NHS Synnovis

Background

Qilin, also known as Agenda, is a Russian-speaking ransomware-as-a-service operation that emerged in mid-2022. The group develops ransomware in both Rust and Go, targeting Windows and Linux/VMware ESXi systems. Qilin has steadily grown in prominence and was responsible for one of 2024''s most impactful healthcare attacks.

Notable Campaigns

NHS Synnovis Attack (June 2024) โ€” Qilin attacked Synnovis, a pathology services provider for major London NHS hospitals including King''s College Hospital and Guy''s and St Thomas''. The attack disrupted blood transfusion services and forced cancellation of thousands of medical appointments and surgeries, representing one of the most impactful healthcare ransomware incidents in UK history.

Chrome Credential Harvesting (2024) โ€” Sophos documented Qilin affiliates deploying a novel technique: using Group Policy to push a script that harvested saved credentials from Google Chrome browsers across all machines in the domain before encrypting systems, dramatically expanding the impact of each intrusion.

Tactics, Techniques & Procedures

Qilin affiliates gain access through compromised VPN credentials (often lacking MFA), phishing, and exploitation of internet-facing applications. The group uses Cobalt Strike for post-exploitation and deploys SystemBC for SOCKS5 proxy tunneling.

A distinctive innovation is the Chrome credential harvesting technique โ€” deploying scripts via Group Policy that extract saved passwords from all domain-joined machines, collecting credentials for SaaS applications, banking, and email that extend impact far beyond the encrypted network.

Tools & Malware

Qilin Ransomware โ€” Cross-platform encryptor written in Rust (Windows) and Go (Linux). Targets VMware ESXi virtual infrastructure and supports configurable encryption parameters.

Chrome Credential Harvester โ€” PowerShell script deployed via GPO that extracts saved credentials from Chrome''s SQLite database across all domain computers.

Indicators & Detection

Implement MFA on all VPN and remote access points. Monitor for Group Policy modifications deploying scripts to workstations, particularly those accessing Chrome user data directories. Watch for SystemBC proxy tunneling and Rclone data exfiltration.

Related Intelligence (2)

critical

Critical Cisco IMC Auth Bypass, F5 RCE Exposure, and Active Zero-Day Attacks Dominate Threat Landscape

Apr 2, 2026

critical

Critical Langflow Exploit Within Hours, Post-Quantum HTTPS Progress, and Ransomware Operations Exposed

Mar 20, 2026

All Threat Actors