Threat Actor Characterization
Qilin
ID: d8e6782eec741fcceb6c308149d08a9d| Agenda | Qilin Crypt | Qi********** | Qi*********** |
| Qi************** | Qi******** | Qi********* | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
Qilin (aka Agenda) is a ransomware-as-a-service (RaaS) ecosystem active since 2022, associated in public reporting with double extortion, leak-site pressure, and cross-platform targeting (Windows and Linux/VMware ESXi). Affiliate tradecraft varies, but repeated reporting highlights phishing/exposed services/valid accounts for entry, remote tooling/RMM abuse for staging, lateral movement via admin channels, backup targeting and recovery inhibition, and encryption impact.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1566 | Phishing | TA0001 |
|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1219 | Remote Access Tools | TA0011 |
|
| T1105 | Ingress Tool Transfer | TA0011 |
|
| T1021.002 | SMB/Windows Admin Shares | TA0008 |
|
| T1021.004 | SSH | TA0008 |
|
| T1003 | OS Credential Dumping | TA0006 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
| T1486 | Data Encrypted for Impact | TA0040 |
|
| T1490 | Inhibit System Recovery | TA0040 |
|
| T1562.001 | Disable or Modify Tools | TA0005 |
|
QILIN (AKA AGENDA) — RaaS / Double-Extortion
Classification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITE
Category: Ransomware / RaaS (Double-Extortion) — Origin: INFERENCE: Russian-speaking underground ecosystem (confidence: medium-high)
Author: iQBlack CTI Team
Executive Summary
Qilin (also widely reported under its earlier name “Agenda”) is a ransomware-as-a-service (RaaS) operation active since mid-2022 and repeatedly described in public reporting as a high-throughput affiliate platform combining data theft with encryption (“double extortion”). The group operates an extortion ecosystem that includes victim negotiation, leak-site publication pressure, and a mature affiliate program where the core operators reportedly take a percentage of ransom proceeds (commonly cited as ~15–20%).
From a defender’s perspective, Qilin’s distinguishing risk is not a single “novel” exploit chain but an increasingly professionalized operating model: affiliates leverage common entry vectors (phishing, exposed remote services, credential abuse) and then rely on fast lateral movement, tool-assisted deployment (including remote monitoring/management tools), and recovery inhibition prior to encryption. Public reporting highlights cross-platform capability (Windows + Linux/ESXi) and repeated use of legitimate administrative tooling to reduce friction and blend into enterprise operations.
Operational sophistication appears uneven across incidents (typical of RaaS). Some campaigns show advanced tradecraft (backup targeting, defense evasion techniques such as BYOVD, proxying, and multi-tool orchestration), while others resemble “opportunistic big-game hunting.” This variability is a key analytic point: Qilin should be modeled as an ecosystem with a shared payload/platform but heterogeneous affiliate behaviors.
Hunting Playbook — Qilin (aka Agenda) RaaS
Operating assumption: Affiliate-driven initial access; consistent mid-chain behaviors (remote tooling misuse, lateral movement, recovery inhibition, exfil staging). Use these hunts as ransomware-grade controls regardless of affiliate identity.
Free Preview
Free Preview
Free Preview
Free Preview
Free Preview
Free Preview
Free Preview
Free Preview
Free Preview
Free Preview