Qilin Ransomeware is Back


Every enterprise is a victim of hacking. The question is how long it takes for them to find out.
— Udi Mokady

Qilin Ransoms and Healthcare

In June 2024, they targeted Synnovis, a pathology services provider, which led to significant disruptions in several key NHS hospitals in London. The group demanded a $50 million ransom, which was not paid.

The great people at Sophos probably have the most up to date news. It seems that Healthcare is dispproportionately affected, based on anecdotal data. Ilate August 2024, the Qilin ransomware group has been in the news for several significant activities:

  1. Credential Theft from Google Chrome: Qilin has been observed using a new tactic to steal credentials stored in Google Chrome browsers. This method involves deploying a custom stealer that targets Chrome browsers on network-connected endpoints. The group uses a Group Policy Object (GPO) to execute a PowerShell script that harvests credentials, which are then exfiltrated. This technique was identified by the Sophos X-Ops team and is considered unusual for ransomware groups

  2. Healthcare Sector Attacks: Qilin has been particularly active in the healthcare sector. In June 2024, they targeted Synnovis, a pathology services provider, which led to significant disruptions in several key NHS hospitals in London. The group demanded a $50 million ransom, which was not paid, resulting in the leakage of millions of patient records on the dark web. This attack has caused widespread concern and has been labeled a healthcare crisis

  3. International Law Enforcement Efforts: The UK and US law enforcement agencies have joined forces to tackle Qilin's ransomware operations. This collaboration aims to address the group's impact on critical sectors, including healthcare

  4. Ransomware Payments: Ransomware victims have paid nearly $460 million to cybercriminals in the first half of 2024, setting a record for ransom payments. This highlights the growing financial impact of ransomware attacks

  5. Qilin's Tactics and Techniques: Qilin employs sophisticated techniques, including exploiting vulnerabilities in Fortinet devices and Veeam Backup & Replication software, using brute force on VPN devices, and deploying ransomware with robust encryption methods like AES-256 CTR and ChaCha20. The group also engages in double extortion, stealing data and encrypting systems before demanding a ransom

Please give Sophos a hand, they do exellent work.

Previous
Previous

Magento, eCommerce Attacks in Progress

Next
Next

Mirai Botnet