Cybersecurity and Cyberwarfare coverage

R
Reza Rafati

Qilin: cross-platform ransomware-as-a-service with healthcare and public-sector impact

Rebranded from “Agenda,” active since 2022; double-extortion model, Windows/Linux payloads, and a persistent leak-site pressure cadence

Qilin is a ransomware-as-a-service operation active since 2022 that rebranded from “Agenda,” pairing data exfiltration with network-wide encryption and a branded leak site. Activity across 2024–2025 includes high-impact healthcare disruption and steady listings in public roll-ups, indicating a durable affiliate model rather than one-off campaigns.

Profile

Qilin operates a franchise model in which affiliates conduct intrusions and negotiations while a core team maintains infrastructure, payloads, and the leak portal. Early builds appeared in Go, with later variants recoded in Rust. Support for both Windows and Linux enables coverage of mixed estates and virtualized environments, and recruitment posts historically exclude targets within the CIS region. The brand’s communications emphasize encryption reliability, leak-site visibility, and staged pressure if negotiations fail.

Activity picture in 2024–2025

Open reporting places Qilin among the more active ransomware brands through 2025, with incidents spanning healthcare, state and local government, professional services, and manufacturing. The group’s cadence reflects consistent affiliate throughput: victim “cards” are added to the leak site with sector and geography details, followed by proof archives if talks stall. Public trackers show month-to-month variability typical of RaaS ecosystems as affiliates cycle tools and target sets.

Tactics, techniques, and procedures

Affiliates blend intrusion tooling with double extortion. Initial access commonly leverages credentials or exposed services and is followed by lateral movement to domain controllers and hypervisor tiers. Pre-encryption steps include discovery, process termination (databases, EDR/backup agents), and data staging for leak-site publication. Payloads support operator-defined modes and can address file servers and virtual machines to maximize downtime and pressure.

Technical characteristics (selected)

Area Detail
Platforms Windows and Linux payload families; activity observed against ESXi estates
Languages Go lineage with later Rust recode variants
Extortion model Data theft plus encryption, with a branded leak site and staged “proof” releases
Common targets Healthcare, SLTT/public sector, professional services, manufacturing
Operational levers Service-stop lists, domain-wide reach, and leak-site amplification

Notable impact: healthcare disruption and data exposure

A 2024 incident against pathology services supporting London hospitals forced large-scale fallback to manual workflows, with surgery and clinic schedules affected and data exposure acknowledged in public statements. Subsequent industry and media reporting described prolonged restoration timelines and substantial financial impact for the provider, underscoring how ransomware against clinical systems produces second-order effects beyond immediate encryption events. In parallel, public-sector and services cases through 2025 illustrate how Qilin’s affiliates adapt to diverse environments by combining data theft, availability impact, and reputational pressure through the leak portal.

2025 momentum across public sector and services

Quarterly and monthly summaries during 2025 consistently list Qilin among top active groups by victim count in U.S. state, local, tribal and territorial datasets as well as global vendor roll-ups. This visibility aligns with a broad affiliate base, stable negotiation workflows, and recognizable branding on the leak site. As other programs rebrand, splinter, or stall, Qilin’s continuity suggests operators view the program as a reliable venue for monetizing intrusions.

Communications and pressure

Qilin’s leak site publishes concise victim entries with sector, geography, and sample data. Listings can escalate from “added” to “published” if talks fail, and archives are released in stages to sustain leverage. Messaging frequently highlights dataset size and sensitive record types, amplifying regulatory and legal exposure for organizations in regulated sectors. Affiliates sometimes pair portal posts with mentions on open social channels to increase visibility and accelerate pressure.

Tradecraft context on this site

The operational mix—data theft, staged publishing, and steady listings—aligns with other 2025 extortion brands we profile. For contrast with an extortion crew focused on rapid leak-site cadence rather than novel cryptography, see Securotrop. For availability-centric pressure that relies on politically motivated DDoS rather than encryption, the pattern in Red Wolf maps how service disruption is used to drive impact without data-theft extortion.

Timeline highlights

Date Signal
2022 Jul–Sep “Agenda” ransomware appears and rebrands to Qilin as cross-platform builds enter circulation
2024 Jun London pathology services incident triggers clinical disruption and public acknowledgment of data exposure
2025 Apr–Jun Qilin features near the top of multiple monthly victim roll-ups; affiliates expand into public-sector targets
2025 Q2–Q3 Continued listings on leak trackers indicate stable affiliate throughput and sustained negotiations

Sources