← All briefs
high September 21, 2025

Ransomware Gangs Collapse as Qilin Seizes Control

Source report →

Qilin has emerged as one of the most advanced and structured ransomware-as-a-service (RaaS) operations currently active. The group provides affiliates with a sophisticated toolkit including cross-platform ransomware, an affiliate panel with granular control over payload configuration, and built-in features for safe-mode execution, shadow copy deletion, log cleaning, and automated negotiation. Beyond malware delivery, Qilin positions itself as a “full-service” operation, offering affiliates infrastructure, communications, and even legal/media support to sustain extortion pressure. Notably, its payloads are engineered with VMware awareness, enabling effective disruption of virtualized enterprise environments where many critical workloads reside. This combination of technical depth and organizational services makes Qilin a central player in the evolving ransomware ecosystem, particularly as rival groups fragment.

Qilin’s ransomware payloads are written in both Rust and C, allowing cross-platform support across Windows and Linux environments. The binaries include features such as service and process termination, volume shadow copy deletion, and reboot-to-safe-mode functionality to bypass endpoint defenses during encryption. The malware shows explicit handling of VMware processes, enabling it to cripple virtualized workloads before encrypting underlying data stores. Together, these capabilities show that Qilin is deliberately engineering its ransomware to maximize persistence, stealth, and operational control for affiliates.

IP ADDRESS 3
80.64.16.87
185.196.10.19
185.208.156.157
SHA256 FILE HASH 4
31c3574456573c89d444478772597db40f075e25c67b8de39926d2faa63ca1d8
C9707a3bc0f177e1d1a5587c61699975b1153406962d187c9a732f97d8f867c5
13cda19a9bf493f168d0eb6e8b2300828017b0ef437f75548a6c50bfb4a42a09
a7f2a21c0cd5681eab30265432367cf4b649d2b340963a977e70a16738e955ac
Library detections (2)
  • ESXi VM Force Kill Command Execution
  • VMware Snapshot Removal Command Execution
Additional detection ideas (9)
  • Detect deletion of volume shadow copies or disabling of backup services
  • Monitor signed Windows binaries used to proxy execution of untrusted code (LOLBins)
  • Monitor for services created or modified to execute payloads
  • Alert on deletion of log files, scripts, or artifacts immediately after execution
  • Detect clearing of Windows Event Logs or selective event deletion
  • Detect enumeration of attached peripheral devices or removable media
  • Alert on ESXi administrative commands executed outside of normal change windows
  • Detect mass file encryption patterns — high-frequency file writes with entropy changes
  • Flag enumeration of domain accounts, groups, or trust relationships