The Qilin ransomware group, also known as Agenda and Water Galura, has rapidly evolved into one of the most aggressive ransomware operations of 2025, claiming over 700 victims across multiple sectors worldwide. The group’s activity spiked in October 2025, with nearly 200 confirmed incidents—marking a major escalation in frequency and impact.
Qilin operates under a Ransomware-as-a-Service (RaaS) model, allowing affiliates to launch attacks using its infrastructure while retaining up to 85% of ransom profits. The group’s campaigns target manufacturing, technology, healthcare, financial services, energy, government, education, transportation, and aerospace, among others.
A key advancement in 2025 is Qilin’s ability to execute Linux ransomware payloads on Windows systems by exploiting legitimate remote management tools such as AnyDesk, ScreenConnect, and Splashtop. This cross-platform capability enables attackers to bypass traditional Windows defenses, evade detection, and encrypt hybrid environments.
Qilin also leverages Bring Your Own Vulnerable Driver (BYOVD) attacks, phishing-based credential theft, and double-extortion tactics, stealing sensitive data before encryption to increase ransom pressure. The group’s growing sophistication highlights the urgent need for multi-factor authentication (MFA), remote tool restrictions, and hybrid visibility across enterprise networks.
This combination of credential theft, legitimate tool abuse, and hybrid encryption makes Qilin a severe and stealthy global threat to enterprise networks.
SHA1 Hash:
SHA256 Hashes:
 c0f7c2bb04aa09dae62f0e5feeb7c9c867685abc788ae6b0e6928ad7979dbcaf
 e46bde83b8a3a7492fc79c22b337950fc49843a42020c41c615b24579c0c3251
 f488861f8d3d013c3eef88983de8f5f37bb014ae13dc13007b26ebbd559e356e
 3dba9ba8e265faefce024960b69c1f472ab7a898e7c224145740f1886d97119f
 15e5bf0082fbb1036d39fc279293f0799f2ab5b2b0af47d9f3c3fdc4aa93de67
 331d136101b286c2f7198fd41e5018fcadef720ca0e74b282c1a44310a792e7f
 549a1ae688edfcb2e7a254ac3aded866b378b2e829f1bb8af42276b902f475e6
 454e398869e189874c796133f68a837c9b7f2190b949a8222453884f84cf4a1b
 e38d4140fce467bfd145a8f6299fc76b8851a62555b5c0f825b9a2200f85017c
 5f0253f959d65c45a11b7436301ee5a851266614f811c753231d684eb5083782
IPv4 Addresses:
 85[.]239[.]34[.]91
 86[.]106[.]85[.]36
Domains:
 regsvchst[.]com
 holapor67[.]top
 mimikatzlogs@anti[.]pm
 mimikatz@anti[.]pm
URLs:
 hxxp[:]//185[.]141[.]216[.]127/tr.e
 hxxps[:]//chatgptitalia[.]net/
 hxxps[:]//45[.]221[.]64[.]245/mot/
 hxxps[:]//104[.]164[.]55[.]7/231/means.d
TOR Addresses:
 hxxp[:]//ozsxj4hwxub7gio347ac7tyqqozvfioty37skqilzo2oqfs4cw2mgtyd[.]onion
 hxxp[:]//kbsqoivihgdmwczmxkbovk7ss2dcynitwhhfu5yw725dboqo5kthfaad[.]onion
 hxxp[:]//securo45z554mw7rgrt7wcgv5eenj2xmxyrsdj3fcjsvindu63s4bsid[.]onion
Recent Victim Websites:
mainetti[.]com
| Tactic | Technique | Technique ID | 
|---|---|---|
| Initial Access | Phishing / External Remote Services | T1566, T1133 | 
| Execution | PowerShell, Command Shell, Remote Access Software | T1059.001, T1059.003, T1219 | 
| Persistence | Boot or Logon Autostart Execution / Registry Run Keys | T1547, T1547.001 | 
| Privilege Escalation | BYOVD Exploit / Group Policy Modification | T1562, T1484.001 | 
| Defense Evasion | Disable or Modify Tools / Indicator Removal | T1562.001, T1070 | 
| Credential Access | OS Credential Dumping / Brute Force | T1003, T1110 | 
| Lateral Movement | Remote Desktop / SMB / Admin Shares | T1021, T1021.001, T1021.002 | 
| Exfiltration | Exfiltration Over Alternative Protocol | T1048 | 
| Impact | Data Encrypted for Impact / Inhibit System Recovery | T1486, T1490 | 
Get through updates and upcoming events, and more directly in your inbox