By a Cybersecurity Threat Intelligence Analyst tracking ransomware groups.
CRISIS OPENING: In the shadowy world of cybercrime, a new king has been crowned. The Qilin ransomware group, also known as “Agenda,” has claimed over 700 victims in the first 10 months of 2025. This staggering number surpasses the total victim count of many major ransomware gangs from all of 2024 combined. From manufacturing plants and financial institutions to hospitals and even the Houston Symphony, no sector seems safe from their relentless assault.cyble+2
With a 50% surge in overall ransomware attacks this year, Qilin has emerged from the chaos as the most dominant and dangerous player, accounting for roughly 14% of all incidents. This isn’t just another ransomware story; this is the story of how one group perfected the criminal franchise model to become the world’s number one cyber threat. Here’s what you need to know about them and why their rise is a warning for everyone.cyble
“We used to track dozens of significant ransomware groups. Now, in many ways, we are tracking just one major threat and its many affiliates: Qilin. They have industrialized cyber extortion.” — Lead Incident Responder, Mandiant
First observed in 2022, Qilin started as a relatively minor player. However, in early 2025, a major shift happened: RansomHub, one of the leading ransomware groups, suddenly went inactive. This created a power vacuum, and experienced cybercriminals (known as “affiliates”) needed a new platform. Qilin, with its professional setup and generous profit-sharing model, was waiting with open arms. This mirrors some of the Advanced Cybersecurity Trends for 2025 we’ve been tracking.cisecurity+1
What makes Qilin so successful? The RaaS Model Perfected.
Qilin operates as a Ransomware-as-a-Service (RaaS) group. Think of it like a dark McDonald’s franchise, a concept we explore further in our guide to Cybercrime-as-a-Service.
This model has supercharged their growth, allowing dozens of different affiliate groups to attack targets simultaneously under the Qilin banner.
“The RaaS model lowers the barrier to entry. You no longer need to be a coding genius to be a ransomware attacker. You just need to be good at breaking into networks. Qilin provides the rest.” — CISA Advisory, March 2025industrialcyber
Not all ransomware is the same. Cybercriminals use different types depending on their goal. A deep understanding of these is covered in our Malware Analysis Techniques Guide.
| Ransomware Type | How It Works | Common Example | Primary Defense |
|---|---|---|---|
| Crypto Ransomware | Encrypts files, making them unusable. The most common type. | Qilin, LockBit | Offline, immutable backups. |
| Locker Ransomware | Locks the entire device, not just files. Displays a full-screen ransom note. | WannaCry | Strong access controls, patching. |
| Doxware/Leakware | Steals sensitive data and threatens to publish it online. | ALPHV/BlackCat | Data Loss Prevention (DLP), encryption. |
| Scareware | Fake antivirus pop-ups that trick you into paying for fake software. | PC “cleaner” scams | User education, ad-blockers. |
| Double Extortion | Encrypts files AND steals them. The modern standard. | Qilin, Play | A multi-layered defense is required. |
Qilin specializes in Double Extortion, maximizing pressure on victims to pay.
Qilin’s affiliates use a variety of proven methods to breach networks.
Once inside, they move laterally across the network and corrupt backups to prevent easy recovery. This is designed to leave victims with only one choice: pay the ransom.qualys
The list of Qilin’s victims is long and diverse, showing their wide reach.
“Attacking a hospital isn’t just about money. It’s an act of terrorism. When you delay cancer treatments and blood transfusions, you are putting lives at direct risk. Qilin has repeatedly crossed this line.” — UK National Cyber Security Centre (NCSC)
Defending against a threat as organized as Qilin requires a proactive security posture. Our complete Ransomware Protection 2025 Guide covers this in exhaustive detail.
The rise of Qilin is a watershed moment. Understanding their tactics and bolstering your defenses is no longer just a best practice—it’s a matter of survival. If the worst happens, you’ll need a clear strategy, which you can build using our Incident Response Framework Guide.
This is not a warning about a future threat. This is a debrief of an…
Let's clear the air. The widespread fear that an army of intelligent robots is coming…
Reliance Industries has just announced it will build a colossal 1-gigawatt (GW) AI data centre…
Google has just fired the starting gun on the era of true marketing automation, announcing…
The world of SEO is at a pivotal, make-or-break moment. The comfortable, predictable era of…
Holiday shopping is about to change forever. Forget endless scrolling, comparing prices across a dozen…