Qilin Ransomware

Facing a Ransomware Attack or Security Breach?

When you're under threat, every second counts. If your systems have been compromised or you need urgent assistance, get in touch with us straight away.

Qilin, which is thought to have originated in Russia, has been operational since mid-2022 and has affected over 300 companies across more than 12 countries. 

When infected by Qilin (or any other type of ransomware), your systems will display a notice similar to the example shown here. This indicates that a cybercriminal group is holding your data and systems hostage, demanding payment in exchange for their release. 

Why You Should Avoid Tampering with a Ransomware-Affected System 

Just as you wouldn’t disturb a crime scene after a break-in at your office, the same rule applies to a cyber-attack. If you encounter a ransomware incident, treat your digital environment as a crime scene and refrain from making any changes. 

Allowing a digital forensic investigation to take place is essential for properly understanding the attack. This is not something to be handled by your IT team or managed service provider. Instead, contact specialised Digital Forensic experts, available around the clock, to guide you through the process, just as you would call the police in a physical break-in scenario. 

Qilin ScreenA PC Monitor

If you see a message on your system resembling the one mentioned above, it’s likely that you’ve fallen victim to a Qilin ransomware attack. 

DO NOT ATTEMPT TO TOUCH, RESTORE, OR ALTER THE DATA.

Who is Qilin and What Do They Do?

Qilin, a Ransomware-as-a-Service (RaaS) group, was first identified in July 2022. Also known by its former name "Agenda," it is thought to have emerged from Russia. This group primarily targets large corporations and high-value entities, particularly within the healthcare and education sectors. The ransomware is written in Rust and/or Go, taking advantage of their complex structures to facilitate the development of malware compatible with multiple operating systems, including Windows and Linux. 

Qilin typically strikes through phishing and spear-phishing campaigns, exploiting vulnerable applications and services such as Citrix and Remote Desktop Protocol (RDP). The group employs a double extortion strategy, using various encryption methods to hold victims’ data hostage. They demand payment for decryption and threaten to release stolen data if the ransom is not paid. 

UK Data 2025

How Does Qilin Attack? 

Qilin employs a method known as double extortion, which intensifies the pressure and urgency of their ransom demands. In this approach, the attackers not only encrypt the victim's data but also threaten to leak or sell it if their demands are not met. 

This two-pronged threat increases the likelihood of the targeted organisation complying with the ransom request. 

How Old is Qilin and How Many Attacks Have Occurred? 

Qilin is believed to have started its operations in 2022. However, like many other cybercriminal groups, it has previously operated under a different name, making the exact founding date of Qilin uncertain. 

So far, Qilin has claimed responsibility for 664 attacks. 

Most Recent Qilin Attacks
TitleAvailableLast visitfqdnScreenshots
Sign InNo2025-09-11 22:00:18.857808http://ji57fr53anp7wb44tbbnp72qcgbhqywy4jmbncawdcrejj5amuvh3zqd.onion/site/login
Qilin blogYes2026-02-24 02:01:39.296731http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion
DDOS ProtectionNo2025-06-09 13:00:11.731509http://kbsqoivihgdmwczmxkbovk7ss2dcynitwhhfu5yw725dboqo5kthfaad.onion

Solace Cyber’s track record includes hundreds of successful response recoveries, providing Digital Forensic Incident Response services, 24x7x365.

"Higher education institutions are particularly vulnerable, with 97% identifying a breach or attack in the past year."

Read more...

Steps After a Security Breach 

When a cyber incident occurs, take these immediate actions: 

  • Contact your business insurance provider straight away 
  • Review your business continuity plan to determine which operations can continue without your usual systems and data 
  • Document the incident for regulatory compliance purposes 

Solace Cyber acts as your specialist digital forensics partner in Australia, helping restore normal operations swiftly. Our response includes: 

  • Securing and isolating your environment to preserve evidence for thorough forensic analysis 
  • Tracking down where your data has been copied and executing legal removal requests 
  • Mapping out recovery points for your data, applications and systems, then carefully reconstructing them in a secure, clean environment 
  • Coordinating directly with your insurance provider and law enforcement as required 
  • Providing guidance on customer communication regarding the incident 
  • Reconstructing your infrastructure, recovering your data and returning you to complete operational status 

Recovery timelines typically range from 2 weeks to 2 months, depending on the incident's scope. 

Ransom Groups Stats by Industry

Critical infrastructure ransomware attacks 2021 bar chart

Who is Solace Cyber and what experience do they have in recovering from Qilin ransomware attacks?

Solace Cyber delivers global risk and security services across Australia, specialising in travel, crisis support, and offshore risk management. The organisation runs a fully staffed security operations centre around the clock and maintains an internal intelligence unit that produces routine daily and weekly updates. The business is certified to ISO 27001, ISO 14001, ISO 45001, and ISO 9001 standards. 

Founded in the UK in 2021, Solace Cyber has grown its presence throughout Australia, concentrating on cyber incident handling, including digital forensics, incident response, ransomware events, information security, and wider risk management, supported by managed security services. The senior leadership team has more than two decades of combined experience across security and IT. 

Solace Cyber Stats

s

Successful breach recoveries

Users recovered in largest ransomware case
We have NEVER paid a ransom
Designed automation tools to reduce costs

%+

Incident Response
delivered via our Insurance
Partners

Facing a Ransomware Attack or Security Breach?

When you're under threat, every second counts. If your systems have been compromised or you need urgent assistance, get in touch with us straight away.

What Makes Solace Cyber Better Equipped Than Internal IT Teams For Ransomware Recovery? 

Specialist forensic investigation and secure restoration demand focused expertise that standard IT departments rarely possess. Your internal teams excel at day-to-day technology support, but ransomware response requires dedicated capabilities they typically lack. 

Consider these key challenges facing in-house teams: 

  • Most internal IT staff lack the specialised training needed to tackle advanced encryption attacks 
  • Pressure to resume operations quickly can lead teams to restore systems prematurely, compromising vital forensic evidence 
  • Without thorough investigation, recovery may reintroduce the same vulnerabilities, leaving your business exposed to repeated attacks 
  • The cybersecurity skills shortage intensified throughout 2022, with CSIRT* positions remaining critically understaffed 
  • Threat actors have become significantly more sophisticated since 2024 
Ransomware recovery
Cyber Security Ransomware Red Background

We created Solace Cyber specifically to address ransomware incidents through our structured 6-phase methodology: 

  1. Triage 
  1. Analysis 
  1. Contain and Mitigate 
  1. Remediate and Eradicate 
  1. Recover 
  1. Post-Incident Examination 

Our comprehensive forensic investigation begins at phase 2, forming the foundation of your business continuity plan. This detailed analysis proves essential for: 

  • Pinpointing when the initial compromise occurred 
  • Mapping the full scope of system infiltration 
  • Assessing data theft implications for compliance requirements 
  • Guaranteeing complete removal of attacker access and malicious tools 

We execute our evidence examination according to a carefully structured protocol designed to identify root causes quickly. This discovery directly informs our eradication strategy and recovery plan, while building the evidence base for potential legal action. Through legal proceedings, we can help secure court orders preventing criminals from publishing your data, effectively nullifying their ransom demands. 

Throughout your incident response, our Digital Forensic and Incident Response specialists maintain continuous coordination. Your dedicated Incident Manager and technical leads deliver regular progress updates, manage risk documentation, and operate within your change control frameworks from initial triage through final recovery. 

Key Take Aways

  • You will lose access to your systems and data. 
  • To prevent further infection, disconnect from the internet and power down all devices, including computers. 
  • Your Office 365 account may be compromised, potentially allowing attackers to monitor your communications. Refrain from using your primary email or team systems for correspondence. 
  • Cybercriminals often infiltrate systems 2-4 weeks before the attack is discovered, meaning your data has likely already been extracted. If your system is encrypted, the breach didn’t happen overnight. 
  • Ransom demands can vary, ranging from £500,000 to £3 million. 
  • Paying the ransom could breach financial sanctions, which is a criminal act and could lead to a prison sentence or additional fines. 
  • If your data is sold or published online, it risks exposing your customers and employees to harm and may result in a Data Protection breach. 
  • You must request the removal of your data from the original location it was transferred to. 
  • Do not overwrite the encrypted data. It’s critical to identify when the infection began and where the data was sent. 
  • Avoid restoring from the most recent backup, as it’s likely infected.
How Can I Strengthen Security to Prevent Future Ransomware Attacks?

At Solace Cyber, our support goes beyond just recovery. Once your business operations are back up and running, we work closely with you to improve your cybersecurity strategy, adopting a threat-informed approach. This includes applying our in-depth process, which is specifically designed to identify and mitigate cyber threats and vulnerabilities in a thorough, systematic manner. 

Frequently asked questions

The Qilin ransomware may have infiltrated your system through several potential methods, including: 

  • Phishing or spear-phishing attacks 
  • Exploiting exposed applications like Remote Desktop Protocol (RDP) 
  • Taking advantage of system vulnerabilities 
  • Failing to apply software updates 

To reduce the risk of similar attacks, we recommend implementing the following measures: 

  • Educate your employees on cybersecurity and the consequences of non-compliance 
  • Enforce the use of strong passwords 
  • Implement multi-factor authentication (MFA) 
  • Remove inactive user accounts 
  • Perform regular backups 
  • Ensure timely software and system updates 

After the Qilin attack is resolved, Solace Cyber advises updating your business continuity plan based on the insights gained from the incident and recovery process. 

The Qilin ransomware entered your system by one of several ways:

  • Phishing and Spear-Phishing
  • Leverage exposed applications (RDP)
  • Exploit vulnerabilities
  • Not maintaining software updates

We recommend you adopt policies to:

  1. Educate your staff on the importance of cyber security and the risks of not complying
  2. Use strong passwords
  3. Multi-factor authentication
  4. Remove old users
  5. Perform regular backups
  6. Deploy timely updates to software and systems

After recovering from Qilin, Solace Cyber recommends that you update your business continuity plan to account for lessons learnt during this attack & recovery.

The financial impact of a ransomware breach can be significant, with average costs around £500K. Smaller breaches, such as those involving email data, typically cost around £50K. The longer it takes to detect and resolve the breach, the higher the costs become. A critical balance must be struck between preserving the environment for forensic analysis and quickly recovering to minimise business disruption. 

Cybersecurity insurance claims can be complex, covering a range of expenses such as investigation costs, remediation, legal fees, business interruption, criminal and employment liabilities, and ransom payments. While the insurance industry plays a role in helping businesses recover, cyber insurance is often volatile, and many policies are not properly validated. 

Navigating these complexities requires expertise, and Solace Cyber can provide the necessary support. 

Cybercriminal groups like Qilin receive payments from affiliates to deploy their ransomware, which is known for its swift encryption capabilities. Even after paying the ransom, the chances of successfully decrypting files and restoring data are slim, which highlights the importance of having a ransomware incident response team in place. 

Important Reminder: It is illegal to pay individuals who are on the financial sanctions list. This list is constantly updated, so it’s important to stay informed. 

Yes, it's possible that some of the lost data may qualify as "Personal Data" of your customers. It remains your legal obligation to protect this data, even if it has been compromised. 

Your insurer or legal advisor will provide guidance on the necessary actions and next steps in handling this situation. 

Solace Cyber has extensive experience working with insurers and legal experts and can support you in managing these relationships during this challenging time. 

A ransomware attack is one of the most severe threats to your business, as it can: 

  • Disable access to essential systems, potentially halting operations or disrupting business processes. 
  • Block access to critical data, such as information on suppliers, shipments, customers, orders, and workflows. 

In the event of a business disruption, identifying your position within the supply chain and maintaining operations becomes challenging. If the disruption continues, ensuring business continuity becomes even more critical. After restoring systems and data, it’s vital to address any backlog of work and establish future operational protocols. 

Ransomware is one of the leading causes of business incapacitation, second only to receivership. 

Under Australian law, organisations experiencing ransomware attacks must report incidents to both the Australian Signals Directorate (ASD) and the Office of the Australian Information Commissioner (OAIC), particularly when personal information is compromised, ensuring regulatory compliance and coordinated national response. 

Contact Us

Suspect a Ransomware Incident?

Keep calm and step away from your systems. 

Avoid restoring files or altering data in any way, as doing so may complicate recovery efforts. 

Reach out to Solace Cyber now on +61 (0) 282 786100 or submit our contact form to have an expert return your call. 

We’ll take swift action to minimise downtime and restore stability to your operations. 

GDPR*
Request a callback

Solace Cyber helps companies across Australia recover from ransomware attacks and data breaches.

Ransomware Recovery
Ransomware Groups
BEC Recovery
About Us
Blog
News

SOLACE CYBER LTD is registered in England & Wales no. 08830710

Incident Response Winner 2025

Solace Cyber

Zensec Ltd,
60 Martin Place,
Sydney,
NSW 2000

Telephone

Please note that calls may be recorded for security and training purposes.