Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Qilin Ransomware Claims New Victims

October 17, 2025
Reading Time: 3 mins read
in News
Five Healthcare Providers Warn Patients

The Qilin ransomware-as-a-service (RaaS) operation stands out as a highly active and formidable threat to organizations globally, frequently employing extortion as a core tactic. The group recently took responsibility for a September ransomware attack that severely hampered operations and manufacturing functions at Japanese brewing conglomerate, Asahi Group Holdings, for nearly two weeks. Investigators from Resecurity engaged directly with Qilin’s operators and learned the group is attempting to sell the stolen Asahi data for a significant ransom of $10 million USD. This direct demand, received shortly after the disruption, likely serves as a tactic to bypass intermediaries and intensify the pressure on the victim organization.

Qilin continues to rapidly expand its list of compromised organizations. The group announced several new targets on October 15, including the Spanish Tax Administration Agency (Agencia Tributaria), various U.S.-based entities like Centurion Family Office Services LLC and Richmond Behavioral Health Authority (RBHA), and international companies such as Turnkey Africa and municipal bodies in France. This followed previous claims on October 14 against major victims like Volkswagen Group France, a subsidiary of Volkswagen AG. The increasing focus on the automotive industry is particularly notable, possibly inspired by the lucrative consequences of prior incidents like the data breach involving Jaguar Land Rover (JLR), or achieved through collaboration with initial access brokers (IAB) offering compromised network access on the Dark Web.

The month of October has proven to be extremely successful for Qilin, marked by a high volume of published victims and newly targeted organizations across the globe. This period demonstrates a clear and increasing focus on the United States, with attacks hitting local municipalities such as the City of Riviera Beach, Florida, and Cobb County. Overall, the group has disclosed compromising over 50 new victims spanning a wide range of market verticals and diverse geographies, including Croatia, France, Germany, South Korea, and Qatar, showcasing its transnational reach.

A critical component of the Qilin RaaS operation is its deep ties to underground bulletproof hosting (BPH) operators. These specialized providers allow cybercriminals to host their illicit content and critical infrastructure, such as command-and-control servers and data storage, in a clandestine manner that evades easy disruption by law enforcement. Since its emergence, Qilin has habitually relied on these file-sharing hosts, often situated in complex legal jurisdictions, to store the vast amounts of data stolen from its victims. The anonymity and jurisdictional challenges offered by BPH are central to the group’s ability to operate with impunity.

The covert nature of BPH services presents a significant obstacle for both cybersecurity researchers and law enforcement agencies attempting to identify and dismantle the operators and their infrastructure. This complexity severely complicates efforts to combat Qilin’s cybercrime activities and protect users. While one BPH provider linked to Qilin recently executed an “exit scam” and went private within Dark Web communities, the associated legal entities in Russia and Hong Kong reportedly remain operational as of October 15, 2025. This interconnectedness with ransomware groups like Qilin confirms the highly organized, transnational nature of modern cybercrime, which expertly exploits jurisdictional discrepancies for financial gain and to conceal its activities.

Reference:

  • Qilin Ransomware Group Announces New Victims In Latest Cyber Extortion Campaign
Tags: Cyber NewsCyber News 2025Cyber threatsOctober 2025
ADVERTISEMENT

Related Posts

Niobium Raises 23 Million For FHE Tech

Niobium Raises 23 Million For FHE Tech

December 4, 2025
Defender Outage Disrupts Threat Alerting

Arizona AG Sues Temu Over Data Theft

December 4, 2025
Niobium Raises 23 Million For FHE Tech

Google Expands Android Scam Protection

December 4, 2025
Illuminate Must Delete Student Data

Australian Jailed For WiFi Attacks

December 3, 2025
Illuminate Must Delete Student Data

Illuminate Must Delete Student Data

December 3, 2025
Police Shut Down Cryptomixer Service

India Orders Phones To Preinstall App

December 2, 2025

Latest Alerts

Record DDoS Linked To Massive Botnet

RSC Bugs Let Hackers Run Remote Code Now

WordPress Elementor Addon Flaw Exploited

Lazarus APT Remote Worker Scheme Caught

Google Fixes 107 Android Flaws In Use

Npm Package Evades AI Security Tools

Subscribe to our newsletter

    Latest Incidents

    Freedom Mobile Customer Data Breach Exposed

    Penn Phoenix Data Breach Oracle Hack Now

    Defender Outage Disrupts Threat Alerting

    Indian Airports Hit By Cyber Attack

    ChatGPT Down Worldwide Users Affected

    Sorbonne Staff Data Found On Dark Web

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial