Qilin Ransomware: Cross-Platform Attacks Leveraging Linux Payloads on Windows

The Qilin ransomware group is a high-activity RaaS threat targeting manufacturing, professional services, and wholesale sectors across North America and Europe. In order to get past security, its hybrid attacks combine BYOVD exploits, Windows and Linux payloads, and misuse of trusted IT solutions like AnyDesk and ScreenConnect. Qilin uses anti-forensics methods including log wiping and shadow copy deletion along with spear-phishing, compromised backup infrastructure, and stolen credentials to increase privileges, move laterally, and obstruct recovery. Proactive monitoring, multi-factor authentication, segmented backups, and robust credential management are crucial defenses.

Technical Description

The Qilin ransomware targets Linux and Windows systems via a complex hybrid attack chain. Usually, spear-phishing with false CAPTCHA pages, VPN exploitation, or compromised credentials are used to obtain initial access. Following compromise, the attackers employ tools such as Mimikatz, SharpDecryptPwd, and WebBrowserPassView to gather credentials, conduct network reconnaissance, and misuse genuine RMM platforms (AnyDesk, ScreenConnect, and Splashtop) for remote execution and lateral movement. Additionally, they use BYOVD drivers (like eskle.sys) to get around security measures, steal data using SMTP or SOCKS proxies, and jeopardize backup systems like Veeam. The attack ends with the deployment of ransomware that uses SystemBC and Cobalt Strike to persist, wipe logs, and delete shadow copies. The details and technicalities of the attack campaign are discussed further:

Delivery and Infection Chain:

For delivery, the Qilin ransomware organization used both social engineering and genuine IT tools. Fake CAPTCHA pages stored on Cloudflare R2 storage were frequently the source of initial access, deceiving users into running multistage payloads based on JavaScript. Credentials, browser cookies, and authentication tokens were harvested by these information hackers. Additional delivery routes included WinSCP for safe file transfer of the Linux ransomware malware to Windows PCs, and RMM platforms like ScreenConnect and ATERA Networks’ agent (deploying AnyDesk). The Infection chain was identified as follows:

  • Initially, attackers trick users into visiting fake CAPTCHA pages to harvest authentication tokens, browser cookies, and stored credentials.
  • Later, Harvested credentials enable lateral movement across Windows and Linux systems via administrative tools like ScreenConnect, AnyDesk, and PuTTY SSH clients.
  • Elevated access is achieved using SOCKS proxy DLLs loaded through rundll32.exe and creation of backdoor administrative accounts.
  • Tools such as NetScan, ScreenConnect, and PowerShell scripts are used for network mapping and credential harvesting, with a focus on Veeam backup databases to compromise disaster recovery capabilities.
  • Finally, the Qilin Linux ransomware binary is deployed on Windows systems via Splashtop Remote, encrypting files across Windows and Linux assets.

Technical Capabilities:

The Qilin ransomware demonstrates a high level of technical complexity by blending covert deployment techniques with cross-platform execution. Its Linux version circumvents conventional endpoint detection by operating on Windows systems with Splashtop Remote. The group disables security restrictions and avoids detection by utilizing BYOVD tactics with drivers like eskle.sys, rwdrv.sys, hlpdrv.sys, and fnarw.sys. Distributed SOCKS proxies are incorporated into the directories of reliable enterprise programs to conceal command-and-control communications. Targeting domain administrators and backup service accounts, PowerShell scripts, SQL queries, and authentic administrative tools enable credential theft and lateral movement. Virtual machine recognition, process termination procedures, DLL sideloading, and improved logging for fault handling are some instances of anti-analysis features. Legitimate RMM platforms, remote execution tools, and numerous proxy instances all contribute to operational stealth by allowing for continuous access while blending in with regular business operations.

Attribution and Evolution:

Using the ransomware-as-a-service (RaaS) approach, Qilin is a leading ransomware outfit. From typical Windows-focused operations, the division has transitioned to implementing Linux variations on Windows platforms, including support for hyperconverged infrastructures like Nutanix AHV. Continuous development highlights flexible tactics intended to get over contemporary endpoint defenses. It reflects little advancements in logging, fallback mechanisms, and hybrid infrastructure targeting.

Active Campaign and Geographic Spread:

Qilin has shown a worldwide operational reach from January 2025, concentrating on areas such as Japan, Western Europe, and the United States. In order to increase the potential for ransom, campaigns have regularly targeted high-value industries like manufacturing, technology, financial services, and healthcare, often taking advantage of vital infrastructure. The group’s operational practices and leak site point to opportunistic, sector-agnostic targeting motivated more by financial gain than by moral obligations.

Conclusion:

The Qilin ransomware campaign is a highly sophisticated hybrid threat model that uses legal IT tools, cross-platform payloads, and BYOVD tactics to get beyond traditional security defenses. Organizations should improve monitoring of remote management platforms, backup systems, and cross-platform execution pathways, while also implementing strong credential management, multi-factor authentication, and network segmentation. Improved visibility across hybrid systems is crucial for reducing the operational and financial risks posed by advanced ransomware activities.

Impact

Qilin attacks impact organizational operations by encrypting both production and backup systems, focusing on Veeam infrastructure and severely limiting recovery possibilities. Its cross-platform execution allows for simultaneous impact on Windows and Linux assets. Credential theft and lateral movement jeopardize enterprise domains, potentially resulting in operational disruption, financial loss, and reputational harm. Traditional endpoint security solutions struggle to detect and remediate advanced evasion and anti-analysis strategies.

IOC and Context Details

Topics Details
Tactic Name Initial Access, Credential Access, Lateral Movement, Privilege Escalation, Defense Evasion, Command & Control, Exfiltration, Impact
Technique Name Phishing / Social Engineering
Valid accounts / stolen credentials
Abuse of RMM
BYOVD
DLL sideloading
Credential dumping
SOCKS proxy-based C2
Data exfiltration
Ransomware encryption
Sub Technique Name Fake CAPTCHA pages hosted on Cloudflare R2 (JS-based loader)
WinSCP file transfer of payload
Splashtop Remote execution (SRManager.exe launching Linux binary)
eskle.sys, rwdrv.sys, hlpdrv.sys, fnarw.sys driver load (BYOVD)
msimg32.dll DLL sideloading (drops drivers)
rundll32.exe loading socks64.dll
PowerShell (base64) plus SQL queries against Veeam DB
PuTTY-based SSH lateral movement
Attack Type Malware
Targeted Applications Splashtop Remote, AnyDesk, ScreenConnect, WinSCP, PuTTY SSH, VMware ESXi paths, Nutanix AHV
Region Impacted United States, Canada, United Kingdom, France, Germany, Japan
Industry Impacted Manufacturing, Professional & scientific services, Wholesale trade, Technology, Financial services, Healthcare
IOC’s SHA-256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SHA-1
c150e4ab20d59affc62b916c2c90686f43040a9f

URLs
hxxp://185[.]141[.]216[.]127/tr.e
hxxps://pub-2149a070e76f4ccabd67228f754768dc[.]r2[.]dev/I-Google-Captcha-Continue-Latest-27-L-1[.]html
hxxps://pub-959ff112c2eb41ce8f7b24e38c9b4f94[.]r2[.]dev/Google-Captcha-Continue-Latest-J-KL-3[.]html
hxxps://chatgptitalia[.]net/
45[.]221[.]64[.]245/mot/
104[.]164[.]55[.]7/231/means.d

IPs
45[.]221[.]64[.]245
104[.]164[.]55[.]7
CVE NA

Recommended Actions

  • Enforce phishing-resistant MFA and restrict all remote access and RMM tools to authorized management systems only.
  • Segment and harden Veeam backup servers, applying least privilege access and regular credential rotation.
  • Detect and block unsigned or vulnerable driver loads to prevent BYOVD-based privilege escalation.
  • Restrict the use of remote tools like AnyDesk, Splashtop, and ScreenConnect to verified administrators.
  • Monitor for PowerShell base64 commands and SQL queries targeting credential or backup data theft.
  • Detect SOCKS proxy DLL installations and unusual rundll32.exe executions indicating stealth C2 activity.
  • Prevent DLL sideloading by enforcing application allowlisting and file integrity monitoring.
  • Maintain immutable, offline backups and test recovery procedures regularly to ensure ransomware resilience.

References

https://hackyourmom.com/en/novyny/qilin-ransomware-atakuye-gibrydno-linux-pejload-byovd-eksplojt-i-korporatyvni-rmm-instrumenty/