Qilin Ransomware Attack Impacts 104 Organizations in August

Qilin Ransomware Attack Impacts 104 Organizations in August

In August, Qilin once again reigned supreme in the global ransomware arena, claiming 104 victims and nearly doubling the total of second-place Akira, which reported 56 attacks.

This marks the fourth time in five months that Qilin topped the list, underscoring the group’s relentless expansion and sophisticated affiliate recruitment strategy.

Yet security teams cannot afford to rest easy: emerging contenders such as Sinobi and The Gentlemen are rapidly climbing the ranks and reshaping the threat landscape.

Since the decline of RansomHub in April, Qilin has addressed 398 claimed victims, representing 18.4 percent of all ransomware incidents logged over the past five months.

This figure places Qilin more than 70 percent ahead of Akira, which follows at 10.7 percent of total attacks.

Qilin’s rapid growth can be attributed to its robust affiliate program, which offers lucrative incentives and flexible ransomware-as-a-service (RaaS) models.

Affiliates departing former RansomHub or other operations find Qilin’s technical features—such as multi-tier encryption chains, anonymous payment processing, and customizable leak sites—especially attractive.

Of the 2,164 total ransomware attacks since April, Qilin has claimed 18.4%, while Akira, at 10.7%, is the only other ransomware group above 10%. 

Ransomware Group Distribution.

Despite Qilin’s dominance, Akira has maintained a steady pace, leveraging a narrower but consistent affiliate network focused primarily on mid-market enterprises. How these dynamics will shift as new groups intensify their campaigns remains a critical question for defenders.

Sinobi’s Meteoric Rise

Arguably the most intriguing development in August was the ascent of Sinobi, a newcomer that vaulted into third place after only two months of activity.

Construction, Professional Services, Manufacturing, and Healthcare remain the most targeted sectors, followed by IT and Technology companies and the Automotive and Finance industries.

Top 10 Industry wise attacks by- Ransomware Groups.
Top 10 Industry wise attacks by- Ransomware Groups.

Sinobi has claimed 41 victims so far, 39 of which are U.S.-based, with the remaining in Australia and Taiwan. Initial speculation linked Sinobi to the Lynx group due to code overlaps and similarities in data leak site design.

However, Lynx continues to post fresh victims—34 since Sinobi’s debut—suggesting the groups operate separately, perhaps under shared affiliates or collaborative pacts.

Lynx itself has ties to INC Ransom, which has claimed over 80 victims since Sinobi emerged, indicating a tightly interwoven ecosystem of RaaS players.

Sinobi’s rapid momentum stalled slightly after August 24, with only one new victim claimed in the remainder of the month.

Nonetheless, its diverse targeting—encompassing more than ten sectors, including a high-profile U.S. financial institution—reveals an ambitious and well-resourced operation.

Whether Sinobi can sustain or accelerate its pace will depend on its technical evolution and affiliate recruitment in the coming months.

Beyond Qilin, Akira, and Sinobi, September has ushered in fresh contenders. The Gentlemen group, first observed in early September, has already posted over 30 victims, hinting at yet another shift in the leaderboard.

Other notable newcomers include BlackNevas (“Trial Recovery”), which surfaced in November 2024 and now lists 12 victims across nine countries, exploiting Trigona-family code variants.

The Charon strain employs APT-style tactics reminiscent of China-linked operations against public sector and aviation targets in the Middle East.

Cephalus, first seen in early August, uses a .sss encryption extension and has listed ten victims on its onion data leak site. Intriguingly, two Cephalus victims overlap with Qilin and Kawa4096, suggesting alliance networks aimed at amplifying extortion pressure.

Ransomware activity rose to 467 incidents in August, marking the fourth consecutive monthly increase, though still below February’s record highs.

Meanwhile, LockBit has launched its 5.0 release in an effort to rebound from law-enforcement disruptions in 2024, showcasing novel evasion techniques and enhanced negotiation portals.

Construction, professional services, manufacturing, and healthcare remain the most targeted sectors, followed by IT, automotive, and finance.

Geographically, the U.S. endures the lion’s share of attacks, but Europe and Canada—particularly Germany and the U.K.—continue to experience substantial activity.

Top 10 Country wise attacks by-Ransomware groups.
Top 10 Country wise attacks by-Ransomware groups.

In APAC, BlackNevas and Dire Wolf were significant threats, with South Korea, Japan, Thailand, Singapore, and Taiwan each suffering four or more attacks.

In META, Qilin, Warlock, and INC dominated, while South America saw Brazil lead with eight attacks, chiefly by Qilin.

The ransomware arena remains fluid, with established groups like Qilin and Akira extending their reach even as Sinobi and The Gentlemen disrupt the status quo.

For cybersecurity teams, the imperative is clear: strengthen cyber resilience through rigorous network segmentation, zero trust policies, immutable backups, hardened endpoints, and proactive vulnerability management.

A well-rehearsed incident response plan, combined with continuous threat-intelligence monitoring and attack surface management, is essential to mitigate the evolving ransomware threat.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.