Back to Blog

Dark Web Most Wanted: Qilin

DarkWebSonar Research Team
August 29, 2025
6 min read
Last updated: August 29, 2025
ransomware dark-web-most-wanted threat-actor

Qilin tops DarkWebSonar's Dark Web Most Wanted list with 442 victims in 2025, targeting industries from construction to healthcare with aggressive double-extortion tactics.

Threat Actor Icon

  • Name: Qilin
  • Type: Ransomware Group
  • First Seen: Oct 2024
  • Last Seen: Aug 2025
  • Risk Level: High

Introduction

Qilin has rapidly risen to become one of the most active ransomware groups in 2025. With 442 confirmed victim posts tracked by DarkWebSonar this year, the group tops our list of Dark Web Most Wanted actors. Known for aggressive targeting across multiple industries, Qilin exemplifies how leak sites are being weaponized to pressure victims into paying ransoms.


By the Numbers (DarkWebSonar Data)

  • Victim posts (2025 YTD): 442
  • Rank: #1 most active group
  • Activity trend: Significant surge in Q2 2025
  • Top targeted industries:
    • Building & Construction – 28 victims
    • Manufacturing – 23 victims
    • Healthcare – 21 victims
    • Automotive – 21 victims
    • Financial Services – 17 victims
  • Geographies: Predominantly U.S. and Europe, but with victims across multiple regions.

Trends


Tactics, Techniques & Procedures (TTPs)

Extortion Strategy

  • Double extortion: Combines data encryption with data theft and leak threats
  • Escalation tactics: Progresses from private negotiations to public data releases
  • Leak site behavior: Publishes victim names, company logos, and sample files with to maximize pressure

Initial Access Methods

  • Spear phishing campaigns: Deploys malicious attachments targeting specific organizations
  • Compromised credentials: Exploits stolen VPN credentials and Remote Desktop Protocol (RDP) access
  • Supply chain attacks: Targets Managed Service Providers (MSPs) to gain access to multiple downstream victims
  • Vulnerability exploitation: Recent campaigns heavily focused on Fortinet vulnerability exploitation (CVE-2024-21762 and CVE-2024-55591)

Technical Capabilities

  • Cross-platform ransomware: Deploys variants targeting Windows, Linux, and VMware ESXi environments
  • Multi-language development: Written in both Go and Rust programming languages for enhanced performance
  • Customizable encryption: Features configurable encryption modes and advanced evasion techniques
  • Automated exploitation: Provides affiliates with automated tools for vulnerability exploitation

Business Model & Operations

  • Ransomware-as-a-Service (RaaS): Operates affiliate program with 80-85% commission structure
  • Legal support services: Recently introduced "Call Lawyer" feature providing affiliates with legal guidance
  • Targeting approach: Wide, cross-sector focus with opportunistic methodology based on exploitable vulnerabilities

Notable Campaigns / Victims

  • Multiple high-profile victims across manufacturing and healthcare sectors
  • Known to target supply chain partners, amplifying downstream impact
  • Recent major attack: Nissan confirmed breach exposing 4TB of design data (August 2025)
  • Aggressive posting style: uses branding and public threats to pressure negotiations
  • Data validation tactics: Publishes sensitive executive information (driving licenses, salary details) as proof of compromise

Evolution & Trends

  • Emergence: Gained momentum in 2024, but saw explosive growth in 2025
  • Trend: 80% activity surge in Q2 2025 compared to Q1
  • Trajectory: While some groups consolidated or went offline, Qilin expanded its footprint and visibility
  • Technical evolution: Continuous development of cross-platform capabilities and evasion techniques
  • Operational maturity: Enhanced affiliate support systems and legal advisory services

DarkWebSonar Insights

Unlike traditional reports that summarize ransomware activity quarterly, DarkWebSonar tracks victim postings in real time. This allows us to identify:

  • Qilin's precise industry targeting patterns (construction, manufacturing, healthcare)
  • Rapid shifts in activity, including their Q2 surge while other groups declined
  • Early warning when victims are named on their leak site, often before public disclosure
  • Exploitation campaign timing: Real-time correlation between vulnerability disclosures and Qilin attack waves
  • Affiliate recruitment patterns: Monitoring of RaaS program expansion and commission structure changes

Threat Intelligence Indicators

Key Vulnerabilities Exploited

  • CVE-2024-21762: Fortinet out-of-bounds write vulnerability enabling remote code execution
  • CVE-2024-55591: Fortinet authentication bypass vulnerability for privilege escalation

Attack Progression Timeline

  1. Initial compromise through phishing, credential theft, or vulnerability exploitation
  2. Lateral movement and privilege escalation within target networks
  3. Data exfiltration prior to encryption deployment
  4. Ransomware deployment across Windows, Linux, and ESXi systems
  5. Extortion initiation with leak site posting and negotiation demands

Outlook

Qilin shows no sign of slowing down. With consistent targeting of critical sectors and adoption of advanced exploitation tactics, the group is expected to remain a top ransomware threat into late 2025. Their diversified victim pool suggests they are opportunistic but capable of focusing on industries most likely to pay. The group's recent technical innovations and enhanced affiliate support systems indicate continued operational sophistication and expansion.


Conclusion

Qilin exemplifies how ransomware groups use the dark web as a weapon of pressure. By naming and shaming victims on leak sites, they turn operational compromise into reputational and regulatory leverage. The group's evolution from a traditional ransomware operation to a sophisticated RaaS platform with comprehensive affiliate support demonstrates the maturation of cybercriminal enterprises in 2025.

👉 Dark Web Most Wanted profiles are powered by DarkWebSonar's continuous monitoring of ransomware leak sites. Want real-time visibility into groups like Qilin? Contact Sales.

Ready to enhance your threat intelligence?

Start monitoring dark web threats with DarkWebSonar's comprehensive platform.

Related Posts

More related content coming soon...

View all blog posts →