Qilin attacks Molnar & Bischof

Incident Date: Jan 10, 2024

Attack Overview
VICTIM
Molnar & Bischof
INDUSTRY
Business Services
LOCATION
Germany
ATTACKER
Qilin
FIRST REPORTED
January 10, 2024

Qilin Ransomware Group's Attack on Molnar & Bischof

Qilin ransomware group claimed an attack on Molnar & Bischof. The group reportedly exfiltrated various documents, including financial data, invoices, and customers’ data. Molnar & Bishop is a tax advisor in Schwabach, near Nuremberg. Qilin, a Ransomware-as-a-Service (RaaS) operation, uses a Rust-based ransomware to carry out targeted attacks on its victims.

How Qilin Operates

Each Qilin ransomware attack employs tactics such as altering the filename extensions of encrypted files and terminating specific processes and services. The utilization of Rust as the ransomware's foundation proves particularly effective due to its evasive nature and inherent complexity, allowing for seamless customization across various operating systems such as Windows, Linux, and others. Notably, the Qilin ransomware group can generate samples for both Windows and ESXi versions.

Qilin's Dark Web Presence

Qilin promotes its ransomware on the dark web, utilizing a proprietary DLS (Dedicated Leak Site) that contains distinctive company identifiers and leaked account information, as uncovered by experts from Group-IB Threat Intelligence.

Double Extortion Technique

The operators behind Qilin employ a double extortion technique, whereby they not only encrypt a victim's sensitive data but also exfiltrate it. Subsequently, they demand payment for a decryptor and insist on the non-disclosure of stolen data even after the ransom has been paid. Qilin ransomware features multiple encryption modes, all under the control of the operator.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.