Original Article Text

Click to Toggle View

New Qilin ransomware encryptor features stronger encryption, evasion. A new Rust-based version of the Qilin (Agenda) ransomware strain, dubbed 'Qilin.B,' has been spotted in attacks, featuring stronger encryption, better evasion from security tools, and the ability to disrupt data recovery mechanisms. Qilin.B was spotted by security researchers at Halcyon, who warned about the threat and shared indicators of compromise to help with early detection. Qilin updates its encryptor Starting with the new encryption scheme, Qilin.B users AES-256-CTR with AESNI capabilities for CPUs that support it, speeding up the encryption. However, the new strain retains ChaCha20 for weaker or older systems that don't have the appropriate hardware for AESNI, ensuring robust encryption in any case. Qilin.B also incorporates RSA-4096 with OAEP padding for encryption key protection, making decryption nearly impossible without the private key or captured seed values. Upon execution, the new Qilin malware adds an autorun key in the Windows Registry for persistence and terminates the following processes to free up critical data for encryption and disable security tools. Existing volume shadow copies are wiped to prevent easy system restoration, and Windows Event Logs are cleared to hinder forensic analysis. The ransomware binary is also deleted after the encryption process has been completed. Qilin.B targets both local directories and network folders and generates ransom notes for each directory processed, including the victim ID in the title. For maximum reach, it modified the Registry with a separate entry to enable sharing of network drives between elevated and non-elevated processes. Although the above are not ground-breaking features in the ransomware space, they can have a severe and far-reaching impact when they're added to a family used by notorious threat groups in highly effective attacks. Last August, Sophos revealed that Qilin deploys a custom info-stealer in attacks to collect credentials stored in the Google Chrome browser and extend their attacks to entire networks or re-introduce itself on breached networks even after cleanups. Previously, Qilin was used in highly damaging attacks against major London hospitals, Court Services Victoria in Australia, and automotive giant Yanfeng. The group also uses a Linux variant focused on VMware ESXi attacks, but the variant Halcyon spotted concerns Windows systems.

Daily Brief Summary

MALWARE // Qilin.B Ransomware Introduces Stronger Encryption and Evasion Tactics

The new Qilin.B ransomware variant uses robust AES-256-CTR and ChaCha20 encryption methods, enhancing data encryption across different system capabilities.

It features RSA-4096 with OAEP padding for additional security on encryption keys, significantly complicating decryption efforts without the private key.

Designed to evade detection, Qilin.B terminates several critical processes and clears system logs to hinder forensic analysis and security measures.

It deletes shadow copies and modifies system registries to prevent data recovery and maintain persistence in infected networks.

The ransomware automatically spreads through local and network folders, generating customized ransom notes that include victim IDs.

Previously, Qilin variants have been involved in significant breaches, targeting major institutions like London hospitals and global firms like Yanfeng.

The malware’s ability to steal credentials and infiltrate entire networks poses a continuing threat, particularly to Windows systems.