CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Qilin Ransomware Incident Analysis

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Huntress Labs investigated a Qilin ransomware incident where the Huntress agent was installed post-incident on a single endpoint. Analysts pieced together the attack timeline using limited data sources, including managed antivirus alerts, Windows Event Logs, and Program Compatibility Assistant logs. The threat actor used a rogue ScreenConnect instance to deploy malicious files, including an infostealer, and attempted to disable Windows Defender before deploying ransomware.

Timeline

  1. 22.11.2025 15:45 1 articles · 23h ago

    Qilin Ransomware Incident Analysis

    On October 8, 2025, the threat actor accessed the endpoint and installed a rogue ScreenConnect instance. On October 11, 2025, three files were transferred to the endpoint via ScreenConnect. The threat actor attempted to disable Windows Defender and execute malicious files, but both attempts failed. Windows Defender detected attempts to create ransom notes, indicating the ransomware was likely launched from another endpoint.

    Show sources

Information Snippets