Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures

Posted on May 8, 2025May 8, 2025 By CWS

Might 08, 2025Ravie LakshmananThreat Intelligence / Ransomware
Risk actors with ties to the Qilin ransomware household have leveraged malware referred to as SmokeLoader together with a beforehand undocumented .NET compiled loader codenamed NETXLOADER as a part of a marketing campaign noticed in November 2024.
“NETXLOADER is a brand new .NET-based loader that performs a essential function in cyber assaults,” Development Micro researchers Jacob Santos, Raymart Yambot, John Rainier Navato, Sarah Pearl Camiling, and Neljorn Nathaniel Aguas stated in a Wednesday evaluation.
“Whereas hidden, it stealthily deploys extra malicious payloads, similar to Agenda ransomware and SmokeLoader. Protected by .NET Reactor 6, NETXLOADER is tough to investigate.”
Qilin, additionally referred to as Agenda, has been an lively ransomware menace because it surfaced within the menace panorama in July 2022. Final yr, cybersecurity firm Halcyon found an improved model of the ransomware that it named Qilin.B.

Latest information shared by Group-IB reveals that disclosures on Qilin’s information leak web site have greater than doubled since February 2025, making it the highest ransomware group for April, surpassing different gamers like Akira, Play, and Lynx.
“From July 2024 to January 2025, Qilin’s associates didn’t disclose greater than 23 corporations per 30 days,” the Singaporean cybersecurity firm stated late final month. “Nevertheless, […] since February 2025 the quantity of disclosures have considerably elevated, with 48 in February, 44 in March and 45 within the first weeks of April.”

Qilin can be stated to have benefited from an inflow of associates following RansomHub’s abrupt shutdown in the beginning of final month. In line with Flashpoint, RansomHub was the second-most lively ransomware group in 2024, claiming 38 victims within the monetary sector between April 2024 and April 2025.
“Agenda ransomware exercise was primarily noticed in healthcare, know-how, monetary companies, and telecommunications sectors throughout the U.S., the Netherlands, Brazil, India, and the Philippines,” in keeping with Development Micro’s information from the primary quarter of 2025.
NETXLOADER, the cybersecurity firm stated, is a extremely obfuscated loader that is designed to launch next-stage payloads retrieved from exterior servers (e.g., “bloglake7[.]cfd”), that are then used to drop SmokeLoader and Agenda ransomware.
Protected by .NET Reactor model 6, it additionally incorporates a bevy of tips to bypass conventional detection mechanisms and resist evaluation efforts, similar to using just-in-time (JIT) hooking strategies, and seemingly meaningless technique names, and management stream obfuscation.

“The operators’ use of NETXLOADER is a significant leap ahead in how malware is delivered,” Development Micro stated. “It makes use of a closely obfuscated loader that hides the precise payload, which means you may’t know what it really is with out executing the code and analyzing it in reminiscence. Even string-based evaluation will not assist as a result of the obfuscation scrambles the clues that will usually reveal the payload’s identification.”
Assault chains have been discovered to leverage legitimate accounts and phishing as preliminary entry vectors to drop NETXLOADER, which then deploys SmokeLoader on the host. The SmokeLoader malware proceeds to carry out a collection of steps to carry out virtualization and sandbox evasion, whereas concurrently terminating a hard-coded listing of working processes.
Within the remaining stage, SmokeLoader establishes contact with a command-and-control (C2) server to fetch NETXLOADER, which launches the Agenda ransomware utilizing a method referred to as reflective DLL loading.
“The Agenda ransomware group is frequently evolving by including new options designed to trigger disruption,” the researchers stated. “Its various targets embrace area networks, mounted gadgets, storage methods, and VCenter ESXi.”

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:April, Data, Disclosures, Highest, Leak, Qilin, Ranked, Ransomware

Post navigation

Previous Post: IXON VPN Client Vulnerability Let Attackers Escalate Privileges
Next Post: Europol Announces More DDoS Service Takedowns, Arrests

Related Posts

251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch The Hacker News
Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks The Hacker News
Iran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal Malware The Hacker News
U.S. Arrests Key Facilitator in North Korean IT Worker Scheme, Seizes $7.74 Million The Hacker News
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise The Hacker News
Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News