Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July

Posted on August 14, 2025August 15, 2025 By CWS

The ransomware risk panorama witnessed a regarding surge in July 2025, with the Qilin ransomware group sustaining its dominant place for the third time in 4 months.

The group efficiently claimed 73 victims on its information leak website, representing 17.3% of the month’s complete 423 ransomware incidents.

This marks a big consolidation of prison operations below established risk actors, because the ransomware ecosystem continues to evolve following the decline of beforehand dominant teams like RansomHub.

Qilin’s sustained management place displays the group’s subtle operational capabilities and protracted concentrating on methods.

Ransomware group distribution (Supply – Cyble)

The ransomware-as-a-service operation has demonstrated outstanding consistency in sufferer acquisition, outpacing its closest competitor, INC Ransom, which claimed 59 victims throughout the identical interval.

America bore the brunt of those assaults, accounting for 223 victims—eight instances greater than second-place Canada—highlighting the continued give attention to high-value Western targets.

Cyble researchers recognized 25 essential infrastructure ransomware incidents all through July, with Qilin operations notably impacting sectors together with authorities and regulation enforcement, power and utilities, and telecommunications.

An extra 20 incidents confirmed potential provide chain implications attributable to compromised utility software program suppliers.

The group’s concentrating on methodology demonstrates a calculated strategy towards maximizing each monetary returns and operational disruption.

Exploitation of Enterprise Vulnerabilities

Qilin’s success stems partly from its systematic exploitation of recognized enterprise vulnerabilities.

The group has weaponized seven essential safety flaws, together with CVE-2023-48788, a SQL injection vulnerability in Fortinet FortiClientEMS affecting variations 7.2.0 by way of 7.2.2 and seven.0.1 by way of 7.0.10.

This specific vulnerability permits attackers to execute arbitrary SQL instructions by way of crafted HTTP requests:-

‘ UNION SELECT person(), database(), model()–

Extra assault vectors embrace CVE-2019-18935, concentrating on Progress Telerik UI for ASP.NET AJAX by way of deserialization assaults, and CVE-2025-5777, exploiting out-of-bounds learn circumstances in Citrix NetScaler ADC and Gateway implementations.

Microsoft SharePoint environments face specific threat by way of 4 newly recognized vulnerabilities: CVE-2025-53770, CVE-2025-53771, CVE-2025-49704, and CVE-2025-49706.

The persistence of those exploitation patterns exhibits the essential significance of proactive patch administration and vulnerability remediation applications.

Organizations should prioritize securing internet-facing functions and implementing strong community segmentation to restrict the blast radius of profitable preliminary compromise makes an attempt.

Increase your SOC and assist your staff defend what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Claimed, July, Landscape, Leads, Qilin, Ransomware, Victims

Post navigation

Previous Post: New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data
Next Post: Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery

Related Posts

Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware Cyber Security News
Weaponized PyPI Package Steals Solana Private Keys Via Supply Chain Attack Cyber Security News
Insider Threats in 2025 Detection and Prevention Strategies Cyber Security News
Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity Cyber Security News
Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services Cyber Security News
Threat Intelligence That Powers Best SOCs Worldwide Is Now Free   Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery
  • Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July
  • New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data
  • New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability
  • How to Secure Your Online Banking Account

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery
  • Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July
  • New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data
  • New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability
  • How to Secure Your Online Banking Account

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News