Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July

Posted on August 14, 2025August 15, 2025 By CWS

The ransomware risk panorama witnessed a regarding surge in July 2025, with the Qilin ransomware group sustaining its dominant place for the third time in 4 months.

The group efficiently claimed 73 victims on its information leak website, representing 17.3% of the month’s complete 423 ransomware incidents.

This marks a big consolidation of prison operations below established risk actors, because the ransomware ecosystem continues to evolve following the decline of beforehand dominant teams like RansomHub.

Qilin’s sustained management place displays the group’s subtle operational capabilities and protracted concentrating on methods.

Ransomware group distribution (Supply – Cyble)

The ransomware-as-a-service operation has demonstrated outstanding consistency in sufferer acquisition, outpacing its closest competitor, INC Ransom, which claimed 59 victims throughout the identical interval.

America bore the brunt of those assaults, accounting for 223 victims—eight instances greater than second-place Canada—highlighting the continued give attention to high-value Western targets.

Cyble researchers recognized 25 essential infrastructure ransomware incidents all through July, with Qilin operations notably impacting sectors together with authorities and regulation enforcement, power and utilities, and telecommunications.

An extra 20 incidents confirmed potential provide chain implications attributable to compromised utility software program suppliers.

The group’s concentrating on methodology demonstrates a calculated strategy towards maximizing each monetary returns and operational disruption.

Exploitation of Enterprise Vulnerabilities

Qilin’s success stems partly from its systematic exploitation of recognized enterprise vulnerabilities.

The group has weaponized seven essential safety flaws, together with CVE-2023-48788, a SQL injection vulnerability in Fortinet FortiClientEMS affecting variations 7.2.0 by way of 7.2.2 and seven.0.1 by way of 7.0.10.

This specific vulnerability permits attackers to execute arbitrary SQL instructions by way of crafted HTTP requests:-

‘ UNION SELECT person(), database(), model()–

Extra assault vectors embrace CVE-2019-18935, concentrating on Progress Telerik UI for ASP.NET AJAX by way of deserialization assaults, and CVE-2025-5777, exploiting out-of-bounds learn circumstances in Citrix NetScaler ADC and Gateway implementations.

Microsoft SharePoint environments face specific threat by way of 4 newly recognized vulnerabilities: CVE-2025-53770, CVE-2025-53771, CVE-2025-49704, and CVE-2025-49706.

The persistence of those exploitation patterns exhibits the essential significance of proactive patch administration and vulnerability remediation applications.

Organizations should prioritize securing internet-facing functions and implementing strong community segmentation to restrict the blast radius of profitable preliminary compromise makes an attempt.

Increase your SOC and assist your staff defend what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Claimed, July, Landscape, Leads, Qilin, Ransomware, Victims

Post navigation

Previous Post: New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data
Next Post: Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery

Related Posts

Aembit Named to Rising in Cyber 2025 List of Top Cybersecurity Startups Cyber Security News
Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier Cyber Security News
GitHub Enhances NPM’s Security with Strict Authentication, Granular Tokens, and  Trusted Publishing Cyber Security News
CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS Cyber Security News
ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats Cyber Security News
Tenable Confirms Data Breach – Hackers Accessed Customers Contact Details Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News