Cyber Security News

Qilin Operators Imitate ScreenConnect Login Page to Deploy Ransomware and Gain Admin Access

In a recent cyberattack attributed to the Qilin ransomware group, threat actors successfully compromised a Managed Service Provider (MSP) by mimicking the login page of ScreenConnect, a popular Remote Monitoring and Management (RMM) tool.

The attack, which occurred in January 2025, highlights the growing sophistication of phishing campaigns targeting MSPs to exploit downstream customers.

Sophos’ Managed Detection and Response (MDR) team identified this incident as part of a broader campaign linked to STAC4365, a threat cluster active since 2022.

Using advanced techniques such as adversary-in-the-middle (AITM) frameworks and multi-factor authentication (MFA) bypasses, the attackers gained administrative access to the MSP’s ScreenConnect environment, enabling them to deploy ransomware across multiple customer networks.

Attack Chain Analysis

The attack began with a highly convincing phishing email sent to an MSP administrator.

The email mimicked an authentication alert from ScreenConnect, urging the recipient to review a security notification.

The embedded link redirected the victim to a malicious domain cloud.screenconnect[.]com.ms designed to replicate the legitimate ScreenConnect login page.

Once credentials were entered, the phishing site acted as a proxy, forwarding them to the legitimate ScreenConnect portal while intercepting both login details and time-based one-time passwords (TOTPs).

The phishing email received by the targeted administrator

This allowed the attackers to bypass MFA protections and authenticate as the MSP’s super administrator.

With full administrative privileges, the attackers deployed their own malicious ScreenConnect instance across multiple customer environments.

This enabled them to conduct network reconnaissance, reset user credentials, and execute commands remotely.

They also utilized tools like PsExec, WinRM, and exploits targeting vulnerabilities such as CVE-2023-27532 in Veeam Cloud Backup services to escalate their access further.

Deployment of Qilin Ransomware

After gaining control of the MSP’s environment, the attackers launched Qilin ransomware a Ransomware-as-a-Service (RaaS) program previously known as “Agenda.”

Qilin is known for its double extortion tactics, where victims face both data encryption and public exposure threats via leak sites hosted on Tor or platforms like “WikiLeaksV2.”

The WikiLeaksV2 web site

Sophos researchers noted that each customer impacted by this attack received a unique ransomware binary with distinct passwords and ransom notes tailored for individual victims.

The ransomware was programmed to disable security features such as Volume Shadow Copy Service (VSS), delete Windows Event Logs, and prevent system recovery by targeting backups.

The Qilin group’s activities underscore the risks associated with supply chain attacks targeting MSPs.

By compromising a single provider, attackers gain access to multiple downstream organizations, amplifying their impact.

This incident also highlights how phishing campaigns have evolved to bypass traditional MFA protections using AITM techniques.

To mitigate such risks, organizations should:

  • Implement phishing-resistant authentication methods like FIDO2-based solutions.
  • Restrict access to critical applications through conditional access policies tied to managed devices.
  • Conduct regular training for employees to identify phishing attempts and suspicious domains.
  • Enable endpoint protection mechanisms that guard against safe mode restarts and other evasion tactics.

Sophos has provided detailed indicators of compromise (IOCs) for STAC4365 and Qilin on its GitHub page to assist defenders in identifying similar threats in their environments.

As ransomware groups continue refining their methods, proactive defense measures remain essential for safeguarding critical infrastructure and sensitive data.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

The State of AI Malware and Defenses Against It

AI has recently been added to the list of things that keep cybersecurity leaders awake.…

23 minutes ago

Rogue Account‑Creation Flaw Leaves 100 K WordPress Sites Exposed

A severe vulnerability has been uncovered in the SureTriggers WordPress plugin, which could leave over…

23 minutes ago

GOFFEE Deploys PowerModul in Coordinated Strikes on Government and Energy Networks

The threat actor known as GOFFEE has launched a series of targeted attacks against critical…

26 minutes ago

A Seven‑Year‑Old Cisco Flaw Now Lets Hackers Execute Code Remotely on Network Gear

A Cisco’s Smart Install protocol (CVE-2018-0171), first patched in 2018, remains a pervasive threat to…

28 minutes ago

RansomHub RaaS in Disarray After Affiliate Chat Access Suddenly Revoked

RansomHub, a leading Ransomware-as-a-Service (RaaS) group that emerged in early 2024, has found itself grappling…

31 minutes ago

Sapphire Werewolf Upgrades Arsenal With Amethyst Stealer Targeting Energy Firms

Sapphire Werewolf has introduced a potent new weapon into its cyber arsenal, unveiling the latest…

35 minutes ago