Sunday, May 18, 2025
Homecyber securityResearchers Uncovered RansomHub Operation and it's Relation With Qilin Ransomware

Researchers Uncovered RansomHub Operation and it’s Relation With Qilin Ransomware

Published on

SIEM as a Service

Follow Us on Google News

Security researchers have identified significant connections between two major ransomware-as-a-service (RaaS) operations, with evidence suggesting affiliates from the recently-disabled RansomHub group may have migrated to the Qilin ransomware operation.

The investigation reveals sophisticated technical capabilities within both groups and highlights the dynamic nature of ransomware ecosystems.

RansomHub’s Technical Arsenal and Rise to Prominence

RansomHub emerged in February 2024 following a suspected acquisition of web application and ransomware source code from the Knight (formerly Cyclops) operation.

- Advertisement - Google News

The group quickly gained notoriety for its sophisticated multi-platform ransomware that targets Windows, Linux, FreeBSD, and ESXi operating systems across x86, x64, and ARM architectures.

This versatility enabled affiliates to encrypt both local and network file systems via SMB and SFTP protocols.

What distinguished RansomHub was its aggressive affiliate-friendly business model, offering a remarkably low 10% commission fee (later increased to 15%), significantly below the industry standard of 20-30%.

This approach successfully attracted former members from competing groups including LockBit and ALPHV, who were facing increased pressure from law enforcement actions.

According to researchers, this low-fee strategy helped RansomHub attack over 200 victims across multiple sectors including infrastructure, IT, government, healthcare, and financial services.

Operational Disruption and Underground Market Shifts

On April 1, 2025, RansomHub’s infrastructure unexpectedly went offline.

Prior to this disruption, the group had been actively recruiting affiliates by exploiting competitor vulnerabilities, specifically highlighting law enforcement operations against LockBit and ALPHV’s alleged exit scam.

Their recruitment strategy emphasized affiliate autonomy in communication and payment collection.

The shutdown occurred shortly after the advertisement of a “Ransomware Cartel” on the RAMP underground forum by an entity known as DragonForce.

This timing has raised questions about possible connections between these events and created significant uncertainty in the cybercriminal underground.

Qilin’s Suspicious Activity Surge and Connection Evidence

Following RansomHub’s disappearance, researchers observed a dramatic increase in activity from the Qilin ransomware group.

Qilin, operational since July 2022, historically maintains a strict RaaS model offering affiliates 80% of ransom payments under $3 million and 85% for larger amounts.

The most compelling evidence of migration between the groups is the timing of Qilin’s increased activity. From July 2024 to January 2025, Qilin never disclosed more than 23 victim companies per month, but this number doubled to 48 in February 2025, with similar levels in March and April.

Simultaneously, a Qilin administrator known as “Haise” became unusually active on underground forums, advertising a new ransomware version released precisely on April 1st-the same day RansomHub went offline.

Technical analysis indicates both operations use similar encryption techniques and affiliate panel designs, with Qilin’s ransomware written in both Golang and Rust programming languages.

These developments suggest a potential organizational shift as affiliates seek new platforms following RansomHub’s disruption.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Mayura Kathir
Mayura Kathirhttps://gbhackers.com/
Mayura Kathir is a cybersecurity reporter at GBHackers News, covering daily incidents including data breaches, malware attacks, cybercrime, vulnerabilities, zero-day exploits, and more.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...