

FormBook Malware – Active IOCs
June 16, 2025
Multiple IBM Products Vulnerabilities
June 16, 2025
FormBook Malware – Active IOCs
June 16, 2025
Multiple IBM Products Vulnerabilities
June 16, 2025Severity
High
Analysis Summary
Qilin ransomware, formerly known as Agenda, is a Russian-speaking ransomware-as-a-service (RaaS) operation that emerged in July 2022. Known for its high adaptability, Qilin enables affiliates to customize attacks, targeting both Windows and Linux/ESXi systems. It employs double extortion tactics—encrypting files and exfiltrating data to pressure victims into paying ransoms. Initial access is typically achieved through phishing emails, exploitation of known vulnerabilities, or compromised RDP and VPN credentials. Qilin uses various evasion methods, including disabling event logs and booting systems into Safe Mode to bypass security tools.
In 2024–2025, Qilin launched several major campaigns, including a high-impact ransomware attack on Synnovis, a UK-based healthcare provider, affecting NHS hospitals and compromising up to 300 million patient records. It has also targeted municipal systems in the U.S. and educational institutions, with victims across healthcare, manufacturing, education, government, critical infrastructure, and technology sectors. Countries affected by Qilin include the United Kingdom, United States, France, Brazil, Germany, Japan, Australia, and the UAE. Although sophisticated, Qilin is not attributed to any nation-state APT group and is classified as a financially motivated cybercrime group, making it a growing global threat to essential services and critical infrastructure.

Impact
- Exposure of Sensitive Information
- Operational Disruption
- Financial Loss
- Reputational Damage
Indicators of Compromise
MD5
- 24a8fcd08d9e40d32929b57de9b15385
- 996c394d0f6d6967df9542c52f6f4661
- 420a2c53386678396f972f09cc7f3a5c
- 5cffa3126b9effc279d32b2cf4ef2278
SHA-256
- db7b88dfbc16f4798b30c135a1e305d11b201ca3d9b600f2b2f3306f0ad32b18
- 76dfbf622b6846653eff769e047efedc7a9fdbb00c939965d555da7aef460a5d
- 906f88817e3bf1bd4e800cf798650f3a309c81ee9b78c2a37d9118ce2567ae3d
- 78b6552fe4e7afbd21d8494dd19c056e16316b7aabdbaf746f5511a2dc2c542c
SHA1
- d322af1dd8739da274f4d9085ffcc2878d571de6
- cb77734eda7de79cd8ccedfb70f2a26c4c2847ad
- a3700e915649c1cc12b72ea2a41ba894a0354aec
- 461ee9cb48d94ba4080ed6c28a7676d5512f59a0
Remediation
- Isolate infected systems immediately to contain the threat
- Disconnect affected devices from the internet and local networks
- Block all known indicators of compromise across security controls
- Conduct a full forensic investigation to determine the scope of the attack
- Use reputable antivirus or EDR tools to remove the ransomware
- Restore encrypted files from clean, offline backups
- Reset all user credentials, especially for administrative accounts
- Patch all exploited vulnerabilities in systems and applications
- Enable multi-factor authentication across all critical systems
- Implement network segmentation to limit lateral movement
- Conduct regular vulnerability assessments and penetration testing
- Educate employees about phishing and social engineering risks
- Monitor system logs and network traffic for unusual activity
- Develop and test an incident response and disaster recovery plan
- Regularly back up important data and store it in secure, isolated environments