Close Menu
Edu Expertise Hub
    Facebook X (Twitter) Instagram
    Sunday, November 30
    • About us
    • Contact
    • Submit Coupon
    Facebook X (Twitter) Instagram YouTube
    Edu Expertise Hub
    • Home
    • Udemy Coupons
    • Best Online Courses and Software Tools
      • Business & Investment
      • Computers & Internet
      • eBusiness and eMarketing
    • Reviews
    • Jobs
    • Latest News
    • Blog
    • Videos
    Edu Expertise Hub
    Home » Latest News » New Qilin tactics a ‘bonus multiplier’ for ransomware chaos
    Latest News

    New Qilin tactics a ‘bonus multiplier’ for ransomware chaos

    TeamBy TeamAugust 24, 2024No Comments5 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    New Qilin tactics a ‘bonus multiplier’ for ransomware chaos
    Share
    Facebook Twitter LinkedIn Pinterest Email


    The cyber criminal Qilin ransomware gang seems to be upping the stakes in its ransomware attacks, stealing not just their victims’ data, but harvesting credentials stored within Google Chrome browsers on their endpoints, something that has never been observed before.

    Described as a “bonus multiplier for the chaos already inherent in ransomware situations” by the Sophos X-Ops research team that first uncovered the novel technique, the wholesale theft of credentials that employees have innocently stored in their work browsers under the impression that they will be safe is of grave concern. Indeed, the implications could reach far beyond just the targeted organisation.

    Qilin, which most famously attacked pathology lab services provider Synnovis in June 2024, causing chaos across the NHS in London, had previously used the standard double extortion technique, but in July 2024, Sophos’ incident responders spotted weird activity on a single domain controller within a victim’s Active Directory domain.

    The gang first obtained access via compromised credentials taken from a VPN portal that lacked multifactor authentication (MFA). Then, 18 days later, its operatives started to conduct lateral movement to a domain controller, where they edited the default domain policy to introduce a logon-based Group Policy Object (GPO).

    Th first of these was a PowerShell script that was written to a temporary directory within the shared NTFS directory on the domain controller. This 19-line script attempted to harvest credential data stored within Chrome. The second item was a batch script that contained the commands to execute the first. The combo resulted in the exfiltration of credentials saved on machines connected to the network, and because the two scripts were contained in a logon GPO, they were able to execute on every client when it logged in.

    The X-Ops team said Qilin’s operatives seemed so confident this would not be noticed that they left the GPO active for three days – plenty of time for the majority of users to logon to their devices and inadvertently trigger the script. Additionally, once the files containing the credential data were gone, Qilin deleted all the files and cleared the event logs for both the domain controller and the user devices. Only then did they start to encrypt the victim’s files and drop their ransom note.

    The research team, comprising Sophos’ Lee Kirkpatrick, Paul Jacobs, Harshal Gosalia and Robert Weiland, said it was only natural that Qilin had targeted Chrome in this way – it holds a majority share of the browser market and according to an April 2024 NordPass survey, the average user has almost 90 work-related passwords, not to mention personal ones, to manage.

    !A successful compromise of this sort would mean that not only must defenders change all Active Directory passwords; they should also, in theory, request that end users change their passwords for dozens, potentially hundreds, of third-party sites for which the users have saved their username-password combinations in the Chrome browser,” the team wrote.

    “The defenders of course would have no way of making users do that. As for the end-user experience, though virtually every internet user at this point has received at least one ‘your information has been breached’notice from a site that has lost control of their users’ data, in this situation it’s reversed – one user, dozens or hundreds of separate breaches.”

    Ransomware gangs are of course known to continuously change up their tactics, techniques and procedures (TTPs) and are – unfortunately – competent innovators when it comes to expanding their repertoire.

    In this light, said the X-Ops team, that Qilin would look to change things up having been active for around two years was entirely predictable. However, they concluded, if they are now mining for endpoint-stored credentials, they and others could much more easily get their feet in the door at follow-on targets, or gain useful information on individuals of interest for targeted spear-phishing attacks.

    “A dark new chapter may have opened in the ongoing story of cyber crime,” the team said.

    What do I do now?

    Google touts its Password Manager service as an “effortless” way to help users sign into sites and apps across devices without needing to remember or reuse passwords. The feature is built into Chrome on all platforms, and in every Android application as well.

    However, browser-based password managers are far from the last word in security, and are often found to be at risk. Although doing so adds more friction for users, best practice is to use a password manager application, taking care to select one that follows industry best practices for development, and has been tested and assured by a third-party.

    In the attack chain described by the X-Ops team, MFA would have been an effective preventative measure as it would have likely prevented Qilin from ever gaining access to any of the victim’s systems. The good news is that MFA use is rising among businesses, but adoption levels still drop off dramatically among SMEs.

    “Speaking bluntly, businesses must do better, for their own safety – and in this case, the safety of other companies as well,” the team concluded.

    Computer Weekly contacted Google for comment, but had not received a response at the time of publication.

    This post is exclusively published on eduexpertisehub.com

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Team

      Related Posts

      UK government commits to Loan Charge settlement reforms in wake of independent review into policy

      November 30, 2025

      Resilient learning begins with Zero Trust and cyber preparedness

      November 30, 2025

      CCRC refers case based on third faulty Post Office system

      November 29, 2025

      Rethinking icebreakers in professional learning

      November 29, 2025

      Can business software empower rather than control workers?

      November 28, 2025

      Children Thrive When Teachers and Parents Act Like Allies

      November 28, 2025
      Courses and Software Tools

      Welcome to AI: A Human Guide to Artificial Intelligence

      March 20, 2024125 Views

      Extreme Privacy: What It Takes to Disappear

      August 24, 202481 Views

      Modern C++ Programming Cookbook: Master Modern C++ with comprehensive solutions for C++23 and all previous standards

      September 18, 202434 Views

      Meebook E-Reader M7 | 6.8′ Eink Carta Screen | 300PPI Smart Light | Android 11 | Ouad Core Processor | Out Speaker | Support Google Play Store | 3GB+32GB Storage | Micro-SD Slot | Gray

      August 19, 202429 Views

      HR from the Outside In: Six Competencies for the Future of Human Resources

      May 20, 202525 Views
      Reviews

      The Ultimate PHP OOP Crash Course for Beginners 2025 | Udemy Coupons 2025

      November 30, 2025

      American English Vowels & Placement for All | Udemy Coupons 2025

      November 30, 2025

      UK government commits to Loan Charge settlement reforms in wake of independent review into policy

      November 30, 2025

      10 Things you must know in Photoshop | Udemy Coupons 2025

      November 30, 2025

      Title: The Real Estate Agent’s AI Playbook: The Ultimate Guide to AI-Powered Success in Real Estate (The AI Playbook Series)

      November 30, 2025
      Stay In Touch
      • Facebook
      • YouTube
      • TikTok
      • WhatsApp
      • Twitter
      • Instagram
      Latest News

      UK government commits to Loan Charge settlement reforms in wake of independent review into policy

      November 30, 2025

      Resilient learning begins with Zero Trust and cyber preparedness

      November 30, 2025

      CCRC refers case based on third faulty Post Office system

      November 29, 2025

      Rethinking icebreakers in professional learning

      November 29, 2025

      Can business software empower rather than control workers?

      November 28, 2025
      Latest Videos

      Why Choose CIMA? | Unlock Your Path to a Successful Finance Career

      November 29, 2025

      Digital marketing career #digitalmarketing #networkmarketing #motivation #leadgeneration

      November 28, 2025

      Societe Generale ,Tower Research , GeHealthcare , Canonical , PWC |2021, 2022 , 2023 , 2024 jobs

      November 26, 2025

      The Cybersecurity CAREER You Should Consider #shorts

      November 25, 2025

      UNLOCK YOUR POTENTIAL: Start Your Ethical Hacking Career Today!|| by Ak world #hacker #computer

      November 23, 2025
      Latest Jobs

      Senior Associate, AI Data Scientist

      November 21, 2025

      Nursing Adjunct Faculty – Part-Time Nursing Instructors Needed

      November 21, 2025

      Sr. Firewall Engineer

      November 21, 2025

      Portfolio Analyst

      November 21, 2025

      Vehicle Service Specialist

      November 21, 2025
      Legal
      • Home
      • Privacy Policy
      • Cookie Policy
      • Terms and Conditions
      • Disclaimer
      • Affiliate Disclosure
      • Amazon Affiliate Disclaimer
      Latest Udemy Coupons

      ISO 9001:2015 – Quality Management System Internal Auditor | Udemy Coupons 2025

      May 5, 202537 Views

      Advanced Program in Human Resources Management | Udemy Coupons 2025

      April 5, 202536 Views

      Mastering Maxon Cinema 4D 2024: Complete Tutorial Series | Udemy Coupons 2025

      August 22, 202436 Views

      Diploma in Aviation, Airlines, Air Transportation & Airports | Udemy Coupons 2025

      March 21, 202531 Views

      Time Management and Timeboxing in Business, Projects, Agile | Udemy Coupons 2025

      April 2, 202527 Views
      Blog

      Beyond Burnout: How to Thrive as a High Performer

      November 26, 2025

      Marketing Without Handcuffs: Grow in Regulated Industries

      November 21, 2025

      How a Ski Instructor Course Can Redefine Your Career Path –

      November 9, 2025

      Investing in Yourself and the Future –

      November 8, 2025

      Upskill or Get Left Behind: How to Stay Relevant at Work

      November 7, 2025
      Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
      © 2025 All rights reserved!

      Type above and press Enter to search. Press Esc to cancel.

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
      .
      SettingsAccept
      Privacy & Cookies Policy

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
      Non-necessary
      Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
      SAVE & ACCEPT