Qilin Ransomware Deploys Hybrid Linux-Windows Attacks via WSL and BYOVD

Qilin ransomware group deploys innovative hybrid attacks, using Linux payloads on Windows via WSL and BYOVD exploits to disable EDR tools, gaining access through RMM software. Targeting critical sectors, it claims over 40 victims monthly, forms alliances, and underscores the need for behavioral monitoring and adaptive defenses.
Qilin Ransomware Deploys Hybrid Linux-Windows Attacks via WSL and BYOVD
Written by Lucas Greene

In the escalating world of cyber threats, ransomware operators are continually innovating to outpace defenses, and the Qilin group exemplifies this trend with its latest hybrid attack strategy. According to a recent report from The Hacker News, Qilin has been observed deploying a Linux-based payload on Windows systems, cleverly combined with a Bring Your Own Vulnerable Driver (BYOVD) exploit. This approach allows attackers to disable endpoint detection and response (EDR) tools, paving the way for data exfiltration and encryption.

The campaign begins with the abuse of legitimate remote monitoring and management (RMM) tools, such as AnyDesk or Microsoft Quick Assist, to gain initial access. Once inside, Qilin actors exploit vulnerable drivers—often signed but outdated ones like those from Avast or Zemana—to load malicious code at the kernel level, effectively neutralizing security measures.

Sophisticated Tactics Unveiled

Researchers from Cisco Talos and Trend Micro, as detailed in the same The Hacker News article, noted that the Linux encryptor is executed via Windows Subsystem for Linux (WSL), a feature that enables Linux binaries to run natively on Windows. This cross-platform maneuver not only evades traditional Windows-focused antivirus but also targets backup systems, ensuring victims cannot easily recover.

Qilin’s aggression is underscored by its victim count: the group claims over 40 organizations monthly since early 2025, with peaks reaching 84, per data from The Hacker News coverage of April’s surge. Industries hit include healthcare, finance, and manufacturing, where downtime can be catastrophic.

Rising Dominance and Alliances

Beyond technical prowess, Qilin’s business model as a ransomware-as-a-service (RaaS) operation amplifies its reach. Affiliates reportedly pocket 80-85% of ransom payments, incentivizing widespread participation, as revealed in earlier insights from The Hacker News. This structure has propelled Qilin to lead in data leak disclosures, with 45 incidents in April 2025 alone.

Recent alliances further bolster its position. Qilin has joined forces with LockBit and DragonForce, forming a potent ransomware syndicate, according to The Hacker News. This collaboration hints at shared tools and tactics, potentially escalating global threats.

Defensive Challenges and Strategies

For industry insiders, the implications are stark: traditional defenses falter against such hybrid attacks. Darktrace’s analysis, highlighted in their blog, emphasizes behavioral monitoring over signature-based detection to spot anomalies like unusual RMM usage.

Moreover, Qilin’s focus on critical sectors—evident in Cybereason’s threat alert on its site—demands proactive measures, including patching vulnerable drivers and restricting WSL in high-risk environments.

Future Implications for Cybersecurity

As Qilin evolves, incorporating Linux variants for ESXi and VMware systems, per Cybersecurity News’ report, organizations must rethink their strategies. Regular audits of RMM tools and BYOVD mitigations, as suggested by Picus Security’s deep dive, could prove vital.

Ultimately, this wave of innovation from Qilin underscores the need for adaptive, intelligence-driven defenses. With ransomware attacks surging 50% in 2025, as noted in Cyble’s analysis, staying ahead requires vigilance and collaboration across the sector to counter these sophisticated adversaries.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us