Group-IB has revealed details about the affiliate program of Qilin ransomware, which offers affiliates between 80 and 85% of the ransom payments, with the remaining 15-20% going to the operators. Affiliates receive an administrative panel to manage operations, with sections dedicated to targets, blogs, fillers, news, payments, and FAQs. Victims mainly come from critical infrastructure, education, and health sectors. Qilin can attack Windows, Linux, and VMware ESXi servers.
This ransomware has shown significant ability to infiltrate vital sectors, underscoring the need for robust security measures. Group-IB’s revelations help better understand how cybercriminals organize and operate, providing a valuable framework to counter these evolving threats. Awareness and preparation are essential to mitigate the risks associated with Qilin and similar cyber threats, emphasizing the importance of cybersecurity in critical sectors.
Source: Hackernews
To mitigate these potential threats, it is important to implement additional cybersecurity measures with the help of a trusted partner like INFRA www.infrascan.net or you can try your self using check.website.