• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
qilin leads april 2025 ransomware spike with 45 breaches using

Qilin Leads April 2025 Ransomware Spike with 45 Breaches Using NETXLOADER Malware

You are here: Home / General Cyber Security News / Qilin Leads April 2025 Ransomware Spike with 45 Breaches Using NETXLOADER Malware
May 8, 2025

Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented .NET compiled loader codenamed NETXLOADER as part of a campaign observed in November 2024.

“NETXLOADER is a new .NET-based loader that plays a critical role in cyber attacks,” Trend Micro researchers Jacob Santos, Raymart Yambot, John Rainier Navato, Sarah Pearl Camiling, and Neljorn Nathaniel Aguas said in a Wednesday analysis.

“While hidden, it stealthily deploys additional malicious payloads, such as Agenda ransomware and SmokeLoader. Protected by .NET Reactor 6, NETXLOADER is difficult to analyze.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Qilin, also called Agenda, has been an active ransomware threat since it surfaced in the threat landscape in July 2022. Last year, cybersecurity company Halcyon discovered an improved version of the ransomware that it named Qilin.B.

Cybersecurity

Recent data shared by Group-IB shows that disclosures on Qilin’s data leak site have more than doubled since February 2025, making it the top ransomware group for April, surpassing other players like Akira, Play, and Lynx.

“From July 2024 to January 2025, Qilin’s affiliates did not disclose more than 23 companies per month,” the Singaporean cybersecurity company said late last month. “However, […] since February 2025 the amount of disclosures have significantly increased, with 48 in February, 44 in March and 45 in the first weeks of April.”

Qilin Ransomware

Qilin is also said to have benefited from an influx of affiliates following RansomHub’s abrupt shutdown at the start of last month. According to Flashpoint, RansomHub was the second-most active ransomware group in 2024, claiming 38 victims in the financial sector between April 2024 and April 2025.

“Agenda ransomware activity was primarily observed in healthcare, technology, financial services, and telecommunications sectors across the U.S., the Netherlands, Brazil, India, and the Philippines,” according to Trend Micro’s data from the first quarter of 2025.

NETXLOADER, the cybersecurity company said, is a highly obfuscated loader that’s designed to launch next-stage payloads retrieved from external servers (e.g., “bloglake7[.]cfd”), which are then used to drop SmokeLoader and Agenda ransomware.

Protected by .NET Reactor version 6, it also incorporates a bevy of tricks to bypass traditional detection mechanisms and resist analysis efforts, such as the use of just-in-time (JIT) hooking techniques, and seemingly meaningless method names, and control flow obfuscation.

Cybersecurity

“The operators’ use of NETXLOADER is a major leap forward in how malware is delivered,” Trend Micro said. “It uses a heavily obfuscated loader that hides the actual payload, meaning you can’t know what it truly is without executing the code and analyzing it in memory. Even string-based analysis won’t help because the obfuscation scrambles the clues that would normally reveal the payload’s identity.”

Attack chains have been found to leverage valid accounts and phishing as initial access vectors to drop NETXLOADER, which then deploys SmokeLoader on the host. The SmokeLoader malware proceeds to perform a series of steps to perform virtualization and sandbox evasion, while simultaneously terminating a hard-coded list of running processes.

In the final stage, SmokeLoader establishes contact with a command-and-control (C2) server to fetch NETXLOADER, which launches the Agenda ransomware using a technique known as reflective DLL loading.

“The Agenda ransomware group is continually evolving by adding new features designed to cause disruption,” the researchers said. “Its diverse targets include domain networks, mounted devices, storage systems, and VCenter ESXi.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «security tools alone don't protect you — control effectiveness does Security Tools Alone Don’t Protect You — Control Effectiveness Does
Next Post: SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root sonicwall patches 3 flaws in sma 100 devices allowing attackers»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.