Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Error’d: Pickup Sticklers

      September 27, 2025

      From Prompt To Partner: Designing Your Custom AI Assistant

      September 27, 2025

      Microsoft unveils reimagined Marketplace for cloud solutions, AI apps, and more

      September 27, 2025

      Design Dialects: Breaking the Rules, Not the System

      September 27, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025

      Cailabs secures €57M to accelerate growth and industrial scale-up

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

      September 28, 2025
      Recent

      Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

      September 28, 2025

      Mastering PHP File Uploads: A Guide to php.ini Settings and Code Examples

      September 28, 2025

      The first browser with JavaScript landed 30 years ago

      September 27, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured
      Recent
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Europol Targets Qilin Ransomware Group with $50k Reward

    Europol Targets Qilin Ransomware Group with $50k Reward

    August 20, 2025

    Europol Qilin ransomware group reward

    Qilin has been the top ransomware group in recent months, so it’s not surprising that the group has apparently attracted the attention of law enforcement.

    Europol is offering a $50,000 reward for information on two senior members of the Qilin ransomware group, according to news reports.

    According to Australia’s Cyber Daily, Europol posted on one of its Telegram channels the aliases of two Qilin actors it is seeking information on.

    “We have identified two primary administrators operating under the aliases Haise and XORacle, who coordinate affiliates and oversee extortion activities,” the Europol Telegram post said, according to the publication.

    “We are actively pursuing all available leads in cooperation with international partners. A reward of up to US$50,000 is offered for information that directly leads to the identification or location of these administrators.”

    Qilin Ransomware Group Claims 356 Victims Since April

    Cyble threat intelligence researchers have documented 695 victims of the Qilin ransomware group since it first emerged in 2022.

    However, more than half of those claimed victims – 356 – have occurred since longtime leader RansomHub went offline at the end of March in a possible act of sabotage by rival DragonForce. That surge of activity likely factored in Europol’s decision to step up enforcement efforts against the group.

    Those 356 victims are 143 more than Akira, the second most active ransomware group since April (chart below).

    Qilin ransomware group has led with 356 victims since April
    Ransomware attacks April-August 2025 (cyble)

    NHS Ransomware Attack was Qilin’s Most Disruptive

    Perhaps Qilin’s most notorious attack occurred in June 2024, when a ransomware attack on UK pathology services provider Synnovis caused service disruptions at major London NHS hospitals, an attack that one official called  “one of the most unpleasant and impactful cyber incidents in the UK in recent years.”

    One consequence of that devastating attack was a 96% drop in blood sampling in London hospitals in the weeks after the attack.

    Healthcare ransomware attacks aside, part of Qilin’s staying power has been its ability to target a wide range of sectors and industries; the chart below, from Cyble, details the top sectors targeted by Qilin since April.

    Qilin ransomware attacks by sector
    Qilin ransomware attacks by sector April-August 2025 (Cyble)

    The Cyber Express has reached out to Europol to confirm reports of the reward and will update this article with any response.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleSmashing Security podcast #431: How to mine millions without paying the bill
    Next Article DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft

    Related Posts

    Development

    Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

    September 28, 2025
    Development

    Mastering PHP File Uploads: A Guide to php.ini Settings and Code Examples

    September 28, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Your Customers See More Than Reality: Is Your Mobile Strategy Keeping Up?

    Development

    Deconstructing the Request Lifecycle in Sitecore Headless – Part 2: SSG and ISR Modes in Next.js

    Development

    Accelerate foundation model training and inference with Amazon SageMaker HyperPod and Amazon SageMaker Studio

    Machine Learning

    Does Claim Management Work with AI Automation?

    Development

    Highlights

    How I used ChatGPT to quickly fix a critical open-source plugin – without touching a line of code

    July 7, 2025

    This is what happened when I used AI to rebuild an open-source project, and it’s…

    RCE flaw in tool for building AI agents exploited by attackers (CVE-2025-3248)

    May 6, 2025

    Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code

    August 13, 2025

    February 2025 Baseline monthly digest

    May 20, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.