25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Warning Issued to HPH Sector About Qilin Ransomware Group

A warning has been issued to the healthcare and public health (HPH) sector about the Qilin ransomware group, which is known to attack healthcare organizations due to their reliance on uptime and the sensitivity of the data they hold. Around 7% of the ransomware attacks conducted by the group have been on healthcare organizations.

One of the most recent attacks has caused massive disruption to healthcare services in London. The group attacked a National Health Service (NHS) pathology vendor (Synnovis), which manages blood tests for NHS trusts and GP offices in south-east London. The attack did not directly affect any NHS hospitals as it was confined to Synnovis systems, but it has caused massive disruption with thousands of NHS surgeries and appointments canceled, and blood testing services have been reduced to around 10% of normal levels. The attack has caused major problems with blood matching, leading to a shortage of O-positive and O-negative blood. Synnovis expects the recovery to take weeks and anticipates a full recovery will take several months.

Qilin is a ransomware-as-a-service group that engages in double extortion tactics, where data is stolen prior to file encryption and threats are issued to publish the data if the ransom is not paid. Qilin stole 400GB of data in the attack on Synnovis, and when the $50 million ransom demand was not paid, Qilin uploaded the stolen data to its dark web data leak site. The data dump includes blood test results personal and health information collected in 300 million patient interactions with the NHS.

Qilin is believed to originate from Russia and has been in operation since 2022. The group started as Agenda ransomware before rebranding as Qilin, and recruits affiliates, primarily from CIS countries, to conduct attacks. Qilin provides the ransomware, infrastructure, and tools and takes between 15% and 20% of any ransoms that are paid. Most of the attacks conducted by the group have seen ransom demands issued of between $50,000 and $800,000, but as the attack on Synnovis shows, the demands can be considerably higher.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

Qilin has been increasing its attacks, with at least 60 attacks conducted so far this year. The affiliates primarily target Windows machines, but in December 2023 the group started using a Linux version on VMware ESXi servers. Initial access is most commonly gained through phishing and spear phishing emails, although the group also leverages exposed applications and interfaces such as Citrix and remote desktop protocol (RDP). One of the members of the group claims to have exploited a zero-day vulnerability in the attack on Synnovis but did not state which vulnerability was exploited.

Once access has been gained, the group uses Remote Monitoring and Management (RMM) tools, and Cobalt Strike to deploy the ransomware binary. Agenda ransomware can propagate using PsExec and SecureShell, and different vulnerable SYS drivers are used for defense evasion. The Health Sector Cybersecurity Coordination Center (HC3) has shared indicators of compromise, MITRE ATT&CK Tactics & Techniques, and recommended mitigations in its Qilin Threat Profile, a copy of which is available on the American Hospital Association website.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist