Hey! I heard about something really fascinating (and a little terrifying). The 
Qilin Ransomware gang has figured out another method for attacking 
Windows Machines β by exploiting a 
Windows capability called 
WSL (
Windows Subsystem for Linux) to execute 
Linux ransomware from within 
Windows. Yes, I said that right and it sounds every bit as underhanded as it seems!
So, What's Actually Going On Here?
Qilin is a 
group of hackers that emerged in 
2022 using the name 
Agenda. Now they are getting clever and instead of attacking 
Windows directly, they attack 
Linux ransomware first from 
WSL.
Why is that important? Most 
Windows antivirus software only looks for 
Windows malware. So, an attack could go on unnoticed for some time.
They are basically using a legitimate Windows feature against 
Windows. Crazy, right?
How the Attack Works
Letβs break this down in simple terms. Here is how the hackers do it:
1. They first get onto a 
Windows system, often using stolen passwords or stolen remoting tools.
2. If the user does not have 
WSL enabled, they enable WSL.
3. The hackers use tools like 
WinSCP or 
Splashtop to drop a 
Linux encryptor file (a small program that encrypts files) into the system.
4. They then run the file inside 
WSL using commands like 
wsl.exe -e.
5. Since this code runs inside of WSL, most antivirus does not catch it.
6. But sometimes, they also disable security tools using older yet still signed 
Windows drivers, which is referred to as 
'BYOVD' (
Bring your own vulnerable driver).
Weird huh? The stuff they come up with is super scary smart!
Why It Is a Serious Concern
The bottom line:
- Most folks are unaware WSL is installed or think it is a potential risk.
- Security software may not inspect WSL properly or at all.
Qilin has already been confirmed to have attacked over 700 victims in more than 60 countries using some tricks like this;
A small business or even a developer could be in danger if WSL is enabled without protection.
How You Can Keep Safe
Do not panic, but feel free to take these steps to protect yourself:
- Determine if WSL is running - if you do not use it, disable it.
- Be suspicious of strange activities through tools like WinSCP or Splashtop
- Update your security software to recognize Linux files when running in Windows .
- Avoid installing tools or drivers from unknown sources.
- Store your backups in a different system so you can always restore them and not rely on your existing files even if they are locked.