• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 35,000 monthly views (unique) and 208,000 clicks per month, as per Google Analytics! Thank you for your support! 🎉

Windows Under Attack: Qilin Ransomware Uses WSL to Launch Linux Encryptors

johny899

New Member
Content Writer
Messages
660
Reaction score
3
Points
23
Balance
$813.2USD
Hey! I heard about something really fascinating (and a little terrifying). The Qilin Ransomware gang has figured out another method for attacking Windows Machines – by exploiting a Windows capability called WSL (Windows Subsystem for Linux) to execute Linux ransomware from within Windows. Yes, I said that right and it sounds every bit as underhanded as it seems!

So, What's Actually Going On Here?​

Qilin is a group of hackers that emerged in 2022 using the name Agenda. Now they are getting clever and instead of attacking Windows directly, they attack Linux ransomware first from WSL.

Why is that important? Most Windows antivirus software only looks for Windows malware. So, an attack could go on unnoticed for some time.

They are basically using a legitimate Windows feature against Windows. Crazy, right?

How the Attack Works​

Let’s break this down in simple terms. Here is how the hackers do it:

1. They first get onto a Windows system, often using stolen passwords or stolen remoting tools.
2. If the user does not have WSL enabled, they enable WSL.
3. The hackers use tools like WinSCP or Splashtop to drop a Linux encryptor file (a small program that encrypts files) into the system.
4. They then run the file inside WSL using commands like wsl.exe -e.
5. Since this code runs inside of WSL, most antivirus does not catch it.
6. But sometimes, they also disable security tools using older yet still signed Windows drivers, which is referred to as 'BYOVD' (Bring your own vulnerable driver).

Weird huh? The stuff they come up with is super scary smart!

Why It Is a Serious Concern​

The bottom line:
  • Most folks are unaware WSL is installed or think it is a potential risk.
  • Security software may not inspect WSL properly or at all.
Qilin has already been confirmed to have attacked over 700 victims in more than 60 countries using some tricks like this;
A small business or even a developer could be in danger if WSL is enabled without protection.

How You Can Keep Safe​

Do not panic, but feel free to take these steps to protect yourself:
  • Determine if WSL is running - if you do not use it, disable it.
  • Be suspicious of strange activities through tools like WinSCP or Splashtop
  • Update your security software to recognize Linux files when running in Windows .
  • Avoid installing tools or drivers from unknown sources.
  • Store your backups in a different system so you can always restore them and not rely on your existing files even if they are locked.
 
Top