Increase in Qilin Ransomware Activity in Japan
The 2025 ransomware landscape in Japan has been considerably impacted by Qilin ransomware, according to research from Talos. The study notes a 17.5% increase in ransomware incidents compared to 2024, with Qilin responsible for 16.4% of the total 134 reported incidents.
In the context of Japan’s evolving ransomware threat, Qilin ransomware has emerged as a predominant force. The traffic of attacks attributed to Qilin has not only escalated but is expected to intensify further unless external countermeasures are implemented. The research reveals that Qilin affiliates are likely leveraging stolen credentials from various online platforms to conduct intrusions, which underscores the critical need for preemptive detection strategies.
Figures depicting monthly victim counts and industry sector impacts illustrate the broad scope of Qilin’s operations, primarily affecting industries such as manufacturing and healthcare. Small and medium enterprises are particularly vulnerable, making up 57% of the targeted organizations. The report indicates a strategic pattern, favoring sectors where disruptions can have severe consequences, notably in healthcare and technical services.
Defensive Context
Understanding the surge in Qilin ransomware activity is essential for enterprises operating in Japan, particularly those in manufacturing, automotive, and healthcare sectors. Small to medium enterprises should be especially attentive since they represent the bulk of Qilin’s victims. The methodology employed by Qilin emphasizes initial access through stolen credentials and post-compromise tactics. As such, organizations in these sectors must focus on early detection of unusual account activity and credential management to mitigate risks from ransomware attacks.
Why This Matters
The prevalence of Qilin ransomware poses a tangible threat to Japanese enterprises, especially within industries prone to operational disruptions. Given the specificity of Qilin’s targeting, organizations in affected sectors must prioritize their cybersecurity posture. The automation of Qilin’s attack techniques creates a notable risk for businesses lacking robust security measures.
Defender Considerations
Defending against Qilin ransomware necessitates heightened vigilance around account management practices, especially concerning the creation of new user accounts. Organizations should monitor deviations from normal account usage, notably those occurring outside typical business hours. Talos’s recommendation to correlate multiple events before triggering alerts can assist in reducing false positives while enhancing the detection capability of impending ransomware threats.
Indicators of Compromise (IOCs)
The study outlines critical IOCs, including:
ClamAV Signatures:
- Win.Malware.Bumblebee-10056548-0
- Win.Tool.EdrKiller-10059833-0
- Win.Tool.ThrottleStop-10059849-0
Snort Rules:
- Snort 2 SID(s): 66181, 66180
- Snort 3 SID(s): 301456
These indicators serve as essential tools for organizations seeking to bolster their defenses against Qilin ransomware.



