Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Phoenix PhaaS Fuels Brand Smishing in Finance Platform Drives
April 30, 2026
Targeted Large-Scale Campaign Attacking U.S. Organizations with
April 30, 2026
Home/Threats/Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
Threats

Qilin Ransomware Lists RDP Auth History on Enumerates Authentication

Qilin ransomware represents a highly active and damaging threat within the contemporary cyber landscape. The group has steadily evolved its tactics since it first appeared in 2022, and its latest...

Jennifer sherman
Jennifer sherman
April 30, 2026 3 Min Read
0 0

Qilin ransomware represents a highly active and damaging threat within the contemporary cyber landscape.

The group has steadily evolved its tactics since it first appeared in 2022, and its latest technique of enumerating Remote Desktop Protocol (RDP) authentication history on compromised servers gives it a fast, quiet way to map out a network and find the next target.

Qilin, also known as Agenda, is a Ransomware-as-a-Service (RaaS) group believed to be based in Russia. When it first emerged in July 2022, it attracted little attention.

By 2023, the group had begun picking up pace, claiming 45 attacks and launching campaigns against critical sectors such as healthcare, manufacturing, finance, and government agencies.

By 2025, Qilin had already surpassed 700 confirmed attacks in a single year, making it one of the most prolific ransomware operators on record.

Victims have included NHS hospitals in London and county government systems in the United States, showing that no sector is safe.

The group typically gains initial access through spearphishing emails, exploitation of known software vulnerabilities, or by abusing Remote Monitoring and Management (RMM) tools.

Once inside a network, attackers focus on expanding their reach quietly, using living-off-the-land techniques that blend into normal system activity to avoid triggering alerts.

Qilin also employs double extortion, meaning the group encrypts data while also threatening to leak it publicly if the ransom demand is not met, putting enormous pressure on victims to comply.

Maurice Fielenbach, Information Security Researcher at Hexastrike, recently identified a particularly sharp reconnaissance move by Qilin operators on a compromised server.

His observation highlighted how the group used a PowerShell command to pull every Event ID 1149 from the Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational log.

This single query gave the attackers a clear map of which accounts used RDP on the host, which client systems connected to it, and which accounts appeared privileged enough to be worth targeting next. The script was delivered through a rogue ScreenConnect installation during the intrusion.

What makes this behavior stand out is how little noise it creates. Rather than running loud network scans or Active Directory enumeration tools that security systems are built to detect, Qilin used a built-in Windows logging mechanism to gather all the reconnaissance data it needed.

It is a calculated move that reflects a broader shift in how ransomware groups approach stealth before encryption.

RDP Enumeration as a Lateral Movement Strategy

The RDP authentication enumeration technique that Qilin used sits at the center of its lateral movement strategy.

By querying Event ID 1149, which records when a remote desktop connection request is received, the attackers extracted usernames, domain names, and the source client machines involved in each session.

In one command, they built a prioritized list of accounts worth targeting for further compromise.

This approach is particularly effective because Event ID 1149 lives in the RemoteConnectionManager Operational log rather than in the main Security event log.

Many organizations do not forward this log to their Security Information and Event Management (SIEM) system or simply treat it as low priority. This gap gives attackers a quiet window to gather valuable intelligence.

It is also important to note that Event ID 1149 does not confirm a successful RDP login on its own. It only records that a connection request was received.

Correlating it with Event ID 4624 from the Security log or entries from the Local Session Manager log is necessary to verify actual successful logins.

Security teams are advised to enable PowerShell ScriptBlock Logging across their entire environment, as there is no legitimate reason for a non-administrative process to run this type of RDP enumeration query.

Organizations should also watch for unauthorized installations of remote access tools such as ScreenConnect, AnyDesk, Atera, or Total Software Deployment on any compromised host.

Monitoring for Windows Defender tampering events alongside these indicators adds another strong layer of detection. Together, these signals observed in the hours before encryption begins can serve as a reliable fingerprint of an active Qilin intrusion.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitphishingransomwareSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Phoenix PhaaS Fuels Brand Smishing in Finance Platform Drives

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Jenkins Fixes High-Severity Plugin Flaws: Patches Including
April 30, 2026
WordPress Plugin Hacked Since 2020 to Inject Malicious
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us