Skip to main contentSkip to navigationSkip to navigation
The exterior of a hospital with ambulances lined up in front.
The recent cyber-attacks in London brought tests and operations at two hospital trusts to a halt. Photograph: Andy Rain/EPA
The recent cyber-attacks in London brought tests and operations at two hospital trusts to a halt. Photograph: Andy Rain/EPA

Who are Qilin, the cybercriminals thought behind the London hospitals hack?

This article is more than 6 months old

Russian-speaking ransomware gang lets hackers use its tools in exchange for cut of proceeds

A Russian-speaking ransomware criminal gang called Qilin is thought to be behind the cyber-attack on NHS medical services provider Synnovis, that halted tests and operations at hospital trusts to a halt and affected GPs across London.

Although the location of the group is unknown, if it is based in Russia, it will be difficult for British law enforcement to directly target it. The Russian state has long had a ban on extraditing criminals overseas, and since it launched a full-scale invasion of Ukraine, it has largely ended all cooperation on cybersecurity matters so long as the hackers focus their attacks on foreign targets.

Qilin has been active since October 2022, when it launched its first wave of attacks on companies including the French company Robert Bernard and Australian IT consultancy Dialog. It operates a “ransomware as a service” approach, letting independent hackers use its tools and infrastructure in exchange for a 15 to 20% cut of the proceeds.

The group was behind a previous attack on the publisher of the Big Issue in March this year, when it trashed the group’s systems before stealing and publishing confidential data. More than 500GB of information taken from the publisher was posted on the dark web after it refused to pay the ransom, including passport scans of employees and payroll information.

The group has steadily increased its activity over the past year, claiming responsibility for more than 50 hacks in the past four months. According to cybersecurity experts Secureworks, “its attacks tend to be opportunistic rather than targeted and so good security hygiene is the best defence against Qilin and other similar groups”.

“In total, there have been 112 organisations posted to their site, and although information technology companies lead the way in terms of impacted industries, they have attacked organisations across a wide range of sectors,” a Secureworks spokesperson added.

In 2023, Qilin’s typical ransom demand was anything from $50,000 to $800,000, according to Group-IB, a cybersecurity firm which infiltrated the group that year. It generally gains its initial foothold in its victims’ networks through spear phishing, targeted messages to insiders to convince them to share credentials or install malware.

More on this story

More on this story

  • BT identifying 2,000 signals a second indicating possible cyber-attacks

  • North Korea-backed cyber espionage campaign targets UK military

  • What does the London NHS hospitals data theft mean for patients?

  • London hospitals cancel nearly 1,600 operations and appointments in one week due to hack

  • London hospitals cancel cancer surgeries after cyber-attack

  • London NHS hospitals revert to paper records after cyber-attack

  • Russian crime group behind London hospitals cyber-attack, says expert

  • Services disrupted as London hospitals hit by cyber-attack

  • UK engineering firm Arup falls victim to £20m deepfake scam

  • BT ramps up AI use to counter hacking threats to business customers

Most viewed

Most viewed