January 11, 2023
Qilin (also known as Agenda) ransomware has been used to attack healthcare and education organizations, primarily in Africa and Asia, since its discovery in August 2022. It is written in the Go programming language and has customization options, such as changing the filename extensions of encrypted files and terminating specific processes and services. The threat actors behind Qilin/Agenda practice double extortion, meaning they not only demand payment for a decryptor but also threaten to release stolen data if their demands are not met. Qilin ransomware has various encryption modes that can be configured by the operator, including skip-step, percent, and fast. SentinelOne protects against this ransomware and its different encryption modes.
SentinelOne PartnerOne - America's 2025
⛳️ Last week in Pebble Beach the America's best cybersecurity partners came together for our annual PartnerOne summit. Check out…
Just a Sec: Cybersecurity Unfiltered—Fast, Frank, and From the Front Lines
Welcome to the first-ever Just A Sec, a no-holds-barred, quick-fire monthly livestream. It’s cybersecurity like you’ve never heard it before—unfiltered,…
See how our intelligent, autonomous cybersecurity platform harnesses the power of data and AI to protect your organization now and into the future.