Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques
NetmanageIT OpenCTI - opencti.netmanageit.com
SUMMARY :
Agenda ransomware group, also known as Qilin, has been deploying a Linux-based ransomware binary on Windows hosts using legitimate remote management and file transfer tools. This cross-platform execution technique bypasses Windows-centric detections and security solutions. The attack chain includes the use of BYOVD for defense evasion, deployment of multiple SOCKS proxy instances for C&C traffic obfuscation, and targeted theft of backup credentials. Agenda has affected 591 victims across 58 countries since January 2025, primarily targeting organizations in developed markets and high-value industries. The group's sophisticated approach combines legitimate tools, cross-platform execution, and strategic targeting of backup infrastructure, making detection significantly more challenging for organizations.
OPENCTI LABELS :
coroxy,byovd,ransomware
AI COMMENTARY :
1. Introduction Agenda Ransomware, known in threat intelligence circles as Qilin, has recently been observed executing an innovative cross-platform attack by deploying a Linux-based ransomware binary onto Windows hosts. This unusual tactic leverages legitimate remote management and file transfer tools to bypass traditional Windows-centric detection mechanisms. The result is a sophisticated ransomware threat that evades standard security controls while maintaining the hallmarks of a financially motivated intrusion.
2. Cross-Platform Execution via Remote Management Tools The core of Agenda’s novel approach lies in exploiting legitimate remote management frameworks such as Coroxy and widely used file transfer utilities. By transferring and executing a Linux ELF binary on Windows systems, the group effectively sidesteps endpoint protection that focuses on Windows PE files. This strategy not only complicates signature-based detection but also takes advantage of administrative tools already trusted within an organization’s infrastructure.
3. BYOVD for Defense Evasion Agenda incorporates a Bring Your Own Vulnerable Driver (BYOVD) technique to disable or tamper with security products at the kernel level. By deploying unsigned or outdated drivers that exploit known vulnerabilities, the group gains elevated privileges and suppresses endpoint defenses silently. In tandem with this, the threat actors spin up multiple instances of SOCKS proxies to relay command-and-control traffic, obscuring the true destination and hindering network-based detection efforts.
4. Targeted Theft of Backup Credentials Beyond immediate encryption and extortion, Agenda’s operators have shown a clear focus on undermining organizations’ recovery capabilities. The attack chain includes reconnaissance aimed at locating and exfiltrating backup infrastructure credentials, ensuring that even if victims possess offline backups, they remain inaccessible or compromised. This targeted theft further amplifies the pressure on organizations to pay ransoms in order to restore operations.
5. Global Impact and Industry Focus Since January 2025, Agenda Ransomware has struck 591 victims across 58 countries, with a notable concentration in developed markets and sectors handling critical data such as finance, healthcare, and manufacturing. The group’s prioritization of high-value targets demonstrates its intent to maximize financial gain while leveraging complex methodologies that deter swift incident response and remediation.
6. Implications for Security Teams The emergence of cross-platform ransomware underscores the necessity for security teams to adopt more holistic detection strategies that span multiple operating systems. Traditional endpoint detection tools must be supplemented with behavior-based monitoring, kernel integrity checks to detect BYOVD activity, and robust network visibility solutions capable of identifying proxy chaining and anomalous traffic flows. Regular validation of backup integrity and access controls is essential to mitigate the threat posed by credential theft.
7. Conclusion Agenda’s fusion of legitimate administrative tools, cross-platform execution, and defense evasion via BYOVD techniques marks a significant evolution in ransomware operations. Organizations must elevate their threat hunting and incident response playbooks to account for these advanced methods. Only by broadening detection coverage and reinforcing backup resilience can enterprises hope to withstand the growing sophistication of ransomware groups like Qilin.
OPEN NETMANAGEIT OPENCTI REPORT LINK!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques