Qiulong is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 8 public victims claimed by this operator between April 22, 2024 and June 24, 2024. Qiulong is an emerging ransomware group that first appeared in April 2024, operating with apparent financial motivations based on their targeting patterns and limited observed activities. The group's origin and affiliations remain largely unknown due to their recent emergence and relatively small operational footprint, with no publicly documented evidence from major security firms or law enforcement agencies regarding their geographical base or connections to other cybercriminal organizations. Limited public reporting suggests the group employs standard ransomware deployment techniques, though specific initial access vectors, encryption methods, and whether they engage in data exfiltration or double extortion tactics have not been extensively documented by major threat intelligence providers. Their operations have remained relatively low-profile compared to established ransomware families, with approximately eight known victims primarily concentrated in Brazil and Canada, showing a particular focus on healthcare and business services sectors. The group appears to remain active as of late 2024, though their limited operational scope and recent emergence mean they have not yet attracted significant law enforcement attention or disruption efforts.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.