Qiulong is an emerging ransomware group that first appeared in April 2024, operating with apparent financial motivations based on their targeting patterns and limited observed activities. The group's origin and affiliations remain largely unknown due to their recent emergence and relatively small operational footprint, with no publicly documented evidence from major security firms or law enforcement agencies regarding their geographical base or connections to other cybercriminal organizations. Limited public reporting suggests the group employs standard ransomware deployment techniques, though specific initial access vectors, encryption methods, and whether they engage in data exfiltration or double extortion tactics have not been extensively documented by major threat intelligence providers. Their operations have remained relatively low-profile compared to established ransomware families, with approximately eight known victims primarily concentrated in Brazil and Canada, showing a particular focus on healthcare and business services sectors. The group appears to remain active as of late 2024, though their limited operational scope and recent emergence mean they have not yet attracted significant law enforcement attention or disruption efforts. The group has been linked to 8 public disclosures across our corpus. First observed on a leak site on April 22, 2024; most recent post July 23, 2024. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Business Services sector, which has 2,640 disclosures indexed across all operators we track. Geographically, www.indigoent.ca is reported in Canada, a country with 810 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.