EMPSurvive
Prepare. Protect. Prevail.
Qilin Ransomware Campaign Expands: SEL, Steel, Engineering Targets Hit
INTEL FLASH

Qilin Ransomware Campaign Expands: SEL, Steel, Engineering Targets Hit

The Qilin ransomware gang has escalated operations across critical sectors—energy equipment supplier SEL, steel production, and engineering firms—in a 7-day campaign exposing operational data. The targets suggest deliberate focus on supply chain and manufacturing vulnerability.

MR
Morgan Reed
2 min read
Share:

Between April 22 and April 29, 2026, Qilin ransomware operators claimed successful attacks on at least six distinct organizations across industrial and critical infrastructure sectors, according to reporting tracked by DeXpose. Confirmed targets include SEL (a known supplier of power systems components), Heartland Steel Products, Ferguson Timar, B&E Juice, Longwood Engineering Company, Flipo Group, and Inspira (Puerto Rico facility). The clustering of attacks within a single week, combined with public disclosure on gang-operated leak sites, indicates deliberate targeting rather than opportunistic spray-and-pray campaigns.

Qilin's operational tempo has accelerated noticeably since late 2025. The group's focus on industrial manufacturers and equipment suppliers—particularly those tied to energy, materials handling, and engineering—suggests either:

  1. Intelligence-gathering for supply chain mapping (reconnaissance before larger disruptive operations), or
  2. Direct extortion targeting companies with high operational disruption sensitivity and compliance-driven payment incentives.

The exposure of operational and employee data from SEL is particularly significant: SEL manufactures protective relays and SCADA controllers used in electrical substations and industrial control systems. Compromised employee credentials or system architecture details could enable follow-on attacks against utility customers downstream.

Qilin has historically shown willingness to follow through on encryption threats when victims refuse payment. Unlike some ransomware groups that abandon leaks after extortion fails, Qilin maintains persistent pressure and public naming—a tactic that compounds reputational damage and regulatory scrutiny for affected organizations.

What matters: Victims in critical infrastructure adjacent sectors (energy equipment supply, industrial automation) should assume their operational security posture has been surveyed by the attackers. Even unencrypted networks may face downstream targeting via customer relationships. Utilities and industrial operators purchasing from hit suppliers should review access logs and credential usage from the affected period.

Sources

Share:
Morgan Reed
Written by

Morgan Reed

Survival Systems Specialist

Cybersecurity consultant and survival systems specialist with over a decade of experience in EMP preparedness, electronic hardening, and off-grid living strategies. Morgan has helped thousands of families develop comprehensive protection plans against electromagnetic threats.

Comments

No comments yet. Be the first to share your thoughts!

Leave a Comment

Your email address will not be published.