EMPSurvive
Prepare. Protect. Prevail.
Qilin Ransomware Hits SEL, B&E Juice: Critical Data Exposure
INTEL FLASH

Qilin Ransomware Hits SEL, B&E Juice: Critical Data Exposure

Qilin ransomware operators have claimed responsibility for breaches affecting Schweitzer Engineering Laboratories and B&E Juice, exposing critical data. The attacks underscore persistent vulnerabilities in industrial control systems and supply chain targets.

MR
Morgan Reed
2 min read
Share:

Between April 22–23, 2026, multiple reporting outlets tracked active Qilin ransomware campaigns targeting two distinct sectors: Schweitzer Engineering Laboratories (SEL)—a major manufacturer of power systems protection and control equipment—and B&E Juice, a food and beverage operation. The threat actors published claims of data exposure via DeXpose, their public leak platform, indicating a dual-extortion model: encryption plus threatened data release.

Why this matters: SEL equipment operates in critical infrastructure environments—substations, power plants, and industrial control networks. A breach of SEL's systems or intellectual property could provide threat actors reconnaissance data, technical documentation, or customer network information valuable for downstream targeting of utilities and grid operators. The simultaneous targeting of a food producer suggests Qilin is running parallel campaigns across critical infrastructure and essential services sectors, widening their attack surface.

Qilin has maintained operational tempo and public visibility through leak site postings, indicating the group continues active extortion operations. The rapid media amplification (16 signal detections within 19 hours) suggests broad detection and reporting of the incident, though specific technical indicators—compromise vectors, dwell time, data volume—remain unclear from available sources.

What to watch: Monitor for downstream impacts affecting utilities that depend on SEL equipment or services. Track whether Qilin releases technical documentation that could enable follow-on attacks against power systems. Observe if affected organizations issue patches or security advisories that hint at vulnerability exploitation methods. Continued dual-extortion campaigns like this indicate threat actors are confident in their ability to monetize both ransomware deployment and data sales, reducing pressure to negotiate with victims.

Sources

Share:
Morgan Reed
Written by

Morgan Reed

Survival Systems Specialist

Cybersecurity consultant and survival systems specialist with over a decade of experience in EMP preparedness, electronic hardening, and off-grid living strategies. Morgan has helped thousands of families develop comprehensive protection plans against electromagnetic threats.

Comments

No comments yet. Be the first to share your thoughts!

Leave a Comment

Your email address will not be published.