top of page

Qilin Ransomware Group Claims Hack of German Political Party Die Linke

  • Apr 5
  • 2 min read

Key Findings


  • Qilin ransomware group claims to have breached Die Linke, Germany's left-wing political party, and posted the claim on its Tor data leak site on April 1, 2026

  • Die Linke discovered the attack on March 27 and confirmed the incident but has not verified whether data was actually stolen

  • The party's membership database was not compromised and no member data was accessed

  • Qilin has provided no proof of the breach despite making the claim

  • Qilin is one of the most prolific ransomware-as-a-service operations, claiming over 40 victims monthly and peaking at 100 in June 2025

  • The group recently formed a strategic alliance with LockBit and DragonForce to enhance attack capabilities


Background


Die Linke, meaning "The Left," is a left-wing German political party founded in 2007 from a merger of earlier leftist groups with roots in former East Germany. The party focuses on social justice, workers' rights, and reducing economic inequality. As of the end of 2025, Die Linke had approximately 123,126 members.


Qilin emerged as a ransomware-as-a-service operation in 2022 and has grown into one of the most active cybercriminal groups. The Russian-speaking organization enables affiliates to deploy customized ransomware payloads and employs double-extortion tactics, encrypting data while simultaneously threatening to leak it through Tor-based portals.


The Attack and Response


Die Linke's IT team discovered the cyberattack on Thursday, March 27, and immediately took parts of its systems offline to contain the damage. Party leadership informed staff, alerted authorities, and filed a criminal complaint the same day. The party stated that attackers aimed to publish sensitive organizational data and personal information of employees at party headquarters, though it remained unclear whether they succeeded.


The party has been working rapidly with authorities and IT experts to restore systems and resume normal operations. Officials emphasized that while a risk exists regarding the publication of sensitive data, the most critical asset—the membership database containing member information—remained secure.


Qilin's Operations and Recent Activity


Qilin operates one of the largest ransomware-as-a-service platforms, allowing criminal affiliates to conduct attacks using customized tools. The group targets multiple sectors worldwide including healthcare, manufacturing, and finance, typically gaining initial access through phishing campaigns and exploitation of known vulnerabilities.


In October 2025, researchers revealed that Qilin relies on global bulletproof hosting networks to support its extortion operations. That same month, the group formed a significant alliance with ransomware operations LockBit and DragonForce, pledging to share tools and infrastructure to enhance collective attack effectiveness. This partnership marked a notable shift in the ransomware threat landscape.


Claim Lacks Evidence


On April 1, Qilin announced the Die Linke breach on its Tor data leak site and added the party to its list of victims. However, the group provided no samples or technical proof to substantiate its claims, a common tactic used by ransomware groups to apply pressure while maintaining operational secrecy. Die Linke has not confirmed whether sensitive data was actually exfiltrated or whether Qilin's claims hold merit.


Sources


  • https://securityaffairs.com/190348/cyber-crime/qilin-ransomware-group-claims-the-hack-of-german-political-party-die-linke.html

  • https://www.linkedin.com/posts/cybercureme_qilin-ransomware-group-claims-the-hack-of-activity-7446253306802282496-3hTJ

  • https://x.com/shah_sheikh/status/2040487616756490649

  • https://x.com/securityaffairs/status/2040484256942567711

  • https://www.linkedin.com/posts/pierluigipaganini_qilin-ransomware-group-claims-the-hack-of-activity-7446249965972144128-5k4t

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page