{"id":2178,"date":"2026-04-04T20:29:34","date_gmt":"2026-04-04T20:29:34","guid":{"rendered":"https:\/\/www.europesays.com\/germany\/2178\/"},"modified":"2026-04-04T20:29:34","modified_gmt":"2026-04-04T20:29:34","slug":"qilin-ransomware-group-claims-the-hack-of-german-political-party-die-linke","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/germany\/2178\/","title":{"rendered":"Qilin ransomware group claims the hack of German political party Die Linke"},"content":{"rendered":"<p>\n\t\t\t\t\t\t\tQilin ransomware group claims the hack of German political party Die Linke\n\t\t\t\t\t\t<\/p>\n<p>\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/securityaffairs.com\/wp-content\/themes\/security_affairs\/images\/user-icon.svg\" alt=\"\"\/> <a href=\"https:\/\/securityaffairs.com\/author\/paganinip\" rel=\"nofollow noopener\" target=\"_blank\">Pierluigi Paganini<\/a><br \/>\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/securityaffairs.com\/wp-content\/themes\/security_affairs\/images\/clock-icon.svg\" alt=\"\"\/> April 04, 2026<\/p>\n<p>\t\t\t\t\t\t<img decoding=\"async\" class=\"img-fluid mb-4\" src=\"https:\/\/www.europesays.com\/germany\/wp-content\/uploads\/2026\/04\/image-5.png\" alt=\"\"\/><\/p>\n<p>Qilin ransomware claims it stole data from Germany\u2019s Die Linke and threatens to leak it; the party confirmed the incident, but not a breach.<\/p>\n<p>The <a href=\"https:\/\/securityaffairs.com\/tag\/qilin-ransomware\" type=\"post_tag\" id=\"15223\" rel=\"nofollow noopener\" target=\"_blank\">Qilin ransomware<\/a> group claims it stole data from Die Linke, a German political party, and is threatening to release it. <\/p>\n<p>Die Linke is a left-wing political party in Germany. Its name means \u201cThe Left\u201d, and it promotes policies focused on social justice, workers\u2019 rights, and reducing economic inequality. Founded in 2007, it emerged from a merger of earlier leftist groups, including parties with roots in former East Germany.<\/p>\n<p>The party disclosed the cyber incident on March 27, one day after the attack, but did not confirm whether threat actors had stolen data. <\/p>\n<p>The party discovered the cyberattack on Thursday and immediately took parts of its IT systems offline to limit damage. It informed staff, alerted authorities, and promptly filed a criminal complaint.<\/p>\n<p>As of the latest <a href=\"https:\/\/www.die-linke.de\/partei\/ueber-uns\/mitgliederzahlen-2025\/?utm_source=chatgpt.com\" rel=\"nofollow noopener\" target=\"_blank\">official data<\/a>, Die Linke has about 123,126 members (end of 2025).<\/p>\n<p>\u201cAccording to current information, the perpetrators aim to publish sensitive data from within the party organization, as well as personal information of employees at party headquarters. It is impossible to assess whether and to what extent this will succeed or has already occurred. However, a corresponding risk exists.\u201d reads a <a href=\"https:\/\/www.die-linke.de\/start\/presse\/detail\/news\/cyberangriff-auf-die-partei-die-linke\/\" rel=\"nofollow noopener\" target=\"_blank\">press release<\/a> published by the German Party. \u201cThe party\u2019s membership database was not affected. The perpetrators did not succeed in stealing any member data.\u201d<\/p>\n<p>The party confirmed that attackers did not access its membership database or steal member data. It linked the incident to the Qilin ransomware group, a Russian-speaking cybercrime organization that may pursue financial and political goals. <\/p>\n<p>The party is taking rapid action to limit damage, working with authorities and IT experts to restore systems and resume normal operations as quickly as possible.<\/p>\n<p>On April 1, Qilin announced the attack on Die Linke and added the party to its Tor data leak site, but shared no samples as proof of the breach. <\/p>\n<p><a href=\"https:\/\/i0.wp.com\/securityaffairs.com\/wp-content\/uploads\/2026\/04\/image-5.png?ssl=1\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"564\" src=\"https:\/\/www.europesays.com\/germany\/wp-content\/uploads\/2026\/04\/1775334574_143_image-5.png\" alt=\"\" class=\"wp-image-190352\"  \/><\/a><\/p>\n<p><a href=\"https:\/\/securityaffairs.com\/183891\/malware\/linux-variant-of-qilin-ransomware-targets-windows-via-remote-management-tools-and-byovd.html\" rel=\"nofollow noopener\" target=\"_blank\">Qilin ransomware<\/a>\u00a0operation has been active since 2022, it has become one of the most active RaaS groups in 2025, claiming over 40 victims monthly and peaking at 100 in June.<\/p>\n<p>The group enables affiliates to deploy customized ransomware payloads against targeted organizations. Qilin uses double-extortion tactics, encrypting data while threatening to leak it via Tor-based portals. The group has targeted multiple sectors worldwide, including healthcare, manufacturing, and finance, leveraging phishing and known vulnerabilities.<\/p>\n<p>In October 2025, Resecurity\u2019s researchers\u00a0<a href=\"https:\/\/securityaffairs.com\/183447\/security\/qilin-ransomware-announced-new-victims.html\" rel=\"nofollow noopener\" target=\"_blank\">detailed<\/a>\u00a0how the Qilin RaaS group relies on global bulletproof hosting networks to support its extortion operations.<\/p>\n<p>In early October,\u00a0<a href=\"https:\/\/securityaffairs.com\/tag\/dragonforce-ransomware\" rel=\"nofollow noopener\" target=\"_blank\">DragonForce<\/a>,\u00a0<a href=\"https:\/\/securityaffairs.com\/tag\/lockbit\" rel=\"nofollow noopener\" target=\"_blank\">LockBit<\/a>, and\u00a0<a href=\"https:\/\/securityaffairs.com\/tag\/qilin-ransomware\" rel=\"nofollow noopener\" target=\"_blank\">Qilin<\/a>\u00a0<a href=\"https:\/\/securityaffairs.com\/183119\/cyber-crime\/dragonforce-lockbit-and-qilin-a-new-triad-aims-to-dominate-the-ransomware-landscape.html\" rel=\"nofollow noopener\" target=\"_blank\">formed a ransomware alliance<\/a>\u00a0to boost attack effectiveness, marking a major shift in the cyber threat landscape. Ransomware groups DragonForce, LockBit, and Qilin formed a strategic alliance to enhance their attack capabilities, signaling an evolving cyber threat landscape. The alliance aims at sharing tools and infrastructure to enhance attack effectiveness.\u00a0<\/p>\n<p>At the end of March, <a href=\"https:\/\/securityaffairs.com\/tag\/qilin-ransomware\" rel=\"nofollow noopener\" target=\"_blank\">Qilin Ransomware<\/a>\u00a0group <a href=\"https:\/\/securityaffairs.com\/190186\/cyber-crime\/qilin-ransomware-allegedly-breached-chemical-manufacturer-giant-dow-inc.html\" rel=\"nofollow noopener\" target=\"_blank\">allegedly breached<\/a> the chemical manufacturing giant Dow Inc.\u00a0<\/p>\n<p>Follow me on Twitter:\u00a0<a href=\"https:\/\/twitter.com\/securityaffairs\" rel=\"nofollow noopener\" target=\"_blank\">@securityaffairs<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.facebook.com\/sec.affairs\" rel=\"nofollow noopener\" target=\"_blank\">Facebook<\/a>\u00a0and\u00a0<a href=\"https:\/\/infosec.exchange\/@securityaffairs\" rel=\"nofollow noopener\" target=\"_blank\">Mastodon<\/a><\/p>\n<p><a href=\"http:\/\/www.linkedin.com\/pub\/pierluigi-paganini\/b\/742\/559\" rel=\"nofollow noopener\" target=\"_blank\">Pierluigi\u00a0Paganini<\/a><\/p>\n<p>(<a href=\"http:\/\/securityaffairs.co\/wordpress\/\" rel=\"nofollow noopener\" target=\"_blank\">SecurityAffairs<\/a>\u00a0\u2013\u00a0hacking,\u00a0ransomware)<\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"Qilin ransomware group claims the hack of German political party Die Linke Pierluigi Paganini April 04, 2026 Qilin&hellip;\n","protected":false},"author":2,"featured_media":2179,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[2323,2324,2325,5,2326,2327,2328,2329,2330,2331,2332,2333,2334],"class_list":{"0":"post-2178","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-germany","8":"tag-cybercrime","9":"tag-data-breach","10":"tag-die-linke","11":"tag-germany","12":"tag-hacking","13":"tag-hacking-news","14":"tag-information-security-news","15":"tag-it-information-security","16":"tag-malware","17":"tag-pierluigi-paganini","18":"tag-qilin-ransomware","19":"tag-security-affairs","20":"tag-security-news"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/posts\/2178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/comments?post=2178"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/posts\/2178\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/media\/2179"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/media?parent=2178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/categories?post=2178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/germany\/wp-json\/wp\/v2\/tags?post=2178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}