Qilin ransomware-as-a-service (RaaS) adds a “call an attorney” feature to pressure victims to pay.

The threat actors behind the Qilin ransomware-as-a-service (RaaS) scheme have recently introduced a “Call Lawyer” feature, offering legal counsel to their affiliates as a means to increase pressure on victims during ransom negotiations. This development is part of a broader strategy to make Qilin stand out in the cybercrime marketplace by providing a full suite of services to affiliates, including legal assistance, negotiation support, data storage, DDoS capabilities, and even media support.

How the Legal Counsel Feature Works

Affiliates can access the “Call Lawyer” button within their dashboard or target interface. Upon activation, Qilin’s legal team contacts the affiliate privately to provide qualified legal support tailored to the victim and jurisdiction. The presence of a lawyer in negotiations is intended to intimidate victims and increase the perceived risk and cost of legal proceedings, thereby pushing companies to pay the ransom rather than face protracted legal battles.

Services Provided by Qilin’s Legal Department

• Legal assessment of exfiltrated data.
• Classification of legal/regulatory violations in the victim’s jurisdiction.
• Evaluation of potential damages, including lawsuits, legal costs, and reputational risks.
• Direct negotiations between the victim company and a Qilin-affiliated lawyer.
• Advice on how to inflict maximum financial or reputational harm if the victim refuses to pay, and how to avoid similar refusals in the future.

Strategic Motivation

Qilin’s legal counsel feature is designed to attract more affiliates by projecting a professional, full-service image. This move is part of Qilin’s rapid evolution and expansion. The group has become one of the most active ransomware actors in 2025, with hundreds of victims and a mature, technically advanced infrastructure. The addition of legal counsel and other support services demonstrates how ransomware groups are adopting tactics that mimic legitimate business practices, further blurring the lines between cybercrime and corporate operations.