[QILIN] – Ransomware Victim: www[.]officepro[.]cl
![[QILIN] - Ransomware Victim: www[.]officepro[.]cl 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: QILIN
VICTIM NAME: www[.]officepro[.]cl
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The leak page concerns the victim, www[.]officepro[.]cl, a Chile-based distributor of office supplies operating in the Business Services sector. The description indicates a long-standing presence in the local market, dating back to 1991 in Vitacura under the name Distribuidora Capri. The post appears to present a ransomware-related disclosure and includes three image attachments. The page date provided in the data is 2025-09-24; since no separate compromise date is given, this date is treated as the post date. A claim URL is noted, suggesting the attackers assert the breach and may be signaling that stolen data could be exposed or released.
The page includes three image attachments, though the exact contents of these images are not described in the data. The visible excerpt references a blog entry and contains contact-related information that has been redacted for privacy, along with a file-transfer entry that appears to include login details in the original data. No ransom amount is provided in the available information. The presentation retains the victim name www[.]officepro[.]cl, while other company names mentioned in the text are not reiterated in this summary. Overall, the content aligns with a ransomware leak narrative focusing on potential data exposure rather than detailing encryption outcomes.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.