[QILIN] – Ransomware Victim: Urban Linker

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.

Ransomware group:
QILIN
Victim name:
URBAN LINKER

AI Generated Summary of the Ransomware Leak Page

Urban Linker is a technology recruitment agency operating in France, with offices in Paris, Lyon, Toulouse, and Bordeaux. The leak post identifies Urban Linker as the victim and notes that the company was founded more than eight years ago, presenting it as a significant presence in the French tech recruitment sector. The post frames the incident as a data-exfiltration event rather than a purely encrypted breach, stating that the amount of downloaded data is unknown at the moment and that additional data will be added later. The metadata lists a post date of 2025-10-14, and no separate compromise date is provided, so readers should treat 2025-10-14 as the publication date of the leak. There is no ransom amount disclosed in the excerpt.

The leak page includes three images or screenshots as visual evidence, described only in general terms without detailed captions. A claim URL is indicated on the page, suggesting an additional channel for information or data related to the incident. The page references contact channels (e.g., a Jabber handle and a TOX identifier) and an FTP link in the body excerpt, but all personally identifiable details and credentials are redacted in the provided data. The content is presented in English, and there is no non-English material requiring translation.

In terms of impact, the post conveys data exfiltration associated with Urban Linker, rather than a clearly stated encryption event, with no specific data-volume figure or ransom amount disclosed in the excerpt. The presence of three screenshots and a claimed data access underscores the ongoing risk to technology recruitment firms that handle sensitive candidate and corporate information, carrying potential reputational and regulatory implications if exposed data is released or misused.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features