[QILIN] – Ransomware Victim: Beta Dyne

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.

Ransomware group:
QILIN
Victim name:
BETA DYNE

AI Generated Summary of the Ransomware Leak Page

On October 16, 2025, a ransomware leak post attributed to the threat group Qilin identifies Beta Dyne as a victim. The page describes Beta Dyne, a United States-based technology company that designs and manufactures electrical equipment for industrial plants, communications, and medical sectors. The description notes the company has over 20 years of experience in the power industry and highlights a broad product line that includes more than 2,400 standard models and more than 300 custom products. The post frames the incident as a data leak rather than a straightforward encryption event, and it lists a Jabber contact (redacted) and a TOX fingerprint, alongside an FTP address that implies additional exfiltration activity. There is no explicit ransom amount stated on the page.

The leak page references a collection of 20 images, which appear to be icons and screenshots illustrating internal documents or related visuals. These assets are hosted on a Tor onion service, with the URLs defanged in this summary. The page excerpt also reveals a redacted Jabber address and a TOX fingerprint, and it mentions an FTP entry that includes credentials, suggesting further access to exfiltrated data. The post date matches October 16, 2025, and in the absence of a separate compromise date, this is treated as the post date. Taken together, the page portrays Beta Dyne as a ransomware victim focusing on data leakage rather than a full-system encryption, consistent with a data-leak/double-extortion claim by the Qilin group.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features