[QILIN] – Ransomware Victim: KIS Asset Evaluation
![[QILIN] - Ransomware Victim: KIS Asset Evaluation 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On October 22, 2025, KIS Asset Evaluation, described on the leak page as a Korea-based financial services firm focused on asset valuation, was identified as a ransomware victim. The post presents this as a data-leak event rather than a purely encrypted intrusion and claims that sensitive internal data has been exfiltrated. A ransom-claim link is indicated on the leak page, suggesting a potential double-extortion scenario, but no ransom amount is disclosed in the available data. The page date is the post date, with no explicit compromise date provided beyond that timestamp.
The leak page includes three images that accompany the post, described in the metadata as screenshots or visuals likely of internal documents or related assets. The exact contents of these images are not detailed in the summary. The body excerpt contains a server error message and an FTP-style data-exchange line referencing a datashare endpoint; in the sanitized data, passwords or credentials are redacted. These elements are typical of leak-site content aimed at illustrating access and exfiltration, though the dataset does not specify the precise scope of stolen data or any encryption details, and no ransom figure is provided.
Geographically, the leak text identifies KIS Asset Evaluation as a Korea-based organization, whereas the API metadata lists the victim as located in the United States, highlighting a cross-check discrepancy that warrants corroboration from additional sources. The post notes the presence of three illustrative images and a claim URL but stops short of detailing the data types involved or a monetary demand. Taken together, the information points to a data-leak ransomware scenario for a financial services entity, with the exact scope, data categories affected, and any demand remaining unconfirmed in the provided data.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.