[QILIN] – Ransomware Victim: NurseSpring
![[QILIN] - Ransomware Victim: NurseSpring 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On October 22, 2025, a leak post attributed to the ransomware group qilin identified NurseSpring, a United States-based healthcare provider that specializes in home health care, healthcare staffing, and nurse recruitment, as a victim. The post frames the incident as a data-leak event rather than a traditional encryption attack and claims that sensitive data has been exfiltrated from NurseSpring’s network. The attackers state that the total volume of exfiltrated data is unknown at the time of posting and indicate that additional information would be released later; there is no explicit ransom amount disclosed in the excerpt. The leak page includes a claim URL and features three images that appear to be screenshots or internal documents, hosted on a Tor onion service. A data-share address and credentials are referenced in the text, but those details are redacted in this summary. The overall presentation aligns with double-extortion patterns in which attackers threaten to publish stolen data to pressure payment.
The page’s content emphasizes NurseSpring’s role in providing in-home health services, staffing, and nurse recruitment within the United States, and the posted date serves as the page date rather than necessarily reflecting a known compromise date. The leak also indicates that the amount of data downloaded remains unknown and that more information would be provided later, which is typical of ongoing leak campaigns. Three images are included on the page, described in the metadata as screenshots or internal documents; they are hosted on an onion-addressed domain, and their exact contents are not disclosed in the summary. No direct ransom figure or encryption status is stated in the excerpt, and there is a link claim present, suggesting additional material or a demand may be offered through the linked resource.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.