[QILIN] – Ransomware Victim: UScraft

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.

Ransomware group:
QILIN
Victim name:
USCRAFT

AI Generated Summary of the Ransomware Leak Page

UScraft is identified as the victim in a ransomware leak post attributed to the threat group “qilin.” The leak metadata lists the country as the United States and does not disclose the victim’s industry. The post is dated 2025-11-06 17:50:05.564499; since a compromise date is not provided, this timestamp should be treated as the post date rather than the intrusion date. The leak page includes a claim URL, indicating an extortion or information-sharing channel, but there is no explicit ransom figure or disclosed data volume in the provided data. The entry shows no screenshots or images and no downloadable files, suggesting the page carries minimal material in this data snapshot. The victim name is preserved as “UScraft.”

Overall, the entry provides limited detail: zero images and zero downloads, no listed industry, and no attached data. The presence of a claim URL implies the attackers intend a public-facing announcement or further updates, but without visible materials, the page does not substantiate whether encryption, data exfiltration, or both occurred in this record. The post date remains the sole timestamp; readers should monitor for future disclosures from the qilin group or from UScraft that might reveal encryption status, data exposure, or any ransom demands.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features