[QILIN] – Ransomware Victim: a1trusses[.]com
![[QILIN] - Ransomware Victim: a1trusses[.]com 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: QILIN
VICTIM NAME: a1trusses[.]com
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The ransomware leak page pertains to a construction company specializing in timber trusses, operating under the domain a1trusses.com. The attack was discovered on May 29, 2025, and the attackers, identified as part of the “qilin” group, have announced that all company data will be available for download on June 9, 2025. The leaked information is expected to include confidential business data, although specific details have not been disclosed publicly at this stage. The page features a screenshot of internal documents indicating the seriousness of the breach and potential exposure of sensitive company information, which could impact ongoing operations and client trust.
The company, established in 1983 and based in the Lower Mainland area of Vancouver, has a long-standing history in the construction industry. Currently, there are no indications that any employee or third-party data was compromised during the attack. The threat actors have shared a claim URL through a dark web portal, providing a point of contact for potential negotiations or further information. The leak appears primarily aimed at coercing the company into compliance or payment, with no explicit mention of specific data types or PII. Due to the targeted nature of the attack, stakeholders should remain vigilant and anticipate potential impacts on the company’s operations once the data is released.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.