[QILIN] – Ransomware Victim: Anderson-Moore Construction

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.

Ransomware group:
QILIN
Victim name:
ANDERSON-MOORE CONSTRUCTION

AI Generated Summary of the Ransomware Leak Page

On October 30, 2025, a ransomware leak post is associated with Anderson-Moore Construction, a US-based company in the Construction sector. The post is attributed to the threat group qilin and appears as a breach notification typical of ransom-leak communications. The available data does not clearly label the impact as either Encrypted or Data leak, nor does it list a ransom amount; the date provided is treated as the post date in the absence of a separate compromise date. A defanged claim URL is present on the page, indicating the attackers offer a link for additional details or instructions. The page includes three embedded images, described in the dataset but without detailed captions.

The leak page contains three image assets intended to corroborate the claim, though their contents are not described in the provided data. The images are referenced as being hosted on a non-public onion domain, suggesting access is restricted to specific networks. No downloadable files or other linked content are listed in the record. The body excerpt includes a line labeled TOX followed by a long hexadecimal string, which appears to function as an internal token or identifier associated with the post. While a claim URL is present, there is no explicit ransom figure or encryption detail provided within the available fields.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features