[QILIN] – Ransomware Victim: cadex[.]com

image

Ransomware Group: QILIN

VICTIM NAME: cadex[.]com

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The leak pertains to Cadex Electronics, a company based in Canada that specializes in designing and manufacturing diagnostic chargers, battery analyzers, and rapid testing equipment used across various sectors, including military and commercial applications. The breach was discovered on August 1, 2025, and the attack date is recorded as August 1, 2025. The incident appears to involve data exfiltration by a group known as “qilin.” The leak page includes a screenshot of internal documents, highlighting the sensitive nature of the compromised information. Additionally, the page provides a link to the affected data hosted on a dark web site. The breach may involve the exfiltration of proprietary technical information related to battery diagnostics and testing devices, though explicit sensitive details are not displayed publicly. The leak could impact the company’s operations and client trust if sensitive technical or operational data is accessed by malicious actors.

The page contains a screenshot of the compromised data, which appears to include internal files or documents, suggesting that the attackers gained access to proprietary technical information and possibly other confidential data. The leak is associated with the threat group “qilin,” known for targeting technology and engineering firms. While specific files or their contents are not detailed publicly, the presence of a dark web claim URL indicates the victims’ data is being used as leverage or extortion. No personal or PII data appears to be revealed publicly, but the exposure of internal documents could have operational or security implications. The breach emphasizes the ongoing risks faced by companies in the technology sector regarding targeted ransomware attacks aimed at intellectual property and technical data.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.