[QILIN] – Ransomware Victim: Durvet
![[QILIN] - Ransomware Victim: Durvet 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On November 5, 2025, a ransomware leak post surfaced on a dark-web page associated with the threat actor group qilin, naming Durvet as a victim in the United States manufacturing sector. The post frames the incident as a data-leak disclosure and does not publish an explicit ransom amount in the excerpt provided. Because no compromise date is listed, the published post date is treated as the post date. The leak page notes that a claim URL is present and includes a gallery of 15 images that appear to be screenshots or thumbnails of internal documents or related materials. A hex-coded identifier labeled “TOX” accompanies the text, followed by a long hex string, which seems to function as an attacker reference for this post.
The 15 image assets are delivered via onion-hosted links, indicating the leak uses a dark-web infrastructure for distribution. The images are displayed as thumbnails, but their exact contents are not described in the excerpt. The presence of a claim URL suggests the attackers maintain a portal for extortion or disclosure of exfiltrated data. The excerpt does not reveal any explicit ransom demand or encryption status; the material focuses on showing internal materials rather than detailing the breach’s technical impact.
Taken together, the visible artifacts identify Durvet as the victim and place the event in the US manufacturing domain. The post date is November 5, 2025, and the listing includes a 15-image gallery plus an indication of a claim URL. No compromised date or ransom amount is disclosed in the excerpt. Observers should monitor for updates from the threat group and consider reviewing data security and third-party risk controls in light of potential exposure of internal documents.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
