[QILIN] – Ransomware Victim: Gullco International
![[QILIN] - Ransomware Victim: Gullco International 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
Gullco International, a Canadian manufacturer, is identified as the victim in a ransomware leak post attributed to the threat group qilin. The leak page places Gullco International within the Canadian manufacturing sector and presents the incident as a public disclosure of a breach. The post is dated November 9, 2025; since no separate compromise date is provided in the data, this timestamp should be treated as the post date. The available excerpt does not clearly state whether the attack encrypted data, exfiltrated data, or both, and no ransom amount is disclosed in the metadata provided. The page is accompanied by visuals intended to corroborate the claim, with three images referenced on the post.
The leak post includes three screenshots that appear to depict internal material, though the exact contents are not described in the excerpt. The visible text in the body references Gullco International and a line that reads “Gullco International Consumer Services,” along with a token-like identifier, but the precise meaning and context of these items are not provided. Overall, the page follows a typical ransomware-leak presentation that combines brief textual claims with accompanying images, yet there is no explicit information about the data stolen, the nature of the breach (encryption vs. data leakage), or any ransom figure in the portion of the post included in the data provided.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
