[QILIN] – Ransomware Victim: Habib Bank AG Zurich
![[QILIN] - Ransomware Victim: Habib Bank AG Zurich 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
Habib Bank AG Zurich, a Swiss financial services institution, is identified as the victim on a ransomware leak post attributed to the threat actor group Qilin. The leak page presents the incident as a data-exfiltration event and includes a claim URL indicating a ransom/claim page. The post is dated 2025-11-05 10:20:02.345529; since no separate compromise date is provided, this timestamp is treated as the post date. The page lists Habib Bank AG Zurich’s industry as Financial Services and the country as CH. It features 34 image assets described as screenshots that appear to be internal documents or related materials, though the exact contents are not described in the excerpt. The body excerpt includes a label “TOX” with a long hash, which is part of the post’s metadata. No explicit ransom figure is disclosed in the visible excerpt.
From a threat-actor perspective, the leak’s presentation—34 image attachments likely depicting internal documents—along with a claim URL and the absence of a visible public data download, aligns with common double-extortion tactics used against financial services targets. The 34 images are hosted on onion service addresses, indicating dark-web hosting for the leaked materials. The post does not reveal a fixed ransom amount in the excerpt, and there is no separate compromise date shown beyond the post date. This event underscores the ongoing risk to the Swiss financial sector from ransomware groups and illustrates how leak pages use visual evidence to pressure victims while signaling potential data exposure.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
