[QILIN] – Ransomware Victim: Izaki Group Investments

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.

Ransomware group:
QILIN
Victim name:
IZAKI GROUP INVESTMENTS

AI Generated Summary of the Ransomware Leak Page

On 2025-10-27 17:10:16.730606, Izaki Group Investments, a financial services firm based in Israel, is identified on a ransomware leak page attributed to the threat group Qilin. The page provides basic victim context—industry and country—but does not list a clearly stated compromise date in the metadata; consequently, the posted date is treated as the post date. The leak entry notes that a claim URL is present, aligning with extortion practices that threaten public data release or negotiation leverage. Three image attachments are hosted on a Tor onion service and appear to be screenshots or internal-document visuals; the exact contents are not described in the metadata. The body excerpt contains a TOX tag with a long hash value and references an FTP data-share endpoint whose login credentials and recipient address are redacted in the public data.

The available fields do not specify whether encryption was performed or the ransom amount; there is no explicit mention of a data loss or encryption outcome. Downloads are flagged as not present on the page. The presence of three onion-hosted images and a claim URL is consistent with ransomware leak behavior that seeks to threaten or monetize data exposure. The victim’s sector is financial services and the country of operation is Israel, with the post dated 2025-10-27. A redacted FTP data-share reference in the body excerpt suggests the attackers are asserting access to a data-sharing channel, though sensitive contact details have been removed from the public record.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features