[QILIN] – Ransomware Victim: JA Jennings

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.

Ransomware group:
QILIN
Victim name:
JA JENNINGS

AI Generated Summary of the Ransomware Leak Page

JA Jennings is identified as the victim in a ransomware leak post attributed to the threat group qilin. The page describes JA Jennings as a mid-size, full‑service construction company founded in 1917, handling private‑sector commercial interiors projects as well as large-scale building renovations and infrastructure programs in the New York City metropolitan area, with headquarters in New York City. The leak post lists a broad set of market sectors served, including healthcare, institutional/educational, corporate interiors, cultural and exhibition spaces, financial and banking, technology/data centers, and retail stores. The page includes three screenshots of internal documents to illustrate its claims and provides a claim URL for engagement or negotiation. It also features attacker identifiers, including a redacted Jabber contact and a TOX ID. The post date on the leak page is 2025-10-19; the accompanying data does not specify a separate compromise date, so this date is treated as the post date.

The excerpt does not openly state whether encryption or data exfiltration is the explicit impact of the attack, but the structure and elements typical of ransomware leak posts are present, including a claim link and screenshots of internal documents. The page notes three image attachments, which are described only in general terms as internal documents or related visuals, without detailing their contents. PII such as emails is redacted in the publicly visible metadata, and contact information that appears in the text is sanitized (for example, a Jabber address is redacted). The leak text also references an attacker‑provided identifier (TOX) and hints at data-sharing channels, though no ransom amount or specific ransom demand is shown in the available excerpt. The overall presentation aligns with a data‑leak style post from a ransomware operator against a construction sector target, underscoring the risk profile for firms operating in the New York City area.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features