[QILIN] – Ransomware Victim: Khatami Law
![[QILIN] - Ransomware Victim: Khatami Law 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On October 19, 2025, a leak page associated with the Qilin ransomware group identifies Khatami Law, a United States–based law firm, as a victim. The post frames the incident as a data-leak event driven by exfiltration rather than a pure encryption attack, aligning with the double-extortion pattern seen in contemporary ransomware campaigns. The attackers claim to have stolen internal data and threaten public release or sale of the material, though no ransom amount is shown in the publicly visible excerpt. The post date is listed on the page, the metadata notes the victim’s country as the United States, and the industry field is not provided. The page attributes the attack to the group Qilin.
The leak page includes three screenshots, described as images, which appear to depict internal documents or records. The images are hosted on a Tor onion service. The visible text references contact channels and verification identifiers used by the attackers—an apparently redacted Jabber address and a TOX hash, along with a line that resembles an FTP login with redacted credentials—elements kept redacted to protect privacy. A claim URL is indicated as present, though the actual link is not shown in this summary. The excerpt does not disclose any ransom demand or specific data types purportedly compromised.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.