[QILIN] – Ransomware Victim: LP Charpente

image

Ransomware Group: QILIN

VICTIM NAME: LP Charpente

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page pertains to LP Charpente, a construction company based in Annecy, in the Haute-Savoie region of France. The company specializes in timber-frame housing and traditional carpentry services, including zinc work, roofing, and building extension renovations. The breach was discovered on July 1, 2025, and the attack date is recorded as July 1, 2025. The leak suggests that sensitive data associated with the company’s operations may have been compromised. The page includes a screenshot showing internal documents or data, indicating a significant leak that could impact the company’s business operations and reputation.

While specific details of the files stolen are not disclosed, the leak page indicates the presence of download links or data files related to the victim. The incident appears to have been claimed by a group identified as “qilin.” The compromised information may contain confidential project details, client data, or internal communications, which could lead to operational vulnerabilities. The leak’s public availability highlights the importance of cybersecurity measures within the construction sector, especially concerning the protection of proprietary project information. The company’s website and related data are potentially accessible through the provided anonymized link, emphasizing the need for ongoing threat mitigation strategies.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.