[QILIN] – Ransomware Victim: Malibu Boats Australia

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.

Ransomware group:
QILIN
Victim name:
MALIBU BOATS AUSTRALIA

AI Generated Summary of the Ransomware Leak Page

On 2025-10-29 12:47:44.340044, Malibu Boats Australia, an Australian manufacturing company, is identified as a victim in a ransomware leak post published on a dedicated leak site. The post frames the incident as a data-leak event, asserting that attackers claim to have breached Malibu Boats Australia’s network and exfiltrated sensitive data that may be released publicly or sold. There is no explicitly stated compromise date in the excerpt; in this case, the post date is used as the reference timestamp. The page notes that a claim URL is present, indicating the attackers provide a link to verify or access the stolen data. The narrative centers on Malibu Boats Australia within the manufacturing sector, with no other company names highlighted in the text.

The leak page includes three image assets intended as visual proof, described only as images without detailed content in the text. These assets appear to be screenshots or internal documents. The images are hosted on a Tor onion service, though the actual URLs are not reproduced here. In addition, the body excerpt references a TOX hash value, presented as metadata associated with the leak. No ransom amount or encryption status is disclosed within the available data, but the post’s data-exfiltration framing and proof images are consistent with ransomware data-leak operations involving a named manufacturing victim.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features