[QILIN] – Ransomware Victim: Media Broadcast Satellite

image

Ransomware Group: QILIN

VICTIM NAME: Media Broadcast Satellite

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The recent leak involves Media Broadcast Satellite GmbH, a company operating within the telecommunication industry in Germany. The compromise was publicly disclosed on July 17, 2025, following the attack that was initially reported on July 11, 2025. The threat actors, associated with the group known as Qilin, have published data related to the victim as part of their ransomware operation. The leak includes a screenshot of internal documents, indicating potential exposure of sensitive information, although specific PII or operational details are not disclosed in the available summary. The compromised data provides insights into the company’s satellite and data network communication solutions, highlighting the impact on their service infrastructure.

The ransomware leak page offers a claim URL hosted on the dark web, allowing interested parties to verify the breach or potentially access leaked data. While the exact contents of the leak are not fully detailed here, the presentation of the screenshot emphasizes the seriousness of the incident. The attack’s timing and the group’s claims suggest targeted efforts to disrupt or embarrassment of Media Broadcast Satellite GmbH’s operations. The victim organization provides satellite communication and network services in Germany, and the breach could potentially affect various stakeholders relying on their infrastructure. No additional threatening content or detailed data leaks are explicitly noted beyond the visual evidence and the claim of a successful ransomware compromise.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.