[QILIN] – Ransomware Victim: More Than Gourmet

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.

Ransomware group:
QILIN
Victim name:
MORE THAN GOURMET

AI Generated Summary of the Ransomware Leak Page

On 2025-10-22, More Than Gourmet, a United States–based company in the Agriculture and Food Production sector, is identified on a ransomware leak page as a victim. The post frames the incident as a data-leak event, asserting that internal information was exfiltrated and is now available for download rather than an encryption incident. More Than Gourmet is described as a producer of classic French culinary products used in gourmet restaurants, resorts, and specialty gourmet stores. The leak page provides a TOX hash as an identifier and references a data-share download link that is presented in a defanged form to prevent direct access. The page includes 19 images intended to illustrate the leaked material. The post date is 2025-10-22; no explicit compromise date is disclosed beyond the posted timestamp.

Claimed content reportedly exposed by the leak includes internal materials such as product formulations, financial information, and the personal data of MTG’s employees and customers. The post states that all data is available for download, consistent with data-leak extortion tactics commonly observed in ransomware campaigns. The leak page features 19 images (screenshots or thumbnails) intended as evidence, though the exact contents are not described here. Some image sources appear to be hosted on dark-web–style infrastructure, with associated defanged data-share links; no ransom amount or encryption status is explicitly disclosed in the post. The post date remains 2025-10-22, and the focus is on the alleged exposure of sensitive information rather than on encryption or a ransom figure.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features