[QILIN] – Ransomware Victim: PCB Uitvaartzorg

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.

Ransomware group:
QILIN
Victim name:
PCB UITVAARTZORG

AI Generated Summary of the Ransomware Leak Page

PCB Uitvaartzorg is identified as the victim in a ransomware leak post dated November 6, 2025. The record indicates the victim’s industry is not provided, and no explicit compromise date is listed; in this case, the post date is used as the reference. The leak page presents a minimal profile: there are no downloadable files or visible images, and there is no body excerpt available in the metadata. The page does indicate the presence of a claim URL, suggesting a ransom-related note, but the exact claims (whether encryption, data exfiltration, or a specific ransom demand) are not disclosed in the available data. The victim is located in Belgium (country code BE).

From the metadata, there is no explicit information on the scale of impact, the types of data involved, or any ransom figures. The page shows zero images and no downloadable content, which suggests that this particular post does not publicly display internal documents or data samples. Given the limited details, readers cannot confirm whether systems were encrypted or if data was exfiltrated based solely on the posted information. The post date remains the only explicit temporal reference, with no additional context provided about the compromise beyond the claim URL noted on the page.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features