[QILIN] – Ransomware Victim: Prim Saveurs Import Export

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.

Ransomware group:
QILIN
Victim name:
PRIM SAVEURS IMPORT EXPORT

AI Generated Summary of the Ransomware Leak Page

Prim Saveurs Import Export, a France-based wholesale distributor of fruits and vegetables, is presented as a ransomware victim in a leak post dated 14 October 2025. The page describes Prim Saveurs Import Export SARL as founded on 22 January 2008 and organized as a limited liability company, with activities focused on wholesale (business-to-business) of fruits and vegetables. In 2023, the entity is noted as a Small or Medium Enterprise with approximately 3 to 5 employees. The leak lists two locations, with the head office described (but the address redacted in the public view) and confirms that one location remains in operation. The post frames the incident as a data leak rather than encryption, stating that data has been downloaded but that the total amount is unknown at the time of posting, and it references a claim URL for access to the stolen data.

The leak page includes three images, described as screenshots likely depicting internal documents or related materials; these images are referenced in the annotations and appear to be hosted on onion-based services (with URLs defanged in the published material). The excerpt also reveals ancillary data such as a redacted email contact and an FTP endpoint that contains embedded credentials, illustrating typical data-exfiltration activity. The post does not provide an explicit ransom amount within the available text, and there is an indication of a claim URL for those seeking access to the claimed data. Overall, the post presents Prim Saveurs Import Export as a victim of a data-leak event, with accompanying visual artifacts intended to support the breach claim.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features