[QILIN] – Ransomware Victim: Scales Sales & Service

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.

Ransomware group:
QILIN
Victim name:
SCALES SALES & SERVICE

AI Generated Summary of the Ransomware Leak Page

On October 19, 2025, a leak post attributed to the group qilin publicly discloses an incident involving Scales Sales & Service, a United States–based business services firm that specializes in scale equipment and related services. The victim is described as a long-standing company founded in 2004 in Omaha, Nebraska, with a multi-site footprint that includes locations in Colorado, Nebraska, and Iowa. The post frames the event as a data-leak rather than a full encryption of systems, noting that the amount of data exfiltrated remains unknown and that no ransom demand is stated in the excerpt. The attackers claim to have exfiltrated data from Scales Sales & Service and imply that stolen materials may be released publicly or made available for download, which aligns with established patterns seen in ransomware extortion campaigns. The leak page includes three images or screenshots, though their specific content is not described in the excerpt.

Supplementing the narrative, the leak post presents metadata and contact indicators typical of ransomware leak sites. PII in the public text is redacted, with references to a Jabber contact shown as redacted and a TOX identifier present; an FTP credential line is visible but the sensitive information has been redacted. The page records three images as evidence, though the exact contents of those images are not detailed here. The dataset notes that downloads are not directly provided on the page (downloads_present: false), while the accompanying text states that the amount of downloaded data is unknown, consistent with the dual-extortion model where data exfiltration is claimed but public release timing remains unclear. The post is dated October 19, 2025, which is the post date; no separate compromise date is provided. The summary preserves Scales Sales & Service as the named victim, with other company names mentioned in the source text not referenced in this summary.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features