[QILIN] – Ransomware Victim: Victory Christian Center
![[QILIN] - Ransomware Victim: Victory Christian Center 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On October 15, 2025, a ransomware leak post identifies Victory Christian Center as the victim in an Education-sector incident, with the organization located in Tulsa, Oklahoma. The post is attributed to the threat actor group qilin and frames the incident as a data-leak event rather than a pure encryption event. The attackers claim to have exfiltrated data from the victim’s network and imply that stolen material may be released publicly or offered for sale, consistent with double-extortion ransomware patterns. The post does not publish a ransom amount, and the exact volume of exfiltrated data is not disclosed; the post notes that the amount of downloaded data is unknown at the moment. A compromise date is not explicitly provided beyond the post date.
The leak page includes three images, described as likely screenshots of internal materials. These images appear to be hosted on Tor onion addresses, though the actual image URLs are not disclosed in this summary. In addition to the images, the leaked text includes contact-like identifiers, such as an email-style contact, a Tox ID, and FTP login details; the actual values have been redacted to protect privacy. The victim name—Victory Christian Center—is preserved in the report, while other organization names mentioned in the text are not repeated here. The page reiterates that the amount of downloaded data remains unknown and does not present a clearly stated ransom demand on the leak page.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.