[QILIN] – Ransomware Victim: Yaesu
![[QILIN] - Ransomware Victim: Yaesu 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
Yaesu, a Japanese technology manufacturer, is identified as the victim in a ransomware leak post attributed to the threat group “qilin.” The post date provided in the leak metadata is 2025-11-10 19:49:00.320125, and no separate compromise date is given, so this timestamp is treated as the leak’s publication date. The leak page’s body excerpt references Yaesu Yaesu Manufacturing and includes a tokenized label: TOX: 7C35408411AEEBD53CDBCEBAB167D7B22F1E66614E89DFCB62EE835416F60E1BCD6995152B68, which appears to function as an internal reference or identifier rather than a stated ransom amount. The available fields do not explicitly indicate whether encryption occurred or whether data was exfiltrated—the impact field is empty—so the exact nature of the attack’s impact is not clearly defined in the excerpt. The post ties Yaesu to the event and attributes the publication to the qiling group, consistent with standard ransomware leak patterns that publicly identify victims and associated artifacts without necessarily disclosing a ransom figure in the visible excerpt.
The leak page includes ten image attachments, listed in the metadata as 10 images. These are likely thumbnails of internal documents or materials, though their contents are not described in the excerpt. The annotations indicate that the image assets are hosted on onion services, with the actual URLs defanged in this summary; no direct download link is shown, as the downloads_present flag is false. Yaesu is identified as the victim and is located in Japan, in the Technology industry, suggesting a high-value tech manufacturing target. The post date remains the primary timestamp in this record, given the absence of a stated compromise date. In sum, Yaesu is the victim named in the leak, the page features ten images illustrating the breach, and a tokenized label accompanies the post, yet a ransom amount is not disclosed in the provided data.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
