Bluize is an IT supplier of hospitality solutions for pubs, bars, restaurants, and gaming venues. It provides venue management systems, point-of-sale software and more.
The company was listed on the dark web leak site of the Qilin ransomware gang on 13 May; however, the threat group did not provide details of the incident, with the listing lacking any information or sample data.
In response to Cyber Daily, Bluize confirmed that an incident had occurred, but said that it had not observed any customer data having been impacted as of yet.
“Bluize Solutions is aware of reports relating to a potential cyber security incident,” the company said.
“We take cyber security and the protection of customer and partner information extremely seriously.
“At this stage, our investigations indicate the incident was limited to general office PCs and did not affect our offsite production servers that host customer systems and data.”
Bluize outlined its response, adding that it had locked down impacted machines to prevent further incidents.
“We are not currently aware of any breach involving customer information. As a precautionary measure, affected office PCs were isolated, cleaned, and restored,” it said.
“We have also engaged an external cyber security firm to assist to further strengthen our security environment moving forward.”
Who is Qilin?
Qilin was first observed in August 2022 and has claimed 1,824 victims since. It has been one of the most – if not the most – active ransomware groups of 2026.
Like other ransomware-as-a-service (RaaS) operations, Qilin offers its ransomware to affiliates in return for a cut of any ransom profits. Cyber security training company SANS has noted that the group is highly active on certain hacking forums.
“Qilin is advertised on the exclusive Russian-speaking forum RAMP (short for Ransom Anon Market Place [sic]), where acquiring an account can cost up to $500 in BTC,” SANS said in an October 2025 blog post.
However, for all of its activity, many of the group’s leak posts remain entirely unconfirmed, with neither evidence of the hack nor any data published months later. Some observers have questioned Qilin’s ransomware chops, suggesting the group is more practised at finding open databases online and then extorting the victim; however, in many cases, the leaked data is real and eventually publicly shared.
Want to see more stories from trusted news sources?Make Cyber Daily a preferred news source on Google.