Summary
On October 3, 2025, the ransomware group Medusa publicly claimed responsibility for an attack targeting
Leprohon Inc, a company based in Sherbrooke, Quebec, Canada, specializing in commercial and residential construction.
According to the threat actor’s post, they intend to release sensitive data unless negotiations are initiated.
Incident Report
Field | Details |
---|---|
Target | Leprohon Inc |
Domain | |
Country | Canada |
Attacking Group | Medusa |
Date Reported | October 3, 2025 |
Threat Actor Statement | “The full leak will be published soon, unless a company representative contacts us via the channels provided.” |
Leprohon Inc is a well-established company in the construction industry, known for its significant contributions to commercial and residential projects. Based in Sherbrooke, Quebec, the company employs between 250 to 499 people and boasts a revenue range of $25M to $50M.
The Medusa group is notorious for executing high-profile ransomware attacks, often targeting large enterprises to extract sensitive data for ransom. Their tactics include encrypting critical data and demanding negotiations to prevent data leaks.
In response to such threats, it is crucial for organizations to engage in proactive cybersecurity measures, including darkweb monitoring. Monitoring the dark web for potential data breaches can provide early warnings and help mitigate risks before critical information is exposed.
For companies aiming to safeguard their data, utilizing tools like the email breach checker available at https://mspdarkintel.com/domain-breach-scan is essential. This tool enables organizations to keep a vigilant eye on potential breaches and respond quickly to emerging threats.
Recommendations
- Monitor your domains and email addresses for exposure using reputable threat intelligence tools.
- Conduct a full compromise assessment and incident response drill internally.
- Verify backups and ensure they are offline and ransomware-resistant.
- Educate staff on phishing, social engineering, and lateral movement techniques used by groups like Qilin.
- Engage with cyber forensics and legal counsel before initiating contact with threat actors.
Check Your Exposure
Wondering if your organization or employees are impacted by recent breach activity?
-
Check domain-wide breach exposure:
mspdarkintel.com/domain-breach-scan -
Check if an email was breached:
mspdarkintel.com/email-breach-scan
Disclaimer
The MSPDarkIntel team does not engage in the exfiltration, downloading, taking, hosting, viewing, reposting, or disclosure of any stolen information.
All breach data reported here is sourced from publicly available threat intelligence feeds for awareness and early-warning purposes only.
Our goal is to inform organizations of emerging threats so they can take timely defensive action.
Table of Contents