Medusa Strikes Leprohon Inc with Devastating Ransomware Attack

Ransomware

Summary

On October 3, 2025, the ransomware group Medusa publicly claimed responsibility for an attack targeting
Leprohon Inc, a company based in Sherbrooke, Quebec, Canada, specializing in commercial and residential construction.
According to the threat actor’s post, they intend to release sensitive data unless negotiations are initiated.


Incident Report

FieldDetails
TargetLeprohon Inc
Domain
CountryCanada
Attacking GroupMedusa
Date ReportedOctober 3, 2025
Threat Actor Statement“The full leak will be published soon, unless a company representative contacts us via the channels provided.”

Leprohon Inc is a well-established company in the construction industry, known for its significant contributions to commercial and residential projects. Based in Sherbrooke, Quebec, the company employs between 250 to 499 people and boasts a revenue range of $25M to $50M.

The Medusa group is notorious for executing high-profile ransomware attacks, often targeting large enterprises to extract sensitive data for ransom. Their tactics include encrypting critical data and demanding negotiations to prevent data leaks.

In response to such threats, it is crucial for organizations to engage in proactive cybersecurity measures, including darkweb monitoring. Monitoring the dark web for potential data breaches can provide early warnings and help mitigate risks before critical information is exposed.

For companies aiming to safeguard their data, utilizing tools like the email breach checker available at https://mspdarkintel.com/domain-breach-scan is essential. This tool enables organizations to keep a vigilant eye on potential breaches and respond quickly to emerging threats.

Recommendations

  • Monitor your domains and email addresses for exposure using reputable threat intelligence tools.
  • Conduct a full compromise assessment and incident response drill internally.
  • Verify backups and ensure they are offline and ransomware-resistant.
  • Educate staff on phishing, social engineering, and lateral movement techniques used by groups like Qilin.
  • Engage with cyber forensics and legal counsel before initiating contact with threat actors.

Check Your Exposure

Wondering if your organization or employees are impacted by recent breach activity?


Disclaimer

The MSPDarkIntel team does not engage in the exfiltration, downloading, taking, hosting, viewing, reposting, or disclosure of any stolen information.
All breach data reported here is sourced from publicly available threat intelligence feeds for awareness and early-warning purposes only.
Our goal is to inform organizations of emerging threats so they can take timely defensive action.

Keep reading