Summary
On October 3, 2025, the ransomware group Medusa publicly claimed responsibility for an attack targeting
LGB, a leading Indian manufacturer of automotive chains and parts. The attackers have threatened to release sensitive data unless their demands are met.
Incident Report
Field | Details |
---|---|
Target | LGB |
Domain | N/A |
Country | India |
Attacking Group | Medusa |
Date Reported | October 3, 2025 |
Threat Actor Statement | “The full leak will be published soon, unless a company representative contacts us via the channels provided.” |
LGB, established in 1937, is a prominent manufacturer in the automotive sector, renowned for its timing chains, sprockets, and precision-machined parts. The company plays a crucial role in the Indian and U.S. markets, with a strong reputation for quality and innovation.
The Medusa group is a notorious ransomware organization known for targeting large enterprises, demanding ransom payments in exchange for not leaking sensitive information. Their tactics often involve encrypting valuable company data and threatening to release it publicly.
Proactive Response to Ransomware Threats
Organizations can mitigate the risks associated with ransomware attacks by proactively monitoring the dark web. Understanding the early signs of potential threats through dark web intelligence can provide valuable time to respond. Utilize tools like the email breach checker available at MSP Dark Intel to keep an eye on your company’s data and safeguard against future attacks.
Recommendations
- Monitor your domains and email addresses for exposure using reputable threat intelligence tools.
- Conduct a full compromise assessment and incident response drill internally.
- Verify backups and ensure they are offline and ransomware-resistant.
- Educate staff on phishing, social engineering, and lateral movement techniques used by groups like Qilin.
- Engage with cyber forensics and legal counsel before initiating contact with threat actors.
Check Your Exposure
Wondering if your organization or employees are impacted by recent breach activity?
-
Check domain-wide breach exposure:
mspdarkintel.com/domain-breach-scan -
Check if an email was breached:
mspdarkintel.com/email-breach-scan
Disclaimer
The MSPDarkIntel team does not engage in the exfiltration, downloading, taking, hosting, viewing, reposting, or disclosure of any stolen information.
All breach data reported here is sourced from publicly available threat intelligence feeds for awareness and early-warning purposes only.
Our goal is to inform organizations of emerging threats so they can take timely defensive action.
Table of Contents