Medusa Ransomware Strikes AJE Group, Demands $1.5 Million

Incident Date: Jun 23, 2024

Attack Overview
VICTIM
AJE Group
INDUSTRY
Manufacturing
LOCATION
Peru
ATTACKER
Medusa
FIRST REPORTED
June 23, 2024

Analysis of the Medusa Ransomware Attack on AJE Group

Company Profile: AJE Group

AJE Group, a multinational beverage company based in Lima, Peru, stands out in the manufacturing sector for its cost-effective production methods and expansive market reach. Founded in 1988, the company employs approximately 10,000 people and operates in over 20 countries across four continents. AJE is renowned for its flagship products like Kola Real and Big Cola, and its ability to operate efficiently with lean staffing and minimal advertising costs. This operational model, while advantageous, may also expose the company to cybersecurity risks due to potentially under-resourced IT security measures.

Attack Overview

The Medusa ransomware group has claimed responsibility for a significant cyberattack on AJE Group, allegedly compromising 646.4 GB of sensitive data. The attackers have demanded a ransom of US$1,500,000, threatening to release the data if their demands are not met within a specified deadline. This attack underscores the vulnerability of global enterprises to targeted ransomware campaigns, particularly those with extensive digital and operational footprints.

Ransomware Group Profile: Medusa

Medusa, emerging as a notable threat in the cybersecurity landscape, operates on a Ransomware-as-a-Service model, enabling widespread attacks across various sectors. The group is known for its aggressive tactics, including disabling system recovery features and demanding high ransoms. Their approach often involves extensive reconnaissance to exploit specific vulnerabilities within target organizations, which could have been the case with AJE Group's potentially underfunded IT security defenses.

Potential Entry Points and System Vulnerabilities

Considering AJE Group’s operational strategy, the entry point for Medusa could have been through inadequately secured remote access points or phishing attacks targeting employees. The company’s reliance on independent truckers and external distributors might also open additional attack vectors, such as compromised supply chain software or systems.

Sources:

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.