Medusa Ransomware Strikes Inmobiliaria Armas in Chile

Incident Date: Dec 11, 2024

Attack Overview
VICTIM
Inmobiliaria Armas
INDUSTRY
Real Estate
LOCATION
Chile
ATTACKER
Medusa
FIRST REPORTED
December 11, 2024

Medusa Ransomware Group Targets Inmobiliaria Armas in Chile

Inmobiliaria Armas, a leading real estate company in Chile, has recently been targeted by the Medusa ransomware group. This attack has disrupted the operations of the company, which is renowned for its extensive experience and innovative real estate solutions. Founded in 1964, Inmobiliaria Armas has completed over 250 projects, delivering more than 5,000 housing units across Chile and expanding into international markets like Peru and Colombia.

Company Profile and Industry Standing

Inmobiliaria Armas operates under the brand name ARMAS and is headquartered in Las Condes, Santiago Metropolitan, Chile. With a workforce of 398 employees, the company is known for its commitment to quality and customer satisfaction. It offers a diverse range of housing solutions, including state-subsidized properties, high-rise buildings, and commercial spaces. The company's strategic vision focuses on transforming the real estate landscape in Chile and beyond, emphasizing sustainability and innovative design.

Details of the Ransomware Attack

The ransomware attack on Inmobiliaria Armas involved the encryption of critical data, with the attackers demanding a ransom for its release. The company has engaged cybersecurity experts to assess the breach's extent and restore affected systems. While the company has not disclosed its stance on the ransom demands, it is prioritizing the enhancement of its cybersecurity measures to prevent future incidents.

Medusa Ransomware Group's Modus Operandi

The Medusa ransomware group, active since 2021, operates under a Ransomware-as-a-Service model. It is known for its rapid encryption capabilities and multi-extortion strategies, which include threatening to release sensitive data if ransoms are not paid. Medusa typically gains access through phishing emails and exploits vulnerabilities in software such as FortiClient EMS and Citrix ADC. The group is distinguished by its advanced evasion techniques and aggressive online presence, using platforms like the Medusa Blog to negotiate ransom terms.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.