Ransomware victim disclosure
← All victimsGrupo PRIDES
Claimed by NoEscape · listed 2 years ago
Status timeline
- Listed
Dec 1, 2023
- Data leaked
At a glance
- Group
- NoEscape
- Status
- Data leaked
- Country
- Mexico
- Sector
- Technology
- Listed on leak site
- Dec 1, 2023
About the victim
AI dossier — public-source company profileGrupo PRIDES is an ICT company with over 39 years of experience in software development, SaaS solutions, IoT, AI, and telecommunications, operating across more than seven countries in Latin America, the USA, and Spain. The company offers products including K360 communication platforms, KONECT IoT, MediSys AI for healthcare, self-service kiosks, and custom development services. It is headquartered in Tibás, San José, Costa Rica, with offices in Panama, El Salvador, Florida (USA), and Barcelona, Spain.
- Industry
- Information & Communication Technology (ICT) / Software Development
- Address
- 150 metros al sur de Ferretería EPA, Parque Industrial Condal, Bloque F, Oficinas #45 y #55, Tibás, San José, Costa Rica
Attack summary
Severity: high — Data has been published by the ransomware group, confirming exfiltration. The victim is an ICT/SaaS provider operating across multiple countries with healthcare (MediSys AI) and IoT products, meaning leaked data could encompass sensitive client and operational information across several industries and jurisdictions.NoEscape claims to have attacked Grupo PRIDES and has published data (disclosed status: data_published), indicating exfiltration of company data. No specific ransom amount or total data size was stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Software development files
- Business/corporate data
- Telecommunications-related data
- Potentially client records from multi-country operations
- Internal company documents
What the group claims
Grupo Prides is an Information and Communication Technology (ICT) company with more than 39 years of experience in software development and marketing of software and teleco...
Sources
Source
Indexed 2 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
