Ransomware victim disclosure
← All victimsGrupo Prides
listed as www.grupoprides.com · Claimed by NoEscape · listed 2 years ago
Status timeline
- Listed
Dec 1, 2023
- Data leaked
At a glance
- Group
- NoEscape
- Status
- Data leaked
- Country
- Spain
- Sector
- Manufacturing
- Listed on leak site
- Dec 1, 2023
About the victim
AI dossier — public-source company profileGrupo Prides is a technology and AI solutions company headquartered in Tibás, San José, Costa Rica, with offices in Panama, El Salvador, the USA (West Palm Beach, Florida), and Barcelona, Spain. The company offers products and services including IoT management platforms (KONECT®IoT), AI-integrated healthcare solutions (MediSys® AI), communication tools (K360™), self-service kiosks, chatbots (GPBot®), SaaS, custom development, robotics, and CCaaS. They operate across more than seven countries in Latin America and beyond.
- Industry
- Technology Solutions & Digital Transformation Services
- Address
- 150 metros al sur de Ferretería EPA, Parque Industrial Condal, Bloque F, Oficinas #45 y #55, Tibás, San José, Costa Rica
Attack summary
Severity: high — Data has been published by the ransomware group (disclosed status: data_published), indicating confirmed exfiltration of business data. The company handles multi-country technology deployments and likely holds sensitive client and operational data across multiple sectors including healthcare (MediSys® AI) and IoT infrastructure, elevating the potential impact.NoEscape claims to have attacked Grupo Prides and the disclosure status is marked as data_published, indicating exfiltration and likely publication of company data. No specific details about the volume or nature of the published data were captured in the leak post.
Data the group says was taken
AI dossier — extracted from the leak post- Internal business data
- Potentially client records
- Potentially employee information
- Potentially proprietary technology documentation
Sources
- Victim sitegrupoprides.com
Source
Indexed 2 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
