[MEDUSA] – Ransomware Victim: Cooperativa Esercenti Farmacia Scrl
![[MEDUSA] - Ransomware Victim: Cooperativa Esercenti Farmacia Scrl 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the MEDUSA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
Cooperativa Esercenti Farmacia Scrl, a healthcare-focused cooperative based in Brescia, Italy, with an estimated workforce of 469 employees, is listed as a ransomware leak victim. The leak page is attributed to the medusa group and notes that a claim URL is present on the page, suggesting the attackers published a public statement or ransom info. The record provides a key date of 2025-10-22 16:42:26.000000; since no explicit compromise date is supplied in the data, this is treated as the post publication date. The victim’s public description portrays the organization as one that supports pharmacy operators by delivering communications and institutional updates to its members, emphasizing regulatory compliance and mutual support among pharmacists and pharmacy-related entities. The entry indicates the organization is headquartered in Brescia, Italy (address redacted).
The leak page content available in the data is limited. A human verification barrier appears on the page, indicating that access to the full content requires captcha verification. The dataset shows no images or downloadable files associated with the post (images_count = 0; downloads_present = false). A claim URL is indicated as present, but there are no accessible details about the data claimed to be exfiltrated or about any encryption or ransom demands within the provided extract. No explicit impact type or ransom figure is disclosed in the supplied fields. In summary, the post confirms the victim and the date, but the precise scope of the attack and any requested payment are not disclosed in this snapshot.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
