{"id":12980,"date":"2026-03-22T19:13:44","date_gmt":"2026-03-22T19:13:44","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=12980"},"modified":"2026-03-22T19:13:44","modified_gmt":"2026-03-22T19:13:44","slug":"hacker-group-lapsus-claims-alleged-astrazeneca-knowledge-breach","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=12980","title":{"rendered":"Hacker Group LAPSUS$ Claims Alleged AstraZeneca Knowledge Breach"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>A menace actor group figuring out itself as \u201cLAPSUS$\u201d is claiming duty for an alleged knowledge breach involving <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/ransomware-attack-health-tech-firm-disrupted-covid-19-trials\/\" data-type=\"post\" data-id=\"81653\" target=\"_blank\" rel=\"noreferrer noopener\">AstraZeneca<\/a>, one of many world\u2019s largest multinational pharmaceutical and biotechnology firm. The group claims to have obtained roughly 3GB of inner knowledge, together with supply code, cloud infrastructure configurations, and employee-related info.<\/p>\n<h3 id=\"what-the-threat-actor-claims\" class=\"wp-block-heading\"><strong>What the Risk Actor Claims<\/strong><\/h3>\n<p>In keeping with a submit circulating on a hacker discussion board and the group\u2019s official web site, it alleges entry to:<\/p>\n<ul class=\"wp-block-list is-style-cnvs-list-styled-positive\">\n<li>Worker-related datasets<\/li>\n<li>Full supply code (Java, Angular, Python)<\/li>\n<li>Secrets and techniques and entry credentials (non-public keys, vault knowledge)<\/li>\n<li>Cloud infrastructure configurations (AWS, Azure, Terraform)<\/li>\n<\/ul>\n<p>and extra\u2026<\/p>\n<p>The submit consists of references to downloadable archives in <code>.tar.gz<\/code> format and states a complete knowledge dimension of round 3GB. The hackers are trying to promote the info to the very best bidder and have shared pattern information to assist their claims.<\/p>\n<p>A screenshot with the submit shows AstraZeneca branding and a message promoting the info, alongside a session ID for negotiation and a slogan referencing earlier breach exercise.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/03\/hacker-group-lapsus-astrazeneca-data-breach-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"468\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/03\/hacker-group-lapsus-astrazeneca-data-breach-1-1024x468.jpg\" alt=\"Hacker Group LAPSUS$ Claims Alleged AstraZeneca Data Breach\" class=\"wp-image-142860\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/03\/hacker-group-lapsus-astrazeneca-data-breach-1-1024x468.jpg 1024w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/03\/hacker-group-lapsus-astrazeneca-data-breach-1-300x137.jpg 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/03\/hacker-group-lapsus-astrazeneca-data-breach-1-768x351.jpg 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/03\/hacker-group-lapsus-astrazeneca-data-breach-1-380x174.jpg 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/03\/hacker-group-lapsus-astrazeneca-data-breach-1-800x366.jpg 800w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/03\/hacker-group-lapsus-astrazeneca-data-breach-1-1160x530.jpg 1160w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/03\/hacker-group-lapsus-astrazeneca-data-breach-1.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"\/><\/a><figcaption class=\"wp-element-caption\">The group\u2019s submit on a hacker discussion board (Picture credit score: Hackread.com)<\/figcaption><\/figure>\n<\/div>\n<h3 id=\"analysis-of-the-leaked-samples\" class=\"wp-block-heading\"><strong>Evaluation of the Leaked Samples<\/strong><\/h3>\n<p>Hackread.com managed to overview the pattern knowledge, which is split into 3 principal classes: GitHub-related knowledge, third-party knowledge, and monetary knowledge. Listed below are the small print of what every class accommodates and whether or not the info seems genuine or fabricated.<\/p>\n<h3 id=\"1-github-enterprise-user-data\" class=\"wp-block-heading\"><strong>1. GitHub Enterprise Person Knowledge<\/strong><\/h3>\n<p>One pattern file consists of structured information resembling exports from a GitHub Enterprise surroundings. Fields embody:<\/p>\n<ul class=\"wp-block-list is-style-cnvs-list-styled-positive\">\n<li>Worker names<\/li>\n<li>Value heart references<\/li>\n<li>License sorts (Enterprise)<\/li>\n<li>Enterprise roles and permissions<\/li>\n<li>Two-factor authentication standing<\/li>\n<li>GitHub usernames and profile URLs<\/li>\n<li>Group roles (Proprietor, Member)<\/li>\n<\/ul>\n<h3 id=\"assessment\" class=\"wp-block-heading\"><strong>Evaluation:<\/strong><\/h3>\n<p>The info construction is in keeping with what can be anticipated from actual enterprise exports tied to GitHub or identification and entry administration programs. Its detailed function mappings all through a number of inner organizations recommend visibility from inside a company surroundings somewhat than info gathered by way of public scraping. <\/p>\n<p>The presence of quite a few accounts with \u201cProprietor\u201d privileges throughout a number of repositories additionally will increase the stakes, as a result of if genuine, that sort of entry knowledge can be extremely delicate. If real, this knowledge may expose inner entry hierarchies and allow focused assaults.<\/p>\n<h3 id=\"2-third-party-contractor-access-data\" class=\"wp-block-heading\"><strong>2. Third-Social gathering \/ Contractor Entry Knowledge<\/strong><\/h3>\n<p>One other dataset seems to trace entry requests and onboarding for exterior collaborators, together with:<\/p>\n<ul class=\"wp-block-list is-style-cnvs-list-styled-positive\">\n<li>Inner consumer IDs<\/li>\n<li>Full names and electronic mail addresses<\/li>\n<li>Feedback from inner groups<\/li>\n<li>Firm affiliations (IQVIA, Parexel, Labcorp, and many others.)<\/li>\n<li>Entry standing to inner programs (e.g., Confluence)<\/li>\n<\/ul>\n<h3 id=\"assessment-2\" class=\"wp-block-heading\"><strong>Evaluation:<\/strong><\/h3>\n<p>This knowledge seems to be an inner entry administration or onboarding log, containing personally identifiable info together with particulars about organizational relationships. The inclusion of operational feedback factors to real <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/complexity-clarity-blueprint-scalable-workflow-automation\/\" target=\"_blank\" data-type=\"post\" data-id=\"129704\" rel=\"noreferrer noopener\">inner workflow<\/a> knowledge somewhat than fabricated content material. <\/p>\n<p>Given the character of the data, the danger stage could be thought-about average to excessive, as publicity of contractor relationships and entry programs may very well be used to assist focused social engineering campaigns.<\/p>\n<h3 id=\"3-generic-financial-data\" class=\"wp-block-heading\"><strong>3. Generic Monetary Knowledge<\/strong><\/h3>\n<p>A 3rd dataset accommodates high-level monetary statistics labeled \u201cAll industries\u201d with fields reminiscent of:<\/p>\n<ul class=\"wp-block-list is-style-cnvs-list-styled-positive\">\n<li>Property<\/li>\n<li>Salaries<\/li>\n<li>Whole revenue<\/li>\n<li>Expenditure<\/li>\n<\/ul>\n<h3 id=\"assessment-3\" class=\"wp-block-heading\"><strong>Evaluation:<\/strong><\/h3>\n<p>This knowledge seems to encompass public or generic statistical info somewhat than something particular to AstraZeneca. It was seemingly included to extend the amount of the pattern or distract from extra related knowledge. As such, it carries a low threat stage, with no clear sensitivity or direct connection to AstraZeneca\u2019s operations.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/03\/hacker-group-lapsus-astrazeneca-data-breach.png\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"499\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/03\/hacker-group-lapsus-astrazeneca-data-breach.png\" alt=\"Hacker Group LAPSUS$ Claims Alleged AstraZeneca Data Breach\" class=\"wp-image-142862\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/03\/hacker-group-lapsus-astrazeneca-data-breach.png 640w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/03\/hacker-group-lapsus-astrazeneca-data-breach-300x234.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/03\/hacker-group-lapsus-astrazeneca-data-breach-380x296.png 380w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\"\/><\/a><figcaption class=\"wp-element-caption\">The group\u2019s submit by itself web site (Picture credit score: Hackread.com)<\/figcaption><\/figure>\n<\/div>\n<h3 id=\"sensitivity-of-the-alleged-data\" class=\"wp-block-heading\"><strong>Sensitivity of the Alleged Knowledge<\/strong><\/h3>\n<figure class=\"wp-block-table is-style-stripes\">\n<table class=\"has-fixed-layout\">\n<thead>\n<tr>\n<th>Knowledge Kind<\/th>\n<th>Sensitivity<\/th>\n<th>Affect<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>GitHub enterprise roles<\/td>\n<td>Excessive<\/td>\n<td>Privilege escalation, inner mapping<\/td>\n<\/tr>\n<tr>\n<td>Worker \/ contractor knowledge<\/td>\n<td>Average to Excessive<\/td>\n<td>Phishing, social engineering<\/td>\n<\/tr>\n<tr>\n<td>Cloud infrastructure configs (claimed)<\/td>\n<td>Essential<\/td>\n<td>Full surroundings compromise<\/td>\n<\/tr>\n<tr>\n<td>Generic monetary knowledge<\/td>\n<td>Low<\/td>\n<td>No direct threat<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>If the claimed \u201csecrets and techniques and entry\u201d knowledge is actual, that might signify probably the most extreme threat, although no direct proof of such materials is current within the samples reviewed. Nevertheless, attribution in cybercrime boards is unreliable, and the usage of the identify doesn&#8217;t verify the group\u2019s involvement.<\/p>\n<p>On the time of writing, these claims stay unverified. We&#8217;ve got reached out to AstraZeneca for affirmation or remark. We&#8217;ll replace this story if and when the corporate responds.<\/p>\n<p>\n\t\t\t<\/div>\n<p><template id="YwSklLKh6eE3hv3dSEQH"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A menace actor group figuring out itself as \u201cLAPSUS$\u201d is claiming duty for an alleged knowledge breach involving AstraZeneca, one of many world\u2019s largest multinational pharmaceutical and biotechnology firm. The group claims to have obtained roughly 3GB of inner knowledge, together with supply code, cloud infrastructure configurations, and employee-related info. What the Risk Actor Claims [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":12982,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[2074,8330,641,640,157,853,639,5711],"class_list":["post-12980","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-alleged","tag-astrazeneca","tag-breach","tag-claims","tag-data","tag-group","tag-hacker","tag-lapsus"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12980"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12980\/revisions"}],"predecessor-version":[{"id":12981,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12980\/revisions\/12981"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/12982"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-08 08:21:58 UTC -->