BreachesHIGH

AstraZeneca Hack - Lapsus$ Claims Data Breach

SWSecurityWeek
AstraZenecaLapsus$data breachemployee datainternal code repositories
🎯

Basically, hackers stole sensitive data from AstraZeneca, including employee information and internal code.

Quick Summary

What Happened The notorious Lapsus$ extortion group has made headlines by claiming they hacked into AstraZeneca, a major player in the biopharmaceutical industry. They boast of stealing approximately 3GB of sensitive data from the company. This data includes a variety of internal resources, such as code repositories, credentials, and employee information. The hackers shared their claims on an underground

What Happened

The notorious Lapsus$ extortion group has made headlines by claiming they hacked into AstraZeneca, a major player in the biopharmaceutical industry. They boast of stealing approximately 3GB of sensitive data from the company. This data includes a variety of internal resources, such as code repositories, credentials, and employee information. The hackers shared their claims on an underground forum, indicating the seriousness of the breach.

The stolen data reportedly includes Java-based application code, which encompasses controllers, repositories, services, and configuration files. Additionally, the hackers have claimed to take sensitive information related to cloud infrastructures, including AWS, Azure, and Terraform data. This breach could have far-reaching implications, affecting not just AstraZeneca but also its employees and partners.

Who's Affected

If Lapsus$’ claims are verified, the impact of this breach could be extensive. Employees of AstraZeneca may find their personal information compromised, while partners and clients could also face risks associated with the leaked data. The nature of the stolen information suggests that it may involve critical aspects of AstraZeneca's internal operations, potentially disrupting supply chain workflows and business processes.

Moreover, the breach could lead to intellectual property theft, which is particularly concerning in the highly competitive pharmaceutical sector. The hackers have even added AstraZeneca to their Tor-based leak site, where they intend to sell the stolen information, further amplifying the stakes involved.

What Data Was Exposed

The data that Lapsus$ claims to have exfiltrated includes a wealth of sensitive information. This encompasses credentials and tokens, internal code repositories, and various employee data points. Specifics mentioned include project paths related to internal development assets, as well as SQL scripts, table definitions, and components crucial for inventory and order management.

The hackers have not only targeted developers' artifacts but also critical operational data, which could affect AstraZeneca's overall business functionality. This broad spectrum of stolen data highlights the potential vulnerabilities present in AstraZeneca's cybersecurity measures and raises questions about how such a breach could occur.

What You Should Do

For individuals and organizations connected to AstraZeneca, it is crucial to stay vigilant. If you are an employee, monitor your personal accounts for any suspicious activity and consider changing your passwords. For partners and clients, ensure that you are aware of any potential impacts on your data and operations.

Moreover, companies in similar sectors should review their cybersecurity protocols to prevent such breaches. Implementing robust security measures, including regular audits and employee training on phishing and data protection, can help mitigate risks. Staying informed about the developments in this case will also be essential as AstraZeneca works to respond to this serious incident.

🔒 Pro insight: Analysis pending for this article.

Original article from

SecurityWeek · Ionut Arghire

Read Full Article

Related Pings

HIGHBreaches

Data Breach - HackerOne Discloses Employee Data Theft

HackerOne has revealed a data breach affecting hundreds of employees due to a hack on Navia. Sensitive personal information was stolen, raising security concerns. Affected individuals are urged to monitor their accounts and utilize identity protection services.

BleepingComputer·
HIGHBreaches

Dutch Finance Ministry - Investigates Cyber Breach Impact

A cyber breach has hit the Dutch Ministry of Finance, affecting internal systems. While some employee operations are disrupted, key services remain unaffected. Investigators are working to determine the extent of the breach and any exposed data.

The Record·
HIGHBreaches

Infinite Campus Data Breach - ShinyHunters Claims Theft

Infinite Campus is warning of a data breach after ShinyHunters claimed to have stolen sensitive information. This incident affects numerous K-12 districts across the U.S. and raises concerns about data security in education. The company is taking steps to secure its systems and inform affected parties.

BleepingComputer·
HIGHBreaches

Crunchyroll Data Breach - Customer Service Data Stolen

Crunchyroll has confirmed a data breach involving customer service ticket data. Hackers accessed information from 6.8 million users. This raises serious privacy concerns for users. Stay vigilant and protect your information.

The Record·
HIGHBreaches

Data Breach - HackerOne Criticizes Supplier's Delay

HackerOne is upset with Navia for delaying a breach notice affecting nearly 300 employees. Sensitive data was exposed, raising serious concerns about identity theft. The incident highlights the risks of relying on third-party suppliers.

The Register Security·
HIGHBreaches

Aqua Security Breach - 44 Repositories Defaced by Attackers

Aqua Security faced a major breach as 44 repositories were defaced. Developers using their tools are at risk due to exposed internal code and credentials. Immediate action is needed to secure systems affected by this supply chain attack.

Security Affairs·