BreachesHIGH

AstraZeneca Data Breach - LAPSUS$ Group Claims Internal Access

CSCyber Security News
AstraZenecaLAPSUS$data breachintellectual propertycloud infrastructure
🎯

Basically, hackers claim to have stolen important data from AstraZeneca and are trying to sell it.

Quick Summary

LAPSUS$ claims to have breached AstraZeneca, attempting to sell sensitive internal data. This breach raises alarms about the exposure of critical information. Companies must enhance their security measures to prevent similar incidents.

What Happened

The notorious hacking group LAPSUS$ has resurfaced, allegedly claiming responsibility for a significant data breach involving AstraZeneca, a major player in the pharmaceutical industry. They are reportedly attempting to sell a compressed 3GB internal data dump, indicating a potential shift towards pay-to-access extortion methods. This group, known for targeting high-profile technology firms, appears to be actively exploiting AstraZeneca's internal systems.

LAPSUS$ has teased the stolen data on illicit forums, providing screenshots and details about the contents of the archive. They are enticing potential buyers to negotiate a purchase via the secure messaging app Session. As of now, no full leak has been made publicly available, suggesting that the group's primary motive is financial gain through direct sales rather than immediate public extortion.

Who's Affected

The breach could have far-reaching implications for AstraZeneca, especially concerning its internal operations and cloud infrastructure security. The data dump allegedly contains highly sensitive intellectual property and critical infrastructure configuration details. This includes source code for various applications and cloud infrastructure setups that are vital for their operations.

The potential exposure of such sensitive information poses risks not only to AstraZeneca's proprietary technologies but also to their supply chain management and logistical functions. If the claims are legitimate, the implications could extend beyond financial losses to significant operational disruptions.

What Data Was Exposed

According to the claims made by LAPSUS$, the 3GB data dump includes a variety of sensitive components:

  • Source Code: This includes Java Spring Boot applications, Angular frontend frameworks, and various Python scripts.
  • Cloud Infrastructure: The breach reportedly exposes Terraform configurations for AWS and Azure, along with Ansible roles used for automation.
  • Secrets and Access: The attackers have claimed to possess private cryptographic keys, Vault credentials, and authentication tokens related to GitHub and Jenkins CI/CD pipelines.

The attackers have even released public samples that reveal specific internal repository structures, including a critical supply-chain portal repository. This portal is crucial for managing logistics functions such as forecasting and inventory tracking.

What You Should Do

For organizations, this incident serves as a critical reminder to bolster their cybersecurity measures. Here are some steps to consider:

  • Review Security Protocols: Ensure that access to sensitive data is tightly controlled and monitored.
  • Implement Strong Authentication: Use multi-factor authentication to protect access to critical systems.
  • Educate Employees: Regularly train staff on recognizing phishing attempts and securing sensitive information.
  • Monitor for Unusual Activity: Keep an eye on network traffic and access logs for any suspicious behavior.

As the situation develops, AstraZeneca should consider engaging with cybersecurity experts to assess the breach's impact and strengthen their defenses against future attacks. The stakes are high, and proactive measures are essential to safeguard sensitive data.

🔒 Pro insight: The LAPSUS$ group's shift to pay-to-access extortion highlights evolving tactics in cybercrime, necessitating enhanced defenses for sensitive corporate data.

Original article from

Cyber Security News · Guru Baran

Read Full Article

Related Pings

HIGHBreaches

WorldLeaks Ransomware - Breach of Los Angeles City Revealed

The WorldLeaks ransomware group has breached the City of Los Angeles, posing a significant threat to public data. This breach impacts residents and city operations alike. Authorities are investigating the extent of the damage and urging vigilance among affected individuals.

Security Affairs·
HIGHBreaches

Trivy Breach - Infostealer Malware Distributed via GitHub

A supply-chain attack compromised the Trivy vulnerability scanner, distributing infostealer malware via GitHub Actions. Developers using affected versions are at risk. Immediate action is required to secure environments and rotate credentials.

BleepingComputer·
HIGHBreaches

Breaches - Cyberattack on Breathalyzer Firm Leaves Drivers Stranded

What Happened This week, Intoxalock, a company that provides breathalyzer devices for drivers, reported a significant cyberattack affecting its systems. The attack has rendered many of its breathalyzers inoperable, causing frustration for approximately 150,000 daily users across the U.S. Drivers have taken to social media to express their helplessness, stating that their vehicles have become "giant paperweights" due to

Wired Security·
HIGHBreaches

French Aircraft Carrier - Location Exposed by Strava Activity

A sailor's Strava activity revealed the location of the French aircraft carrier Charles de Gaulle. This breach raises serious operational security concerns for military assets. It's a stark reminder of the risks associated with fitness tracking apps.

SC Media·
HIGHBreaches

Navia Benefit Solutions - Major Data Breach Exposes Millions

Navia Benefit Solutions faces a major data breach affecting 2.7 million people. Sensitive personal information is exposed, increasing phishing risks. Free identity protection services are being offered to those impacted.

SC Media·
HIGHBreaches

Magento Breach - 7,500 Sites Defaced in Global Attack

A massive hacking campaign has defaced over 7,500 Magento sites, impacting e-commerce and government platforms. This highlights serious security vulnerabilities in widely used web platforms. Immediate action is needed to secure affected sites.

Security Affairs·