Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LAPSUS$ Group Allegedly Breaches AstraZeneca Data

LAPSUS$ Group Allegedly Breaches AstraZeneca Data

Posted on March 22, 2026 By CWS

The infamous hacking group LAPSUS$ has made headlines once again, allegedly taking responsibility for a major data breach impacting AstraZeneca, a global leader in pharmaceuticals and biotechnology. This incident suggests a renewed focus by the group on targeting high-profile companies for financial gain.

Alleged Extortion Tactics

LAPSUS$ is reportedly attempting to sell a 3GB archive of internal AstraZeneca data, marking a potential shift towards extortion methods that demand payment for access. The group, known for previous breaches of major tech firms, has posted snippets of the compromised data on underground forums, including screenshots and descriptions of the .tar.gz file’s contents.

Prospective buyers are being encouraged to contact the hackers through the secure messaging app Session to negotiate the data’s purchase. Unlike some previous incidents, no full public leaks have been released, indicating that the group’s primary goal is monetary gain through direct sales rather than public exposure.

Evidence and Claims

To validate their claims, the threat actors have provided password-protected paste links with redacted information, demonstrating their access to sensitive AstraZeneca data. As of March 20, 2026, the company has not issued any official comment regarding the breach.

The supposedly leaked data includes critical intellectual property and infrastructure configurations, as per the hackers’ statements on breach forums. This comprises source code for Java Spring Boot applications and Angular frameworks, along with Python scripts.

Potential Impact on AstraZeneca

The disclosed data, if verified, could have significant consequences for AstraZeneca’s supply chain operations and cloud security. Key components reportedly exposed include Terraform configurations for AWS and Azure, Ansible roles for automation, and private cryptographic keys and tokens related to GitHub and Jenkins CI/CD processes.

The attackers have also shared public samples showcasing internal repository structures, with a directory labeled AZU_EXFIL. This directory houses a repository identified as als-sc-portal-internal, which is integral to AstraZeneca’s logistical functions like inventory management and SAP system integration.

These revelations underline the potential for widespread disruption within AstraZeneca’s operational framework, emphasizing the critical need for robust cybersecurity measures.

Stay informed with our daily cybersecurity updates on Google News, LinkedIn, and X. Reach out to us for more information and to share your stories.

Cyber Security News Tags:AstraZeneca, cloud infrastructure, Cybercrime, Cybersecurity, data breach, data security, Extortion, Hacking, intellectual property, IT security, LAPSUS, Pharmaceutical

Post navigation

Previous Post: FBI Alerts: Russian Hackers Phish WhatsApp, Signal Users

Related Posts

Microsoft Defender for Office 365 to Provide Detail Results for Spam, Phishing or Clean Emails Microsoft Defender for Office 365 to Provide Detail Results for Spam, Phishing or Clean Emails Cyber Security News
NordVPN Denies Data Breach Following Threat Actor Claim on Dark Web NordVPN Denies Data Breach Following Threat Actor Claim on Dark Web Cyber Security News
PoC Exploit Released for ImageMagick RCE Vulnerability PoC Exploit Released for ImageMagick RCE Vulnerability Cyber Security News
ownCloud Urges Users to Enable Multi-Factor Authentication Following Credential Theft ownCloud Urges Users to Enable Multi-Factor Authentication Following Credential Theft Cyber Security News
Warlock Ransomware Exploiting SharePoint Vulnerabilities to Gain Access and Steal Credentials Warlock Ransomware Exploiting SharePoint Vulnerabilities to Gain Access and Steal Credentials Cyber Security News
Cybersecurity Newsletter Weekly – Discord, Red Hat Data Breach, 7-Zip Vulnerabilities and Sonicwall Firewall Hack Cybersecurity Newsletter Weekly – Discord, Red Hat Data Breach, 7-Zip Vulnerabilities and Sonicwall Firewall Hack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LAPSUS$ Group Allegedly Breaches AstraZeneca Data
  • FBI Alerts: Russian Hackers Phish WhatsApp, Signal Users
  • Quest KACE Security Flaw Potentially Exploited by Hackers
  • Oracle Resolves Critical RCE Vulnerability in Identity Manager
  • Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LAPSUS$ Group Allegedly Breaches AstraZeneca Data
  • FBI Alerts: Russian Hackers Phish WhatsApp, Signal Users
  • Quest KACE Security Flaw Potentially Exploited by Hackers
  • Oracle Resolves Critical RCE Vulnerability in Identity Manager
  • Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark