Reach security professionals who buy.

850K+ monthly readers 72% have budget authority
Advertise on Breached.Company →

The extortion group Lapsus$ is claiming responsibility for a breach of pharmaceutical giant AstraZeneca, alleging it has exfiltrated approximately 3GB of internal data including source code, employee credentials, cloud infrastructure details, and corporate records. The group posted the claim on an underground forum and has since listed AstraZeneca on its Tor-based leak site, offering the data for sale with no price yet set.

AstraZeneca has not publicly confirmed or denied the breach. As of publication, the company has made no statement.

What Lapsus$ Claims to Have Stolen

According to the group’s forum post and leak site listing, the stolen data is broad and technically detailed. If accurate, it represents a serious incursion into AstraZeneca’s development and infrastructure environments.

The haul allegedly includes:

  • Java source code — internal repositories, controllers, services, and Spring Boot application code. This suggests access to backend systems, potentially including drug discovery platforms, clinical data pipelines, or enterprise applications.
  • Employee and developer data — GitHub Enterprise user records, internal account details, and corporate email addresses. This is particularly dangerous because it creates a ready-made phishing list of verified AstraZeneca identities.
  • Credentials and tokens — access tokens, API keys, and authentication credentials. Depending on scope and whether they’ve been rotated, these could provide persistent access or lateral movement paths across connected systems.
  • Cloud infrastructure data — configuration and deployment artifacts for AWS, Azure, and Terraform environments. Leak of infrastructure-as-code is especially serious: it reveals the internal architecture of systems, security group configurations, and potentially hardcoded secrets.
  • Angular and Python packages — internal frontend and scripting packages, likely from private registries. These could be weaponized for supply chain attacks against AstraZeneca’s own developers.
  • SQL scripts and business operations data — database schemas, migration scripts, and operational records. The business layer of an organization’s data is often where the most sensitive commercial intelligence lives.

The combination paints a picture of broad access — not a single stolen file, but the kind of sweep that happens when an attacker has been inside a system long enough to look around.

Listed on Tor. No Price Yet.

Lapsus$ added AstraZeneca to its Tor-hosted data leak site shortly after the forum post. The listing offers the alleged 3GB archive for sale but has not set a price — a pattern the group has used before to signal they’re still open to a private ransom payment before going public with a full dump.

The absence of a price is often a negotiating tactic, not indecision. It leaves room for the victim to make contact first. Whether AstraZeneca has done so, or intends to, is unknown.

The TeamPCP Connection

This claim doesn’t arrive in a vacuum. Earlier in March 2026, threat researchers flagged a sophisticated supply chain campaign attributed to TeamPCP — a group known for compromising developer tooling and build pipelines to distribute malicious packages and siphon credentials from enterprise environments.

Lapsus$ publicly boasted about a new partnership in a Telegram post, stating they were “stealing terabytes of trade secrets with our new partners” — an apparent reference to TeamPCP. The framing suggests a division of labor: TeamPCP’s expertise in quietly compromising software supply chains feeds initial access to Lapsus$‘s extortion machinery.

Wiz researcher Ben Read flagged the dynamic, calling it “a dangerous convergence between supply chain attackers and high-profile extortion groups like Lapsus$.” The concern is that TeamPCP’s stealthy intrusion methods — which are designed to evade detection over extended periods — combined with Lapsus$‘s aggressive monetization create a threat greater than either group operating alone.

It’s worth being precise: the direct technical link between the TeamPCP campaign and the AstraZeneca breach remains circumstantial. No forensic evidence has been publicly presented connecting TeamPCP’s tools to the AstraZeneca environment specifically. But the timing, the nature of the stolen data (developer credentials, cloud configs, package registries), and Lapsus$‘s own boasts make the connection worth taking seriously.

Who Is Lapsus$?

For anyone who has lost track of the group’s history: Lapsus$ exploded onto the threat landscape in 2021 and carved out a unique niche as one of the most brazen cybercrime operations in recent memory. Their targets read like a Fortune 500 attendance list.

Confirmed or attributed victims include Nvidia (source code and DLSS leaked), Microsoft (Bing and Cortana repositories), Okta (customer support system access, affecting downstream enterprises), Samsung (Galaxy source code), Uber (internal systems via social engineering a contractor), and Rockstar Games (pre-release Grand Theft Auto VI footage). Each breach was announced publicly with little apparent concern for consequences — a deliberate intimidation strategy.

The core of the original UK-based group was dismantled in 2022 when British police arrested several teenagers linked to the operation — including one 16-year-old identified as a key orchestrator. But Lapsus$ as a brand didn’t die with those arrests. The name has continued to surface on forums and Telegram channels, associated with new claims and new operators. Whether the current iteration is connected to the original membership, inspired by it, or simply borrowing the brand for credibility is unclear.

What is clear: whoever is operating under the Lapsus$ banner today retains the group’s signature style — loud, public claims, forum posts, and a willingness to list household names on leak sites.

Why AstraZeneca Is Different

Most Lapsus$ targets have been tech companies. AstraZeneca is not.

AstraZeneca is one of the world’s largest pharmaceutical companies. Its portfolio includes treatments for cancer, cardiovascular disease, rare genetic disorders, and — still relevant — COVID-19 vaccines. The intellectual property embedded in its codebase, clinical systems, and infrastructure is not just commercially valuable. It has regulatory, safety, and public health dimensions that most corporate breaches simply don’t carry.

Source code for clinical data platforms or regulatory submission systems represents years of development work and, in some cases, the underlying science of drug discovery processes. Infrastructure data from cloud environments hosting clinical trials or supply chain logistics could expose gaps that downstream attackers — state actors, competitors, counterfeiters — would be very interested in.

Then there’s the partner ecosystem. AstraZeneca works with contract research organizations, hospital networks, government health agencies, academic research institutions, and supply chain vendors worldwide. Many of these relationships involve shared systems, shared credentials, and API integrations. A breach of AstraZeneca’s developer environment is potentially a breach of all of them.

The regulatory implications are also significant. Depending on what systems were accessed, AstraZeneca may face disclosure obligations under GDPR, FDA data security frameworks, and various national pharmaceutical regulations across its operating territories. A company of this size doesn’t confirm a breach lightly — but silence is not the same as safety.

What Partners and Vendors Should Do Now

If your organization has any technical or operational relationship with AstraZeneca — vendor, CRO, cloud provider, integration partner — treat this as a live threat until you know otherwise.

Assume shared credentials are compromised. Any API keys, service accounts, or tokens used to connect to AstraZeneca systems should be rotated immediately. Don’t wait for confirmation.

Watch for AstraZeneca-branded phishing. The GitHub Enterprise user data and corporate email directory in the alleged dump is a targeting list. Expect to see convincing spear phishing emails that appear to come from AstraZeneca employees — researchers, IT staff, procurement — aimed at your team.

Audit access logs for unusual activity. If you have integrations with AstraZeneca environments, look backward. If TeamPCP’s techniques were involved, initial access may predate the current claim by weeks or months.

Don’t share new credentials or expand integrations until the scope of the breach is publicly clarified or privately communicated.

AstraZeneca’s response — or lack of one — will tell a story. Companies that confirm and communicate quickly tend to contain the damage. Those that go silent often see the damage compound.


Breached Company covers verified and claimed data breaches as they are reported. This article is based on threat actor claims and researcher commentary; independent verification of the alleged stolen data has not been possible. AstraZeneca has not confirmed or responded to the breach claim.