The LAPSUS$ hacking group, infamous for its high-profile breaches of companies like Microsoft, Nvidia, and Okta, has claimed its return with an alleged data breach of the multinational pharmaceutical company AstraZeneca. On March 20, 2026, the group began advertising a 3GB data dump for sale on dark web forums, providing screenshots as proof of their access. The allegedly stolen data includes highly sensitive development and infrastructure-as-code assets, such as source code, cloud configurations, and private access keys. The group is using the secure messaging app Session to negotiate the sale. This incident marks the potential reemergence of a highly capable and unpredictable threat actor and highlights the ongoing risk of intellectual property theft and supply chain compromise for major corporations.
LAPSUS$ is a financially motivated threat group known for its unique and brazen tactics. Unlike traditional ransomware gangs, LAPSUS$ often focuses on data theft for extortion, and their methods are characterized by a mix of social engineering, insider threats, and technical skill. Their typical TTPs include:
The current claim against AstraZeneca suggests a slight shift in tactics, moving towards a more traditional data-for-sale model rather than public extortion, though this could change. The data they claim to have stolen is particularly valuable.
Based on the data LAPSUS$ claims to have stolen, the breach likely involved a compromise of AstraZeneca's software development lifecycle (SDLC) or DevOps environment.
T1526 - Cloud Service Discovery).T1552.005 - Cloud Instance Metadata API).A successful breach of this nature would have severe consequences for AstraZeneca:
AstraZeneca's security team would be in full incident response mode.
Preventing attacks like those favored by LAPSUS$ requires a focus on identity and development security:
Implement phishing-resistant MFA (FIDO2) to protect developer and contractor accounts, a common target for LAPSUS$.
Mapped D3FEND Techniques:
Implement secrets scanning in CI/CD pipelines to prevent private keys and tokens from being hardcoded in source code.
Mapped D3FEND Techniques:
Apply the principle of least privilege to CI/CD service principals and developer accounts, ensuring they only have access to the resources they absolutely need.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats