BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
CIPHERThreat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /LAPSUS$ Claims AstraZeneca Breach While Zoom Phishing Campaign Spreads

LAPSUS$ Claims AstraZeneca Breach While Zoom Phishing Campaign Spreads

March 21, 2026Data Breaches & Incidents2 min readhigh

Originally reported by Hackread

#lapsus#astrazeneca#zoom-phishing#malware#data-breach#ransomware-group#javascript#social-engineering
Share

TL;DR

The LAPSUS$ ransomware group claims to have breached pharmaceutical giant AstraZeneca, allegedly offering source code, credentials, and employee data for sale. Separately, Sublime Security researchers have identified a new phishing campaign using realistic JavaScript-based Zoom meeting invites to distribute malware on Windows systems.

Why high?

LAPSUS$ claiming a major pharmaceutical company breach with alleged source code and credentials represents a high-impact incident. Combined with an active phishing campaign using realistic Zoom invites, this presents immediate threats to enterprise environments.

Three significant security developments emerged today, highlighting ongoing threats from established ransomware groups and evolving social engineering tactics targeting enterprise environments.

LAPSUS$ Claims Major Pharmaceutical Breach

The LAPSUS$ ransomware group has claimed responsibility for allegedly breaching AstraZeneca, the multinational pharmaceutical company. According to the group's claims, they have obtained and are offering for sale:

  • Source code repositories
  • Employee credentials
  • Cloud configuration files
  • Internal employee data

LAPSUS$ has provided what they claim are leaked samples as proof of the alleged breach. The group has previously targeted major corporations including Microsoft, Nvidia, and Okta, making this claim consistent with their historical targeting patterns.

AstraZeneca has not yet publicly confirmed or denied the breach claims. The pharmaceutical sector remains a high-value target for ransomware groups due to the sensitive nature of research data and the potential for significant operational disruption.

Sophisticated Zoom Phishing Campaign Identified

Sublime Security researchers have discovered a new malware distribution campaign leveraging realistic, interactive JavaScript-based Zoom meeting invitations. The attack chain operates by:

  • Delivering convincing Zoom meeting invite emails
  • Using interactive JavaScript elements to enhance legitimacy
  • Tricking users into downloading and executing malicious payloads
  • Specifically targeting Windows systems

The campaign represents an evolution in social engineering tactics, exploiting the widespread adoption of video conferencing platforms in enterprise environments. The interactive nature of the fake invites significantly increases their potential effectiveness compared to traditional static phishing emails.

Image Format Conversion Security Considerations

Security practitioners are increasingly recognizing image format conversion as a practical web security concern. While WebP format offers performance benefits, compatibility issues are driving organizations toward PNG conversion workflows.

Key considerations include:

  • WebP adoption creating compatibility gaps in security toolchains
  • Need for secure conversion processes to prevent malicious payloads
  • Performance trade-offs between format efficiency and security validation
  • Integration challenges with existing web security infrastructure

Organizations implementing image processing workflows should evaluate conversion tools for security vulnerabilities and ensure proper input validation.

Sources

  • Hacker Group LAPSUS$ Claims Alleged AstraZeneca Data Breach
  • New Fake Zoom Meeting Invite Scam Spreads Malware on Windows PCs
  • Why Image Format Conversion Is Becoming a Practical Issue in Web Security and Performance

Originally reported by Hackread

Tags

#lapsus#astrazeneca#zoom-phishing#malware#data-breach#ransomware-group#javascript#social-engineering

Threat Actors

🏴Lapsus$

Related Intelligence

  • ClickFix Campaign Evolution: Drive Mapping, VPN Spoofing, and Developer-Targeted Attacks

    mediumMar 18, 2026
  • Weekly Security Roundup: Banking Trojan Targets Brazil, Iranian Hackers Hit Healthcare Giants, HR Under Attack

    highMar 12, 2026
  • Weekly Security Roundup: Teramind Phishing Campaign Targets Remote Workers

    mediumMar 2, 2026

Related Knowledge

  • DFIR & Threat Hunting Deep Training — CIPHER Knowledge Base

    dfir
  • Digital Forensics Artifacts — Deep Dive Reference

    dfir
  • CIPHER Incident Response Playbooks — Operational Reference

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← MacBook M5 Pro and Qwen3.5 Enable High-Performance Local AI Security Analysis

Next Article

FBI Data Purchases, FISA Reauthorization Push, and Breathalyzer Firm Breach →