High

Медицинская лаборатория Гемотест (Gemotest) Breach — 6.3M Ac

In April 2022, Russian pharmaceutical company Gemotest suffered a data breach that exposed 31 million patients . The data contained 6.3 million unique email addresses along with names, physical addresses, dates of birth, passport and insurance numbers. Gemotest was later fined for the breach.

Overview

In April 2022, Медицинская лаборатория Гемотест (Gemotest), a major Russian medical laboratory and pharmaceutical company, suffered a significant data breach. The incident exposed the sensitive personal information of millions of patients. A subsequent investigation by Russian authorities found the company violated data protection laws, resulting in a fine. This breach is severe due to the highly sensitive nature of the exposed medical and identification data, which can be misused for identity theft and targeted scams.

What Was Exposed

The breach exposed a substantial amount of personal and sensitive information. The data includes:

  • Names and Physical Addresses: Your full name and home address.
  • Dates of Birth: A key piece of information used for identity verification.
  • Email Addresses: Your primary contact email.
  • Passport and Insurance Numbers: Extremely sensitive government and medical identification numbers.

This combination of data creates a comprehensive profile of an individual, which is particularly dangerous in the hands of cybercriminals.

Potential Impact

The exposure of this data creates several serious risks for affected individuals:

  • Identity Theft: With a name, date of birth, passport number, and address, criminals can attempt to open fraudulent financial accounts, apply for loans, or file false tax returns in your name.
  • Targeted Phishing and Scams: Criminals can use your name, medical provider details, and the context of the breach to craft highly convincing phishing emails or phone calls. These may impersonate Gemotest or other medical institutions to steal more information or money.
  • Financial Fraud: Insurance numbers can be used for fraudulent medical claims or to obtain prescription drugs.
  • Loss of Privacy: The exposure of your association with a medical laboratory is a personal privacy violation.

Recommendations

If you were a patient of Gemotest, especially around early 2022, you should take the following steps:

  1. Change Your Email Password: Immediately update the password for the email address associated with Gemotest. If you use that password anywhere else, change it on those sites as well. Never reuse passwords.
  2. Enable Multi-Factor Authentication (MFA): Add MFA (like a code sent to your phone) to your email account and any other important online accounts (banking, social media) to add an extra layer of security.
  3. Beware of Targeted Phishing: Be extremely cautious of any emails, texts, or calls claiming to be from Gemotest, debt collectors, or insurance companies. Do not click on links or provide additional information. Contact the organization directly using a verified phone number or website.
  4. Monitor Financial and Medical Statements: Regularly review your bank statements, credit reports, and explanations of benefits from your health insurer for any unauthorized activity. In Russia, you can request a credit report from the National Bureau of Credit Histories (NBKI).
  5. Consider a Credit Freeze: If you are concerned about identity theft, you can inquire with major credit bureaus about placing a freeze on your credit file to prevent new accounts from being opened in your name.

How to Check If You’re Affected

The breach has been cataloged by the reputable breach notification service “Have I Been Pwned.”

  • You can visit their website directly: https://haveibeenpwned.com/Breach/Gemotest
  • On the site, you can enter your email address to check if it was included in this and other known data breaches.
  • If your email appears in this breach, you should assume your associated personal data (name, address, passport number, etc.) was exposed and follow the recommendations above.

Investigate Breaches Safely with NordVPN

Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.

Get NordVPN for Research

Affiliate link — we may earn a commission at no extra cost to you.

Share:

Never miss a data breach report

Get real-time security alerts delivered to your preferred platform.

Related Breach Reports

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.