Медицинская лаборатория Гемотест (Gemotest) Breach — 6.3M Ac
In April 2022, Russian pharmaceutical company Gemotest suffered a data breach that exposed 31 million patients . The data contained 6.3 million unique email addresses along with names, physical addresses, dates of birth, passport and insurance numbers. Gemotest was later fined for the breach.
Overview
In April 2022, Медицинская лаборатория Гемотест (Gemotest), a major Russian medical laboratory and pharmaceutical company, suffered a significant data breach. The incident exposed the sensitive personal information of millions of patients. A subsequent investigation by Russian authorities found the company violated data protection laws, resulting in a fine. This breach is severe due to the highly sensitive nature of the exposed medical and identification data, which can be misused for identity theft and targeted scams.
What Was Exposed
The breach exposed a substantial amount of personal and sensitive information. The data includes:
- Names and Physical Addresses: Your full name and home address.
- Dates of Birth: A key piece of information used for identity verification.
- Email Addresses: Your primary contact email.
- Passport and Insurance Numbers: Extremely sensitive government and medical identification numbers.
This combination of data creates a comprehensive profile of an individual, which is particularly dangerous in the hands of cybercriminals.
Potential Impact
The exposure of this data creates several serious risks for affected individuals:
- Identity Theft: With a name, date of birth, passport number, and address, criminals can attempt to open fraudulent financial accounts, apply for loans, or file false tax returns in your name.
- Targeted Phishing and Scams: Criminals can use your name, medical provider details, and the context of the breach to craft highly convincing phishing emails or phone calls. These may impersonate Gemotest or other medical institutions to steal more information or money.
- Financial Fraud: Insurance numbers can be used for fraudulent medical claims or to obtain prescription drugs.
- Loss of Privacy: The exposure of your association with a medical laboratory is a personal privacy violation.
Recommendations
If you were a patient of Gemotest, especially around early 2022, you should take the following steps:
- Change Your Email Password: Immediately update the password for the email address associated with Gemotest. If you use that password anywhere else, change it on those sites as well. Never reuse passwords.
- Enable Multi-Factor Authentication (MFA): Add MFA (like a code sent to your phone) to your email account and any other important online accounts (banking, social media) to add an extra layer of security.
- Beware of Targeted Phishing: Be extremely cautious of any emails, texts, or calls claiming to be from Gemotest, debt collectors, or insurance companies. Do not click on links or provide additional information. Contact the organization directly using a verified phone number or website.
- Monitor Financial and Medical Statements: Regularly review your bank statements, credit reports, and explanations of benefits from your health insurer for any unauthorized activity. In Russia, you can request a credit report from the National Bureau of Credit Histories (NBKI).
- Consider a Credit Freeze: If you are concerned about identity theft, you can inquire with major credit bureaus about placing a freeze on your credit file to prevent new accounts from being opened in your name.
How to Check If You’re Affected
The breach has been cataloged by the reputable breach notification service “Have I Been Pwned.”
- You can visit their website directly: https://haveibeenpwned.com/Breach/Gemotest
- On the site, you can enter your email address to check if it was included in this and other known data breaches.
- If your email appears in this breach, you should assume your associated personal data (name, address, passport number, etc.) was exposed and follow the recommendations above.
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, the hacking group ShinyHunters claimed they had breached Amtrak . The group typically compromises organisations' Salesforce instances before demanding a ransom and later, if not paid, dumping the data publicly. They subsequently published the alleged data which contained over 2M uniqu...
In March 2026, Hallmark suffered an alleged breach and subsequent extortion after attackers gained access to data stored within Salesforce. The data was later published after the extortion deadline passed, exposing 1.7M unique email addresses across both Hallmark and the Hallmark+ streaming service,...
In March 2026, the anime streaming service Crunchyroll suffered a data breach alleged to have impacted 6.8M users . The exposed data is reported to have originated from the company's Zendesk support system where "name, login name, email address, IP address, general geographic location and the conten...
In February, the AI-powered comic generation platform KomikoAI suffered a data breach . The incident exposed 1M unique email addresses along with names, user posts and the AI prompts used to generate content. The exposed data enables the mapping of individual AI prompts to specific email addresses.