DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Avantic Medical Lab hacked; patient data leaked by Everest Group

Posted on July 9, 2025 by Dissent

On June 10, the Everest Group added a listing for Avantic Medical Lab to its leak site, accompanied by a one-week countdown clock and four screenshots containing patient information as proof of the claims. When the attack first occurred, and whether Everest had contacted Avantic before June 10, is unknown to DataBreaches, but on June 10, Everest gave Avantic one week to get in touch with them.

Whether Avantic did or not is also unknown to DataBreaches, but what we do know is that on July 3, Everest leaked 31 GB of patient files.

Avantic Medical is a full-service Clinical Laboratory in Edison, NJ. They advertise that they service hospitals, hospital staff physicians, and the entire New Jersey, New York, and Pennsylvania Metro Area.

Hundreds of “Patient Files” that Everest leaked appear to relate to blood draws (testing) done in 2018. Testing on later dates for other patients was referenced in the Explanation of Benefits files, located in a folder from May 2023 under “Payments.”  A third folder, “Accu Reference Send Out,” also contained patient information.

There were no databases in the data tranche, but some files were batched reports of insurance responses or other correspondence.

The types of information acquired and leaked for any individual patient varied by individual and type of file, but may have included:

  • Patient’s Full Name
  • Patient’s Address
  • Patient’s Telephone number
  • Patient’s Date of birth
  • Patient’s Social Security number
  • Medical Record Number
  • Referring Doctor
  • Referring Doctor’s Information
  • Health Insurance Provider
  • Employer or Group Name
  • Policy Number
  • Member ID
  • Claim ID
  • Covered Member’s Name
  • Date of Blood Draw
  • Type of Test(s)
  • Results of  Blood Tests
  • Explanation of Benefits
  • Diagnosis(es)
  • Correspondence from Insurer
  • Check information if Patient Paid by Check
  • Credit Card Number with Expiration Date and CVV

There is no substitute notice on Avantic Medical Lab’s site as of this morning, and no report has been posted on HHS’s public breach tool yet.

DataBreaches emailed the lab this morning to inquire whether Everest’s attack had encrypted any files or had impaired functioning in any way. The email also asked whether Avantic has notifed HHS, the (New Jersey) the Division of State Police in the Department of Law and Public Safety, or patients.

No reply was immediately received, but DataBreaches will update this post when we receive a reply or more information becomes available.

 


Related:

  • Personal Touch Holding settles NY Attorney General's lawsuit stemming from 2021 ransomware incident: will pay $350k, improve security
  • "I'm Not Pro-Russia and I'm Not a Terrorist!" —- InfraGard and Airbus Hacker “USDoD” Unveils His New Campaigns
  • "Without Undue Delay," Part 2
  • k-12 school districts fall prey to Pysa ransomware
  • Accellion's data breach left clients in tough position: pay extortion to criminals, or have their data dumped (with updates)
Category: Breach IncidentsHackHealth DataU.S.

Post navigation

← Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
At U.S. request, France jails Russian basketball player Daniil Kasatkin on suspicion of ransomware conspiracy →

1 thought on “Avantic Medical Lab hacked; patient data leaked by Everest Group”

  1. Steve says:
    July 18, 2025 at 12:02 pm

    There is an investigation into this now:

    [link removed by moderator]

    (Sorry — no links allowed in Comments — Dissent)

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware incident responder gave info to BlackCat cybercriminals during negotiations, DOJ alleges
  • 45,000 malicious IP addresses taken down in international cyber operation
  • The Broken Records: tracing the human cost of the 2022 British MoD leak
  • Telus Digital confirms breach after ShinyHunters claims 1 petabyte data theft
  • China’s CERT warns OpenClaw can inflict nasty wounds
  • Bell Ambulance data breach impacted over 238,000 people
  • Lotte Card fined 9.6 billion won for leaking users’ social registration numbers
  • Handala claims responsibility for attack on medical device maker Stryker
  • Police Scotland fined £66k for extracting and sharing mobile phone data
  • The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in life

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • New data shows increase in FBI searches of Americans’ data last year
  • CalPrivacy Fines PlayOn Sports $1.1 Million for CCPA Violations Involving Student Privacy
  • 17 States Sues Trump Administration Over Unlawful Data Demands Targeting Colleges
  • Privacy watchdogs sound alarm over US bid to get travellers’ social media
  • Petition filed over misuse of protesters’ data by Kenyan government and telcos

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.