DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Avantic Medical Lab hacked; patient data leaked by Everest Group

Posted on July 9, 2025 by Dissent

On June 10, the Everest Group added a listing for Avantic Medical Lab to its leak site, accompanied by a one-week countdown clock and four screenshots containing patient information as proof of the claims. When the attack first occurred, and whether Everest had contacted Avantic before June 10, is unknown to DataBreaches, but on June 10, Everest gave Avantic one week to get in touch with them.

Whether Avantic did or not is also unknown to DataBreaches, but what we do know is that on July 3, Everest leaked 31 GB of patient files.

Avantic Medical is a full-service Clinical Laboratory in Edison, NJ. They advertise that they service hospitals, hospital staff physicians, and the entire New Jersey, New York, and Pennsylvania Metro Area.

Hundreds of “Patient Files” that Everest leaked appear to relate to blood draws (testing) done in 2018. Testing on later dates for other patients was referenced in the Explanation of Benefits files, located in a folder from May 2023 under “Payments.”  A third folder, “Accu Reference Send Out,” also contained patient information.

There were no databases in the data tranche, but some files were batched reports of insurance responses or other correspondence.

The types of information acquired and leaked for any individual patient varied by individual and type of file, but may have included:

  • Patient’s Full Name
  • Patient’s Address
  • Patient’s Telephone number
  • Patient’s Date of birth
  • Patient’s Social Security number
  • Medical Record Number
  • Referring Doctor
  • Referring Doctor’s Information
  • Health Insurance Provider
  • Employer or Group Name
  • Policy Number
  • Member ID
  • Claim ID
  • Covered Member’s Name
  • Date of Blood Draw
  • Type of Test(s)
  • Results of  Blood Tests
  • Explanation of Benefits
  • Diagnosis(es)
  • Correspondence from Insurer
  • Check information if Patient Paid by Check
  • Credit Card Number with Expiration Date and CVV

There is no substitute notice on Avantic Medical Lab’s site as of this morning, and no report has been posted on HHS’s public breach tool yet.

DataBreaches emailed the lab this morning to inquire whether Everest’s attack had encrypted any files or had impaired functioning in any way. The email also asked whether Avantic has notifed HHS, the (New Jersey) the Division of State Police in the Department of Law and Public Safety, or patients.

No reply was immediately received, but DataBreaches will update this post when we receive a reply or more information becomes available.

 

No related posts.

Category: Breach IncidentsHackHealth DataU.S.

Post navigation

← Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
At U.S. request, France jails Russian basketball player Daniil Kasatkin on suspicion of ransomware conspiracy →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mississippi Law Firm Sues Cyber Insurer Over Coverage for Scam
  • Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
  • Computer Whiz Gets Suspended Sentence over 2019 Revenue Agency Data Breach
  • Ministry of Defence data breach timeline
  • Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The patient data appears fake. (2)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The EU’s Plan To Ban Private Messaging Could Have a Global Impact (Plus: What To Do About It)
  • A Balancing Act: Privacy Issues And Responding to A Federal Subpoena Investigating Transgender Care
  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.