Ransomware victim disclosure
← All victimsAdvanta Genetics LLC
Claimed by aurora · listed 21 days ago
Status timeline
- Listed
Apr 29, 2026
- Data leaked
At a glance
- Group
- aurora
- Status
- Data leaked
- Country
- US
- Sector
- Healthcare
- Listed on leak site
- Apr 29, 2026
About the victim
AI dossier — public-source company profileAdvanta Genetics LLC is a CLIA/CAP-accredited clinical toxicology and molecular diagnostics laboratory operating in the United States, accessible at aalabs.com. The company offers services including metagenomic next-generation sequencing (mNGS), precision metagenomics for infectious disease testing, clinical toxicology, and molecular diagnostics. It has research collaborations with Illumina, Asuragen, and Oxford Nanopore Technologies, and is a preferred laboratory provider within Southwestern Health Resources' clinically integrated network of 7,000+ providers.
- Industry
- Clinical Laboratory & Molecular Diagnostics
- Employees
- 51-200
Attack summary
Severity: critical — The breach involves confirmed exfiltration and publication of highly regulated, sensitive data at scale: tens of thousands of patient medical records (including opioid therapy and Medicare data covered under HIPAA), provider PII enabling identity fraud and prescription fraud, employee identity documents (W-2s, I-9s, passport scans), full financial records, privileged legal communications, and Active Directory credential stores — constituting a multi-category critical data breach affecting patienThe Aurora ransomware group claims to have exfiltrated a broad range of highly sensitive data from Advanta Genetics LLC, including tens of thousands of patient records with chronic opioid therapy charts, Medicare audit records, provider PII (SSNs, DEA numbers, state licenses), employee identity documents, 102 QuickBooks company files, trade secrets including AI architecture and FDA pre-submission materials, privileged attorney-client communications, and Active Directory domain controller data (NTDS.dit and SAM hives). The disclosure status is listed as data_published, indicating the group has released or is releasing the exfiltrated data.
Data the group says was taken
AI dossier — extracted from the leak post- Patient medical records (chronic opioid therapy charts)
- Medicare audit records
- Provider SSNs, DEA numbers, and state licenses (20+ states)
- Employee W-2s and I-9s with passport scans
- Employee personnel packages (50+ staff)
- QuickBooks company files (102 files)
- Vendor and payroll records
- Bank account linkage data
- OSPRI Biopath investment decks and valuation models
- FDA pre-submission packets
- Proprietary AI diagnostic architecture ('The Brain')
- Attorney-client privileged memos
- Texas Medical Board Remedial Plan documents
- Federal NORA subpoena records
- Active Directory NTDS.dit and SAM hives
What the group claims
[health] Advanta Genetics LLC — a respected CLIA/CAP-accredited clinical toxicology and molecular diagnostics laborator. The exposed material includes: Tens of thousands of real patient lives — including highly sensitive chronic opioid therapy charts flagged by the Texas Medical Board and elderly Medicare audit records. Provider identities and prescribing power — SSNs, DEA numbers, and state licenses from 20+ states that can be turned into black-market "script pads". Gold-standard identity theft kits — W-2s, I-9s with passport scans, and full employee packages for 50+ staff. 102 complete QuickBooks company files exposing every vendor, payroll run, bank link, and financial secret across the Advanta/RedLeaf/OSPRI empire. High-value trade secrets — OSPRI Biopath investment decks, valuation models, FDA pre-submission packets, and the proprietary "The Brain" AI diagnostic architecture. Explosive privileged attorney-client memos on active regulatory battles (Texas Medical Board Remedial Plan #19-153 and a federal NORA subpoena). Active Directory domain controller data (NTDS.dit and SAM hives).
Sources
Source
Indexed 21 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
