Four Apprehended by Indian Authorities in ICMR Data Breach Impacting 800 Million People

During interrogation, the suspects alleged they not only accessed ICMR data but also obtained information from the United States Federal Bureau of Investigation (FBI)

The Delhi Police recently apprehended four individuals from different states in connection with the Indian Council of Medical Research (ICMR) data leak case, shedding light on a major breach that had exposed the personal details of over 81 crore Indians. 

The ICMR data breach incident came into the spotlight over two months ago when central intelligence agencies discovered that sensitive information, including Aadhaar and passport records, had allegedly been leaked from the ICMR’s data bank and offered for sale on the dark web.

ICMR Data Breach: Four Individuals Arrested

The arrested individuals in the ICMR data breach incident, hailing from Odisha, Haryana, and Jhansi, were taken into custody last week. Among them was a Bachelor of Technology graduate from Odisha, along with two school dropouts from Haryana.

The suspects claimed during interrogation that, in addition to the ICMR data, they had pilfered information from the United States Federal Bureau of Investigation (FBI) and Pakistan’s Computerized National Identity Card (CNIC).

According to reports by The Indian Express, the ICMR data leak case was initially reported to the Indian Computer Emergency Response Team (CERT-In). CERT-In verified the authenticity of the leaked data by cross-referencing it with the concerned departments and urged them to match it with the actual data.

The investigating authorities discovered that approximately 1 lakh people’s data had been posted as a sample on the dark web. They selected 50 individuals for verification and found a match, prompting them to launch an investigation into the ICMR data leak. This led to the Delhi Police registering a First Information Report (FIR) earlier this month.

Suspected Individuals Appear Before Court

The arrested suspects were presented before a Delhi court, which remanded them to seven days of police custody. Their backgrounds varied, but they collectively stand accused of compromising the security and privacy of a vast number of individuals through the ICMR data breach.

The ICMR data leak is an ongoing story, highlighting the vulnerabilities in the Indian cybersecurity space. The Cyber Express is closely monitoring the situation and we’ll update this post once we have more information about the breach and the individuals associated with the operation. 

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Ashish Khaitan

Ashish is a technical writer at The Cyber Express. He adores writing about the latest technologies and covering the latest cybersecurity events. In his free time, he likes to play horror and open-world video games.

Recent Posts

What CISA KEV Is and Isn’t – and a Tool to Help Guide Security Teams

A new paper gives an insider’s perspective into CISA’s Known Exploited Vulnerability catalog – and also offers a free tool…

19 hours ago

The Cyber Express Weekly Roundup: Global Cybersecurity Incidents and Policy Shifts

The Cyber Express weekly roundup examines cyberattacks, AI misuse, data leaks, and regulatory pressure defining cybersecurity in early 2026.

1 day ago

Spain Ministry of Science Cyberattack Triggers Partial IT Shutdown

This Spain Ministry of Science cyberattack incident does not exist in isolation.

1 day ago

La Sapienza Cyberattack Forces Italy’s Largest University Offline

The La Sapienza cyberattack shut down systems at Italy’s largest university, with reports linking the incident to BabLock malware and…

1 day ago

OpenAI Launches Trusted Access for Cyber to Expand AI-Driven Defense While Managing Risk

Trusted Access for Cyber is OpenAI’s new framework to expand secure use of GPT-5.3-Codex and ChatGPT for vetted cyber defenders.

1 day ago

Why End-of-Support Edge Devices Have Become a National Security Risk

Mitigating risk from End-of-Support edge devices is no longer about compliance, it’s about survival.

1 day ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More