The Delhi Police recently apprehended four individuals from different states in connection with the Indian Council of Medical Research (ICMR) data leak case, shedding light on a major breach that had exposed the personal details of over 81 crore Indians.
The ICMR data breach incident came into the spotlight over two months ago when central intelligence agencies discovered that sensitive information, including Aadhaar and passport records, had allegedly been leaked from the ICMR’s data bank and offered for sale on the dark web.
The arrested individuals in the ICMR data breach incident, hailing from Odisha, Haryana, and Jhansi, were taken into custody last week. Among them was a Bachelor of Technology graduate from Odisha, along with two school dropouts from Haryana.
The suspects claimed during interrogation that, in addition to the ICMR data, they had pilfered information from the United States Federal Bureau of Investigation (FBI) and Pakistan’s Computerized National Identity Card (CNIC).
According to reports by The Indian Express, the ICMR data leak case was initially reported to the Indian Computer Emergency Response Team (CERT-In). CERT-In verified the authenticity of the leaked data by cross-referencing it with the concerned departments and urged them to match it with the actual data.
The investigating authorities discovered that approximately 1 lakh people’s data had been posted as a sample on the dark web. They selected 50 individuals for verification and found a match, prompting them to launch an investigation into the ICMR data leak. This led to the Delhi Police registering a First Information Report (FIR) earlier this month.
The arrested suspects were presented before a Delhi court, which remanded them to seven days of police custody. Their backgrounds varied, but they collectively stand accused of compromising the security and privacy of a vast number of individuals through the ICMR data breach.
The ICMR data leak is an ongoing story, highlighting the vulnerabilities in the Indian cybersecurity space. The Cyber Express is closely monitoring the situation and we’ll update this post once we have more information about the breach and the individuals associated with the operation.
Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
A new paper gives an insider’s perspective into CISA’s Known Exploited Vulnerability catalog – and also offers a free tool…
The Cyber Express weekly roundup examines cyberattacks, AI misuse, data leaks, and regulatory pressure defining cybersecurity in early 2026.
This Spain Ministry of Science cyberattack incident does not exist in isolation.
The La Sapienza cyberattack shut down systems at Italy’s largest university, with reports linking the incident to BabLock malware and…
Trusted Access for Cyber is OpenAI’s new framework to expand secure use of GPT-5.3-Codex and ChatGPT for vetted cyber defenders.
Mitigating risk from End-of-Support edge devices is no longer about compliance, it’s about survival.
This website uses cookies. By continuing to use this website you are giving consent to cookies being used.
Read More