CRITICAL SEVERITYMedical

gemotest.ru Data Breach

Gemotest Russian Medical Lab Network Breach (2022): 30 Million Patient Records Including Passport Numbers

Russian laboratory diagnostics and medical testing network.

Verified by ObscureIQ Intelligence

8.0Severity
30.2MRecords
5Fields
2022Year

ObscureIQ Breach Intelligence Scores
8.8
Breach Risk Index
35
Data Value
25
Market Recency
455
days
Since Breach

Risk Interpretation

Extremely sensitive. Exposure enables identity theft, medical fraud, and serious privacy harm tied to testing status and provider relationships. Lab records can also support highly targeted health-themed scams.

🎯 Impact & Downstream Threats

The direct institutional impact on Gemotest was minimal in formal terms, with a Russian regulatory fine of 60,000 rubles representing a fraction of one percent of typical fines under more developed data-protection regimes. Roskomnadzor, Russia's data-protection regulator, opened an investigation following the leak and referred the matter to prosecutors. The practical impact has fallen primarily on Gemotest patients rather than on the company itself, which continues to operate at scale across the

Primary downstream threats:
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Name-based social engineering
International identity fraud & border exploitation
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Home targeting, stalking & physical threat

📋 Breach Intelligence

Entitygemotest.ru (Gemotest)
OrganizationPrivate Company • Russia
Breach Date2022-01-01
DBC Added2025-01-27
Added Date2025-01-27
Records~30.2M (30,183,800 records)
Attack VectorUnknown
Threat ActorUnknown (DLBI dark-web monitor first reported)
Data SubjectsPatient
Breach PathwayDirect
SourceDataBreach.com / ObscureIQ
SensitivityElevated
Breach ID576.0
StatusConfirmed

📝 Executive Summary

Gemotest, one of the largest private medical laboratory networks in Russia, suffered a data breach in April 2022 that exposed approximately 31 million patient records. The data was placed for sale on dark-web forums in early spring 2022 and was subsequently sold to multiple buyers and published. Russian dark-web monitoring service DLBI first reported the leak. Roskomnadzor, Russia's data-protection regulator, opened an investigation, and a Moscow magistrate court fined the company 60,000 rubles in mid-2022 for the violation.\n\nThe published dataset reportedly contained approximately 300 gigabytes of customer data covering more than 30 million records. Compromised fields included names, dates of birth, gender, phone numbers, email addresses, physical addresses, Russian internal passport series and numbers, and insurance identifiers. Have I Been Pwned indexed approximately 6.3 million unique email addresses among the records. Russian COVID-19 testing protocols at the time required passport verification, which is why a substantial subset of records included passport identifiers tied to test results.\n\nFor affected individuals, the practical risk profile is unusually severe and durable. The combination of name, date of birth, address, and Russian passport number is a strong base for identity-verification bypass at Russian financial institutions and government services. Cross-border risks apply because the dataset has continued to circulate internationally, and individuals who travelled to or from Russia during the affected period may face exposure to identity-document fraud or impersonation. Patients in occupied territories who may have used Russian-issued passports for COVID testing face additional political and personal-safety considerations given investigative-journalism use of the dataset. Anyone whose Gemotest records were affected should treat their Russian passport number as durably exposed and remain alert to unsolicited contact referencing past medical testing or government services.

🏢 About gemotest.ru

Gemotest, also written Hemotest, is one of the largest private medical laboratory networks in Russia. Headquartered in Moscow, the network operates hundreds of laboratory branches across Russia, Kyrgyzstan, Tajikistan, and Kazakhstan, performing hundreds of thousands of medical tests daily. The service range spans clinical blood and biochemistry tests, COVID-19 testing, infectious disease panels, and genetic testing. As a private medical lab network, Gemotest collects patient identity, contact, billing, referral-physician, and detailed test-result records, alongside government-issued identifiers including Russian internal passport numbers, which Russian COVID-19 testing protocols required to verify identity at the time of the breach.

Healthcare provider | Diagnostic testing and laboratory services | Medical lab network | Russia
Private CompanyRussiagemotest.ru

🗂 Why They Hold Your Data

Medical laboratory networks collect highly sensitive patient identity, contact, billing, insurance, provider-order, and diagnostic test records across lab testing workflows.

📰 Recent Developments

Gemotest was fined approximately 60,000 rubles (around \$1,000 at the time) by a Moscow magistrate court in mid-2022 for the data leak, the maximum penalty allowed under Russian personal-data legislation in force at that time. Russian data-protection enforcement has tightened modestly since 2022, with new amendments allowing larger turnover-based fines for repeat offenders. The Gemotest dataset has continued to circulate on Russian and international dark-web forums in the years since the original release. Notable subsequent uses of the dataset include investigative journalism: in 2023 reporting by RFE/RL's Schemes unit used Gemotest records to identify a Ukrainian judge who had used a Russian passport for COVID-19 testing in occupied Crimea, supporting allegations of dual citizenship.

🔍 Data Points Exposed

5 verified field types:
Email
Phone Number
Passport
Name
Home Address

Exposure Categories

CredentialsPASSPORT
LocationPHYS ADDR

Canonical Fields

email_address, full_name, passport_number, phone_number, physical_address:home

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~30.2M records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: gemotest.ru-2022

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of gemotest.ru
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MedicalEmailPhoneAddress

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom