Loading...
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Infodesk Allegedly Breached, Exposing Staff Data Across 18 Global Organizations

Screenshot of a forum post advertising the sale of the alleged Infodesk database containing employee lists from Johnson & Johnson, Moderna, GSK, and 15 other organizations
The forum listing advertising the alleged Infodesk database for sale, showing the Infodesk logo, a list of 18 compromised client organizations, and sample CSV data with individual email addresses redacted. The actor joined the forum in April 2026 and has no prior claims on record.

A threat actor is allegedly selling a database stolen from Infodesk, a New York-based enterprise intelligence SaaS platform that counts more than half the world’s leading pharmaceutical companies among its clients. The dataset purportedly contains employee names and email addresses belonging to staff at 18 major organizations, including Johnson & Johnson, Moderna, GSK, Merck, Medtronic, Sanofi, and the International Monetary Fund. The claim has not been corroborated and the actor behind it has no prior track record.

What Infodesk Is and Why It Matters

Founded in 1999 and headquartered in Irvington, New York, Infodesk provides a decision intelligence platform used by Global 2000 companies across life sciences, government, professional services, and investment sectors. The platform centralizes regulatory, competitive, and market intelligence for enterprise teams, with a particularly deep footprint in pharmaceutical and biotech. Acquired by Cuadrilla Capital in 2022 and expanded through the acquisition of Wide Narrow in 2023, Infodesk has grown into a sizeable enterprise software vendor whose client roster spans some of the most heavily regulated industries in the world, making it a high-value target for any attacker looking to harvest corporate contact data at scale through a single third-party entry point.

The Alleged Dataset

The actor claims the breach occurred in February 2026 and that the stolen database contains employee records across 18 organizations separated into individual CSV files per client. The full list of allegedly compromised organizations includes AARP, Abbott, Argenx, Bayer, GSK, the IMF, Johnson & Johnson, Kearney, Kenvue, Medtronic, Merck, Moderna, Novonesis, Novo Nordisk, Olympus, Sanofi, UCB, and Vertex. Record counts per organization range from 72 to 999. The data types claimed are limited to employee names and email addresses.

Notably, several of the email addresses in the sample data carry Infodesk-formatted domains rather than the corporate email addresses of the organizations themselves — for example, addresses structured as username@[client].infodesk.com. This pattern is consistent with a breach of Infodesk’s own identity or single sign-on infrastructure rather than a direct compromise of the client organizations, and supports the supply chain angle of the claim. The inclusion of the IMF in the alleged client list is also notable — unlike the pharmaceutical and consulting firms that make up the bulk of the dataset, the IMF is a major international financial institution, suggesting Infodesk’s platform reach extends well beyond life sciences.

Credibility Concerns

The actor behind the listing has no prior breach history and joined the forum in April 2026, making independent verification of the claim impossible at this stage. The data types involved (names and email addresses) are relatively low in sensitivity compared to financial or medical records, but the breadth of the client list and the specificity of the per-organization file structure add some surface credibility. The dataset is being offered as a one-time sale for cryptocurrency.

None of the 18 organizations named in the claim had issued any public statement at time of publication. Infodesk had not issued any public statement at time of publication.

The Supply Chain Risk

If substantiated, a breach of Infodesk’s platform would represent a textbook supply chain exposure: a single vendor compromise providing an attacker with harvested employee contact data across dozens of major enterprises simultaneously, similar to the TeamPCP supply chain attack on Mercor that rippled across multiple high-profile clients. Employee email addresses from named pharmaceutical and financial organizations are immediately useful for targeted spear phishing, business email compromise, and credential stuffing campaigns. Staff at organizations with active Infodesk accounts should be alert to any unusual communications referencing regulatory intelligence, compliance workflows, or platform access. For guidance on responding to a potential breach notification, see our data breach response guide.

Picture of m00s3c

m00s3c

Moose (@m00s3c) is the author of BreachNews, focusing on data breach intelligence, dark web monitoring, and threat analysis. His work involves analyzing breach claims, reviewing leaked datasets, and tracking threat actor activity to provide clear, factual reporting.

Share this:

Related Posts

Newsletter signup

Get the latest data breach and security news.

Please wait...

Thank you for signing up!

Search & Monitoring Tools

Free Data Breach Search Tool

Check your email against 12 billion+ leaked records — then set up alerts so you're the first to know if you appear in a new breach.

Instant breach lookup
Real-time monitoring & alerts
12 billion+ leaked records
Check now Set up monitoring

Powered by BreachNews