Skip to content

FulcrumSec Breaches Unique Computing, ReFocus AI, and Gennet AI Exposing 23,000 Insurance Policyholders, $797M in Premiums, Driver Licenses, SSNs, and Proprietary ML Models From a Single Unpatched AWS Account

Dark Web Informer - Cyber Threat Intelligence

FulcrumSec Breaches Unique Computing, ReFocus AI, and Gennet AI Exposing 23,000 Insurance Policyholders, $797M in Premiums, Driver Licenses, SSNs, and Proprietary ML Models From a Single Unpatched AWS Account

April 1, 2026 - 12:52:53 AM UTC
United States
AI / Insurance / Healthcare
Standalone API Access Now Available High-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.
View API
Unlock Exclusive Cyber Threat Intelligence
Powered by DarkWebInformer.com
Stay ahead of cyber threats with real-time breach tracking, expert analysis, and high quality evidence - built for security professionals, researchers, journalists, and everyday people who take their privacy seriously.

Quick Facts

Date & Time 2026-04-01 00:52:53 UTC
Threat Actor FulcrumSec
Victims Unique Computing / ReFocus AI / Gennet AI
Industry AI / Insurance / Healthcare
Category Data Breach
Data Size 140 GB (Compressed)
S3 Buckets 57
Policyholders 23,000+
Insured Premiums $796,847,366
Initial Access CVE-2025-55182 (React2Shell)
Severity Critical
Price Free (Public Leak)

Incident Overview

FulcrumSec has published a detailed breach report and 140GB data dump targeting three interconnected companies operating under a single AWS account: Unique Computing LLC (an 11-person AI consulting firm in Alexandria, Virginia), Gennet AI (a healthcare clinical documentation platform), and ReFocus AI (an insurance churn prediction platform serving 11+ insurance agency clients). The breach was achieved through CVE-2025-55182 (React2Shell) on an unpatched internet-facing host, which yielded ECS credentials providing access to 57 S3 buckets and the AWS Secrets Manager.


The core finding is that all three companies, along with a nonprofit educational platform (Duaa.org) and personal developer projects, shared a single AWS account (086134439114) with no account separation, no environment isolation, and one set of credentials controlling everything. The actor describes this as having one compromised key that grants access to everything from a children's math curriculum to insurance policyholder driver license numbers.


The insurance policyholder data is the most damaging component, totaling $796,847,366 in aggregate insured premiums across 11+ agencies:

  • Patriotic Insurance (New York): Complete HawkSoft agency management export across 1,774 CSV files with 9,977,842 rows representing 1,249 unique policyholders. Includes full names, dates of birth, home addresses, driver license numbers (NY State 9-digit format), phone numbers, email addresses, 1,305 unique VINs, complete policy histories, claims data, billing records, employer names, income brackets, and occupations.
  • Alliance Insurance Services (Winston-Salem, NC): Complete Salesforce policy management export with 96,624 rows containing 21,761 unique named insureds, 12,739 phone numbers, 29,186 addresses, 43,928 policy numbers, and $191,144,873 in total insured premium value across 27 states. Includes 727 FEIN/SSN values, 26 matching individual Social Security Number format, 7,231 individual medical policies, and 1,431 Medicare Advantage plans.
  • Ohio Mutual Insurance Group: 596,155 policy records covering 579 insurance agents across 7 states with $605,702,493 in aggregate premiums. This is a regional insurance carrier's complete auto insurance portfolio including the entire agent distribution network.

Beyond the insurance data, the breach exposed ReFocus AI's proprietary ML pipeline including all 11 client churn prediction models (trained scikit-learn artifacts, client configuration YAMLs, EDA reports, preprocessed data, raw predictions, and 330+ timestamped run configurations), production model artifacts, feature engineering pipelines, and 713 data intake files spanning November 2021 through December 2024. The Gennet AI clinical platform contained a ChromaDB vector database with synthetic FHIR patient data, h2oGPT LLM infrastructure, and LLM configurations for GPT-4o, Meta Llama 2, and Amazon Titan.


Additional S3 buckets contained Databricks workspaces with biotech cell imaging analysis (Ovizio holographic microscopy), CycleGAN voice cloning models, 7 months of AWS billing and cost usage reports, 10 SageMaker ML workspaces, WorkMail archives linking the companies' principals, Elastic Beanstalk application deployments, personal developer buckets, and the Duaa.org children's education platform (Pre-K Pakistani mathematics curriculum). The actor verified the education content contains no children's PII.


FulcrumSec's post directly addresses Unique Computing's CEO, naming them personally and accusing the company of criminal negligence for failing to patch CVE-2025-55182 for months after a patch was available, refusing to share infrastructure logs with ReFocus AI after the breach was discovered, and leaving the React hosts vulnerable even after being warned. The actor states ReFocus AI cooperated when contacted, acknowledged they could not pay because they were unable to confirm whether their data had been accessed by other parties, and that Unique Computing "went dark." FulcrumSec is offering to compensate affected Patriotic Insurance policyholders $70 in Monero for driver's license replacement costs, verified against the leaked data.

Compromised Data Categories

Driver License Numbers Social Security Numbers Full Names & Home Addresses Insurance Policy Records Claims & Billing Histories Medical Policy & Medicare Data Vehicle Identification Numbers Employer & Income Data Proprietary ML Models & Pipelines Client Configuration YAMLs AWS Secrets & ECS Credentials SageMaker ML Workspaces Biotech Cell Imaging Data Voice Cloning Models AWS Billing & Cost Reports WorkMail Email Archives Agent Distribution Networks

Image Preview

FulcrumSec breach post detailing Unique Computing, ReFocus AI, and Gennet AI shared AWS account compromise with insurance policyholder data from Patriotic Insurance, Alliance Insurance, and Ohio Mutual Breach details showing Gennet AI clinical platform, personal Gmail as infrastructure, developer attribution, responsibility analysis, and complete S3 bucket data structure Complete S3 bucket inventory including Gennet AI clinical platform, Databricks biotech workspace, AWS infrastructure, personal developer buckets, and Duaa.org education platform with no-children's-PII verification FulcrumSec open letter to Unique Computing CEO, ReFocus AI, and affected insurance agencies with victim compensation offer and upcoming campaign announcements

Claim URL

Subscriber Access Required The original listing URL and unredacted claim images are available on the Threat Feed and Ransomware Feed for paid subscribers.
Subscribe
Subscriber Access View the original listing URL and unredacted claim images on the feeds below.

MITRE ATT&CK Mapping

T1190 Exploit Public-Facing Application
Exploited CVE-2025-55182 (React2Shell) on an unpatched internet-facing host to gain initial foothold and extract ECS credentials from the compromised container environment.
T1552.005 Cloud Instance Metadata API
Extracted ECS credentials from the compromised container that provided access to 57 S3 buckets and AWS Secrets Manager across the entire shared AWS account.
T1530 Data from Cloud Storage
Exfiltrated the complete contents of 57 S3 buckets containing insurance policyholder databases, ML models, clinical platform data, developer workspaces, and internal communications.
T1213 Data from Information Repositories
Extracted complete agency management system exports (HawkSoft, Salesforce) containing policyholder records, claims histories, billing data, and premium details across 11+ insurance agencies.
T1589.001 Gather Victim Identity: Credentials
Harvested driver license numbers, Social Security Numbers, FEIN values, home addresses, and employment details for 23,000+ insurance policyholders across New York, North Carolina, and 25 additional states.
T1588.003 Obtain Capabilities: Code Signing Certificates
Extracted proprietary ML model artifacts, scikit-learn trained models, client configuration files, and complete churn prediction pipelines representing significant trade secrets and intellectual property.
T1567 Exfiltration Over Web Service
Published the 140GB compressed dataset as a free download on web forums, with the actor maintaining both a clearnet site and Tor onion service for distribution.
T1580 Cloud Infrastructure Discovery
Enumerated the entire AWS account structure including 57 S3 buckets, SageMaker workspaces, Elastic Beanstalk deployments, Databricks environments, and WorkMail archives to map the full scope of accessible data.

Latest