This week Anthem CEO Joseph R. Swedish made public that “Anthem was the target of a very sophisticated external cyber attack. These attackers gained unauthorized access to Anthem’s IT system and have obtained personal information from our current and former members...” He also indicated that the data breach, although significant, did not include any credit card or health data.
Anthem’s customer base is said to be around 80 million across their various offerings. This could potentially be the largest data breach in U.S. history and have a very strong impact on customers’ personal lives. Let’s not forget that SSNs are a magic key for malicious parties to carry out fraud on individuals such as obtaining loans or accessing credit card and health information! Wait, didn’t J. Swedish say that credit cards and health weren’t part of the issue…
Until the exact details of the breach are released (that is, if they do get released), one can only speculate on the “very sophisticated” nature of the attack. I am not sure what a “very sophisticated” attack might entail – perhaps it used highly complex code or some new combined form of malware and RATs.
However, this attack had to have a point of origin. Was it an exploit on key infrastructure, or was it the usual (and more likely) candidate of a user or administrator with weak passwords falling victim to spear-phishing?
Could this have been avoided? In essence, one of the best basic protections against these types of attacks is to ensure some simple security principals: ensure passwords are strong and not shared; implement proper security event detection and responses procedures looking for key anomalies like a non-standard process accessing sensitive data stores; and, most importantly, provide proper user awareness training.
For more on the Anthem data breach story, check out this clip from ABC News featuring Digital Guardian COO Pete Tyrrell:
New 2017 Gartner DLP Magic Quadrant
Digital Guardian is a Leader in the 2017 Magic Quadrant for Data Loss Prevention. Read the report to understand how DLP solutions have evolved to provide advanced data protection.
Digital Guardian Case Study
A healthcare organization identified a significant risk of non-compliance. Deploying Digital Guardian resulted in an 85% reduction decrease in prompts to users in the first 6 months.
Related ArticlesFewer (but bigger) breaches in 2016, as average breach cost falls to $3.6m
The cost to firms of a data breach is high – $3.6 million on average – but that’s down from last year, a study by IBM and The Ponemon Institute finds.Friday Five: 6/8 Edition
Facebook in hot water again, malware hits Rhode Island, regulation for data brokers, and more - catch up on the week's infosec news with this roundup!Buying A Breach: Pacnet’s Dirty Little Secret
When the Australian telco Telstra purchased Pacnet for US$697 million earlier this year, the idea was to expand its reach in Asia. Instead, it ended up buying a controlling stake in a massive data breach.