<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Massive breach at health care company</title>
	<atom:link href="http://www.epanorama.net/blog/2015/02/05/massive-breach-at-health-care-company/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2015/02/05/massive-breach-at-health-care-company/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 18 Apr 2026 22:36:12 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/05/massive-breach-at-health-care-company/comment-page-1/#comment-1409485</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 20 Jun 2015 07:02:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30048#comment-1409485</guid>
		<description><![CDATA[Joseph Menn / Reuters: 	
OPM hack employed rare tool also used in last year&#039;s Anthem breach, which was tied to Chinese intelligence  —  U.S. employee data breach tied to Chinese intelligence  —  The Chinese hacking group suspected of stealing sensitive information about millions of current and former U.S. government employees … 
http://www.reuters.com/article/2015/06/19/us-usa-data-breach-idUSKBN0OZ20Z20150619]]></description>
		<content:encoded><![CDATA[<p>Joseph Menn / Reuters:<br />
OPM hack employed rare tool also used in last year&#8217;s Anthem breach, which was tied to Chinese intelligence  —  U.S. employee data breach tied to Chinese intelligence  —  The Chinese hacking group suspected of stealing sensitive information about millions of current and former U.S. government employees …<br />
<a href="http://www.reuters.com/article/2015/06/19/us-usa-data-breach-idUSKBN0OZ20Z20150619" rel="nofollow">http://www.reuters.com/article/2015/06/19/us-usa-data-breach-idUSKBN0OZ20Z20150619</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/05/massive-breach-at-health-care-company/comment-page-1/#comment-1389063</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 12 May 2015 06:41:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30048#comment-1389063</guid>
		<description><![CDATA[Shannon Pettypiece / Bloomberg Business: 	
Report: Cyber attacks costs US healthcare system $6B annually; nearly 90% of healthcare providers were hit by breaches in the past two years

Rising Cyber Attacks Costing Health System $6 Billion Annually
http://www.bloomberg.com/news/articles/2015-05-07/rising-cyber-attacks-costing-health-system-6-billion-annually

 A rise in cyber attacks against doctors and hospitals is costing the U.S. health-care system $6 billion a year as organized criminals who once targeted retailers and financial firms increasingly go after medical records, security researchers say.

Criminal attacks against health-care providers have more than doubled in the past five years, with the average data breach costing a hospital $2.1 million, according to a study today from the Ponemon Institute, a security research and consulting firm. Nearly 90 percent of health-care providers were hit by breaches in the past two years, half of them criminal in nature, the report found.

While intrusions like ones exposing millions of consumers at health insurer Anthem Inc. and hospital operator Community Health Systems Inc. have increased risk awareness, most of their peers are still unprepared for sophisticated data attacks, security experts have said.

“The health-care industry is being hunted and hacked by the elite financial criminal syndicates that had been targeting large financial institutions until they realized health-care databases are more valuable,”

Thieves can use that information to take out a loan or open up a line of credit in the victim’s name, or for medical identity theft, where the victim’s insurance ID is used by an impostor seeking free medical care.

About half of health-care organizations surveyed by Ponemon said they didn’t have sufficient technology to prevent or quickly detect a breach, or the personnel with the necessary technical expertise.

“The organizations are getting better, but it is a slow-moving train,” 

The numbers this year are already in excess of last year’s, after hackers accessed almost 80 million records from Anthem and 11 million from the health insurer Premera Blue Cross.

Data is resold on private forums that specialize in selling stolen credit cards or Social Security numbers, or on the dark web, where users’ identities are hidden and transactions are done anonymously in Bitcoins]]></description>
		<content:encoded><![CDATA[<p>Shannon Pettypiece / Bloomberg Business:<br />
Report: Cyber attacks costs US healthcare system $6B annually; nearly 90% of healthcare providers were hit by breaches in the past two years</p>
<p>Rising Cyber Attacks Costing Health System $6 Billion Annually<br />
<a href="http://www.bloomberg.com/news/articles/2015-05-07/rising-cyber-attacks-costing-health-system-6-billion-annually" rel="nofollow">http://www.bloomberg.com/news/articles/2015-05-07/rising-cyber-attacks-costing-health-system-6-billion-annually</a></p>
<p> A rise in cyber attacks against doctors and hospitals is costing the U.S. health-care system $6 billion a year as organized criminals who once targeted retailers and financial firms increasingly go after medical records, security researchers say.</p>
<p>Criminal attacks against health-care providers have more than doubled in the past five years, with the average data breach costing a hospital $2.1 million, according to a study today from the Ponemon Institute, a security research and consulting firm. Nearly 90 percent of health-care providers were hit by breaches in the past two years, half of them criminal in nature, the report found.</p>
<p>While intrusions like ones exposing millions of consumers at health insurer Anthem Inc. and hospital operator Community Health Systems Inc. have increased risk awareness, most of their peers are still unprepared for sophisticated data attacks, security experts have said.</p>
<p>“The health-care industry is being hunted and hacked by the elite financial criminal syndicates that had been targeting large financial institutions until they realized health-care databases are more valuable,”</p>
<p>Thieves can use that information to take out a loan or open up a line of credit in the victim’s name, or for medical identity theft, where the victim’s insurance ID is used by an impostor seeking free medical care.</p>
<p>About half of health-care organizations surveyed by Ponemon said they didn’t have sufficient technology to prevent or quickly detect a breach, or the personnel with the necessary technical expertise.</p>
<p>“The organizations are getting better, but it is a slow-moving train,” </p>
<p>The numbers this year are already in excess of last year’s, after hackers accessed almost 80 million records from Anthem and 11 million from the health insurer Premera Blue Cross.</p>
<p>Data is resold on private forums that specialize in selling stolen credit cards or Social Security numbers, or on the dark web, where users’ identities are hidden and transactions are done anonymously in Bitcoins</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/05/massive-breach-at-health-care-company/comment-page-1/#comment-1353080</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 06 Mar 2015 09:26:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30048#comment-1353080</guid>
		<description><![CDATA[Anthem Blocking Federal Auditor From Doing Vulnerability Scans
http://it.slashdot.org/story/15/03/05/237236/anthem-blocking-federal-auditor-from-doing-vulnerability-scans

Anthem Inc., the Indiana-based health insurer has informed a federal auditor, the Office of Personnel Management, that it will not permit vulnerability scans of its network — even after acknowledging that it was the victim of a massive breach that leaked data on tens of millions of patients. According to this article, Anthem is citing &quot;company policy&quot; that prohibits third party access to its network in declining to let auditors from OPM&#039;s Office of the Inspector General (OIG) conduct scans for vulnerable systems.

At Anthem: Where There’s Fire, There’s Smoke
https://digitalguardian.com/blog/anthem-where-theres-fire-theres-smoke

After losing 80 million patient records, Anthem Healthcare is refusing to have its network scanned for vulnerabilities by a federal auditor, raising questions about the health insurer’s internal practices.

The saying goes “where there’s smoke, there’s fire.” But in the case of Indiana-based Anthem Inc., you might need to flip that adage around: “where there’s fire, there’s smoke.”

That, after a federal auditor responsible for monitoring health insurers’ information security controls revealed this week that Anthem refused to allow it to scan its network for vulnerabilities, configuration problems and other issues in the wake of the breach.

As reported by Healthcareinfosecurity, the Office of Personnel Management&#039;s (OPM) Office of Inspector General, issued a statement saying that Anthem refused to allow the agency to perform &quot;standard vulnerability scans and configuration compliance tests&quot; this summer, as requested by the OIG. Worse: Anthem refused a similar request in 2013. In each case, Anthem cited “internal policies” that forbid outside access to its network as the reason for refusing to allow the vulnerability scans.]]></description>
		<content:encoded><![CDATA[<p>Anthem Blocking Federal Auditor From Doing Vulnerability Scans<br />
<a href="http://it.slashdot.org/story/15/03/05/237236/anthem-blocking-federal-auditor-from-doing-vulnerability-scans" rel="nofollow">http://it.slashdot.org/story/15/03/05/237236/anthem-blocking-federal-auditor-from-doing-vulnerability-scans</a></p>
<p>Anthem Inc., the Indiana-based health insurer has informed a federal auditor, the Office of Personnel Management, that it will not permit vulnerability scans of its network — even after acknowledging that it was the victim of a massive breach that leaked data on tens of millions of patients. According to this article, Anthem is citing &#8220;company policy&#8221; that prohibits third party access to its network in declining to let auditors from OPM&#8217;s Office of the Inspector General (OIG) conduct scans for vulnerable systems.</p>
<p>At Anthem: Where There’s Fire, There’s Smoke<br />
<a href="https://digitalguardian.com/blog/anthem-where-theres-fire-theres-smoke" rel="nofollow">https://digitalguardian.com/blog/anthem-where-theres-fire-theres-smoke</a></p>
<p>After losing 80 million patient records, Anthem Healthcare is refusing to have its network scanned for vulnerabilities by a federal auditor, raising questions about the health insurer’s internal practices.</p>
<p>The saying goes “where there’s smoke, there’s fire.” But in the case of Indiana-based Anthem Inc., you might need to flip that adage around: “where there’s fire, there’s smoke.”</p>
<p>That, after a federal auditor responsible for monitoring health insurers’ information security controls revealed this week that Anthem refused to allow it to scan its network for vulnerabilities, configuration problems and other issues in the wake of the breach.</p>
<p>As reported by Healthcareinfosecurity, the Office of Personnel Management&#8217;s (OPM) Office of Inspector General, issued a statement saying that Anthem refused to allow the agency to perform &#8220;standard vulnerability scans and configuration compliance tests&#8221; this summer, as requested by the OIG. Worse: Anthem refused a similar request in 2013. In each case, Anthem cited “internal policies” that forbid outside access to its network as the reason for refusing to allow the vulnerability scans.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/05/massive-breach-at-health-care-company/comment-page-1/#comment-1348212</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 25 Feb 2015 11:18:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30048#comment-1348212</guid>
		<description><![CDATA[Caroline Humer / Reuters: 	
Anthem says breach may have also affected up to 18.8M Blue Cross Blue Shield customers  —  Anthem says at least 8.8 million non-customers could be victims in data hack 
http://www.reuters.com/article/2015/02/24/us-anthem-cybersecurity-idUSKBN0LS2CS20150224

Health insurer Anthem Inc, which earlier this month reported that it was hit by a massive cyberbreach, said on Tuesday that 8.8 million to 18.8 million people who were not its customers could be victims in the attack.

Anthem, the country&#039;s second-largest health insurer, is part of a national network of independently run Blue Cross Blue Shield plans through which BCBS customers can receive medical services when they are in an area where BCBS is operated by a different company.

It is those Blue Cross Blue Shield customers who were potentially affected because their records may be included in the database that was hacked, the company said.

Security experts are warning that healthcare and insurance companies are especially vulnerable to cybercriminals who want to steal personal information to sell on the underground market.

Anthem continued to estimate that tens of millions of customer records were stolen, rather than simply accessed.]]></description>
		<content:encoded><![CDATA[<p>Caroline Humer / Reuters:<br />
Anthem says breach may have also affected up to 18.8M Blue Cross Blue Shield customers  —  Anthem says at least 8.8 million non-customers could be victims in data hack<br />
<a href="http://www.reuters.com/article/2015/02/24/us-anthem-cybersecurity-idUSKBN0LS2CS20150224" rel="nofollow">http://www.reuters.com/article/2015/02/24/us-anthem-cybersecurity-idUSKBN0LS2CS20150224</a></p>
<p>Health insurer Anthem Inc, which earlier this month reported that it was hit by a massive cyberbreach, said on Tuesday that 8.8 million to 18.8 million people who were not its customers could be victims in the attack.</p>
<p>Anthem, the country&#8217;s second-largest health insurer, is part of a national network of independently run Blue Cross Blue Shield plans through which BCBS customers can receive medical services when they are in an area where BCBS is operated by a different company.</p>
<p>It is those Blue Cross Blue Shield customers who were potentially affected because their records may be included in the database that was hacked, the company said.</p>
<p>Security experts are warning that healthcare and insurance companies are especially vulnerable to cybercriminals who want to steal personal information to sell on the underground market.</p>
<p>Anthem continued to estimate that tens of millions of customer records were stolen, rather than simply accessed.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/05/massive-breach-at-health-care-company/comment-page-1/#comment-1347116</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 23 Feb 2015 10:49:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30048#comment-1347116</guid>
		<description><![CDATA[Millions of Children Exposed to ID Theft Through Anthem Breach
http://www.nbcnews.com/business/personal-finance/millions-children-exposed-id-theft-through-anthem-breach-n308116

Adults aren&#039;t the only ones who can have their identity stolen.

Tens of millions of American children had their Social Security numbers, date of birth and health care ID numbers stolen in the recent data breach at health insurance giant, Anthem Inc. This exposes these kids to the real risk of identity theft.

&quot;Every terrible outcome that can occur as the result of an identity theft will happen to the children who were on that database,&quot; said Adam Levin, chairman and founder of IDentityTheft 911. &quot;Criminals will use those stolen Social Security numbers to open accounts, get medical treatment, commit tax fraud, you name it.&quot; 

&quot;This is a watershed event,&quot; Rohrbaugh said. &quot;There is no other bulk acquisition of this much personal data - names, birthdates, addresses and Social Security numbers - that I am aware of in history.&quot; 

And because the children&#039;s information was linked to their parents&#039; data, it will make it much easier for cybercriminals to commit fraud against the parents as well, Rohrbaugh said. 

The Social Security number was never supposed to be used as a national identifier, but it&#039;s become that. For an identity thief, that nine-digit number is the brass ring. It&#039;s the skeleton key that unlocks your life.

A child&#039;s number is even more valuable. Here&#039;s why: For most minors, their number is pristine - it&#039;s never been used and is not yet associated with a credit file. That means there&#039;s very little chance that the credit reporting agencies are monitoring it. 

So a criminal can take that stolen number, combine it with someone else&#039;s name, address and birth date to create a fake ID

&quot;They will always take the child over the adult,&quot; Abagnale told NBC News. &quot;And the younger the child is the better, because they have longer to use that identity before someone finds out.&quot; 

&quot;Now it&#039;s really all about detection,&quot;

The ITRC has prepared A Guide for Parents - Child Identity Theft Indicators 

ITRC Fact Sheet 120B
Child Identity Theft Indicators:
A Guide for Parents
http://www.idtheftcenter.org/Fact-Sheets/fs-120b.html]]></description>
		<content:encoded><![CDATA[<p>Millions of Children Exposed to ID Theft Through Anthem Breach<br />
<a href="http://www.nbcnews.com/business/personal-finance/millions-children-exposed-id-theft-through-anthem-breach-n308116" rel="nofollow">http://www.nbcnews.com/business/personal-finance/millions-children-exposed-id-theft-through-anthem-breach-n308116</a></p>
<p>Adults aren&#8217;t the only ones who can have their identity stolen.</p>
<p>Tens of millions of American children had their Social Security numbers, date of birth and health care ID numbers stolen in the recent data breach at health insurance giant, Anthem Inc. This exposes these kids to the real risk of identity theft.</p>
<p>&#8220;Every terrible outcome that can occur as the result of an identity theft will happen to the children who were on that database,&#8221; said Adam Levin, chairman and founder of IDentityTheft 911. &#8220;Criminals will use those stolen Social Security numbers to open accounts, get medical treatment, commit tax fraud, you name it.&#8221; </p>
<p>&#8220;This is a watershed event,&#8221; Rohrbaugh said. &#8220;There is no other bulk acquisition of this much personal data &#8211; names, birthdates, addresses and Social Security numbers &#8211; that I am aware of in history.&#8221; </p>
<p>And because the children&#8217;s information was linked to their parents&#8217; data, it will make it much easier for cybercriminals to commit fraud against the parents as well, Rohrbaugh said. </p>
<p>The Social Security number was never supposed to be used as a national identifier, but it&#8217;s become that. For an identity thief, that nine-digit number is the brass ring. It&#8217;s the skeleton key that unlocks your life.</p>
<p>A child&#8217;s number is even more valuable. Here&#8217;s why: For most minors, their number is pristine &#8211; it&#8217;s never been used and is not yet associated with a credit file. That means there&#8217;s very little chance that the credit reporting agencies are monitoring it. </p>
<p>So a criminal can take that stolen number, combine it with someone else&#8217;s name, address and birth date to create a fake ID</p>
<p>&#8220;They will always take the child over the adult,&#8221; Abagnale told NBC News. &#8220;And the younger the child is the better, because they have longer to use that identity before someone finds out.&#8221; </p>
<p>&#8220;Now it&#8217;s really all about detection,&#8221;</p>
<p>The ITRC has prepared A Guide for Parents &#8211; Child Identity Theft Indicators </p>
<p>ITRC Fact Sheet 120B<br />
Child Identity Theft Indicators:<br />
A Guide for Parents<br />
<a href="http://www.idtheftcenter.org/Fact-Sheets/fs-120b.html" rel="nofollow">http://www.idtheftcenter.org/Fact-Sheets/fs-120b.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/05/massive-breach-at-health-care-company/comment-page-1/#comment-1341990</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 13 Feb 2015 10:38:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30048#comment-1341990</guid>
		<description><![CDATA[Phishers Pounce on Anthem Breach
http://krebsonsecurity.com/2015/02/phishers-pounce-on-anthem-breach/

Phishers and phone fraudsters are capitalizing on public concern over a massive data breach announced this week at health insurance provider Anthem in a bid to steal financial and personal data from consumers.

The flood of phishing scams was unleashed just hours after Anthem announced publicly that a “very sophisticated cyberattack” on its systems had compromised the Social Security information and other personal details on some 80 million Americans.

According to Anthem, fraudsters also are busy perpetrating similar scams by cold-calling people via telephone.

It is likely that these phishing and phone scams are random and opportunistic, but there is always the possibility that the data stolen from Anthem has fallen into the hands of scam artists.

The company says it will begin sending notifications to affected consumers via snail mail in the coming weeks.]]></description>
		<content:encoded><![CDATA[<p>Phishers Pounce on Anthem Breach<br />
<a href="http://krebsonsecurity.com/2015/02/phishers-pounce-on-anthem-breach/" rel="nofollow">http://krebsonsecurity.com/2015/02/phishers-pounce-on-anthem-breach/</a></p>
<p>Phishers and phone fraudsters are capitalizing on public concern over a massive data breach announced this week at health insurance provider Anthem in a bid to steal financial and personal data from consumers.</p>
<p>The flood of phishing scams was unleashed just hours after Anthem announced publicly that a “very sophisticated cyberattack” on its systems had compromised the Social Security information and other personal details on some 80 million Americans.</p>
<p>According to Anthem, fraudsters also are busy perpetrating similar scams by cold-calling people via telephone.</p>
<p>It is likely that these phishing and phone scams are random and opportunistic, but there is always the possibility that the data stolen from Anthem has fallen into the hands of scam artists.</p>
<p>The company says it will begin sending notifications to affected consumers via snail mail in the coming weeks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/05/massive-breach-at-health-care-company/comment-page-1/#comment-1341985</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 13 Feb 2015 10:34:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30048#comment-1341985</guid>
		<description><![CDATA[Anthem hack raises fears about medical data
http://www.latimes.com/business/la-fi-anthem-hack-fallout-20150206-story.html#page=1

Insurance giant Anthem Inc. suffered a massive data breach exposing the personal information of up to 80 million Americans — and it could have been even worse for consumers.

The hackers didn&#039;t take sensitive medical information on patients or their credit card data, according to the company, even though it was stored alongside Social Security numbers and other personal information that were stolen.

The intrusion is raising fresh questions about the ability of giant health insurers and other medical providers to safeguard the vast troves of electronic medical records and claims data they are stockpiling.

All this comes at a time when Anthem is spearheading an ambitious effort to build a controversial database of medical records on 9 million Californians for use by hospitals and doctors.

The federal government had put Anthem on notice in 2013 about its computer vulnerabilities, and last year the FBI warned healthcare companies about the growing threat of cyberattack on the industry.

The hackers broke into one of Anthem&#039;s databases sometime around early January, according to people familiar with the investigation. An Anthem employee noticed a large query running in the database on Jan. 27 using his log-in information and reported the suspicious activity.

Two days later, an internal investigation verified that the company was a victim of a cyberattack, the company said, and federal authorities were alerted.

The data breach extended across all of Anthem&#039;s business, possibly affecting customers at large employers, individual policyholders and people enrolled in Medicaid managed-care plans. It also involved data on company employees.

Anthem said it has doubled its spending on cybersecurity in the past four years and it has 200 employees dedicated to monitoring and safeguarding its networks.

Consumer advocates said the issue of whether Anthem was largely at fault or the victim of a clever attack misses the point that no healthcare database is safe.

&quot;This thirst for more and more data from the medical industry inevitably places consumers&#039; health information at risk,&quot; said Carmen Balber, executive director of Consumer Watchdog, a Santa Monica advocacy group. &quot;It&#039;s not fair to consumers for these companies to create one-stop shopping for data thieves.&quot;

This was not the first such slip-up by Anthem.

In 2013, the company agreed to pay $1.7 million to resolve federal allegations that it exposed protected health information of 612,000 people online because of security weaknesses.

&quot;Anthem does not have a very good track record of protecting the information entrusted to them,&quot;

&quot;From dealing with their IT system on the front end as a customer,&quot; Winton said, &quot;my impression is they don&#039;t know what they are doing.&quot;

&quot;Healthcare companies like Anthem have got to invest far more effort and resources in data security to regain public trust,&quot; said Gerald Kominski, director of the UCLA Center for Health Policy Research.]]></description>
		<content:encoded><![CDATA[<p>Anthem hack raises fears about medical data<br />
<a href="http://www.latimes.com/business/la-fi-anthem-hack-fallout-20150206-story.html#page=1" rel="nofollow">http://www.latimes.com/business/la-fi-anthem-hack-fallout-20150206-story.html#page=1</a></p>
<p>Insurance giant Anthem Inc. suffered a massive data breach exposing the personal information of up to 80 million Americans — and it could have been even worse for consumers.</p>
<p>The hackers didn&#8217;t take sensitive medical information on patients or their credit card data, according to the company, even though it was stored alongside Social Security numbers and other personal information that were stolen.</p>
<p>The intrusion is raising fresh questions about the ability of giant health insurers and other medical providers to safeguard the vast troves of electronic medical records and claims data they are stockpiling.</p>
<p>All this comes at a time when Anthem is spearheading an ambitious effort to build a controversial database of medical records on 9 million Californians for use by hospitals and doctors.</p>
<p>The federal government had put Anthem on notice in 2013 about its computer vulnerabilities, and last year the FBI warned healthcare companies about the growing threat of cyberattack on the industry.</p>
<p>The hackers broke into one of Anthem&#8217;s databases sometime around early January, according to people familiar with the investigation. An Anthem employee noticed a large query running in the database on Jan. 27 using his log-in information and reported the suspicious activity.</p>
<p>Two days later, an internal investigation verified that the company was a victim of a cyberattack, the company said, and federal authorities were alerted.</p>
<p>The data breach extended across all of Anthem&#8217;s business, possibly affecting customers at large employers, individual policyholders and people enrolled in Medicaid managed-care plans. It also involved data on company employees.</p>
<p>Anthem said it has doubled its spending on cybersecurity in the past four years and it has 200 employees dedicated to monitoring and safeguarding its networks.</p>
<p>Consumer advocates said the issue of whether Anthem was largely at fault or the victim of a clever attack misses the point that no healthcare database is safe.</p>
<p>&#8220;This thirst for more and more data from the medical industry inevitably places consumers&#8217; health information at risk,&#8221; said Carmen Balber, executive director of Consumer Watchdog, a Santa Monica advocacy group. &#8220;It&#8217;s not fair to consumers for these companies to create one-stop shopping for data thieves.&#8221;</p>
<p>This was not the first such slip-up by Anthem.</p>
<p>In 2013, the company agreed to pay $1.7 million to resolve federal allegations that it exposed protected health information of 612,000 people online because of security weaknesses.</p>
<p>&#8220;Anthem does not have a very good track record of protecting the information entrusted to them,&#8221;</p>
<p>&#8220;From dealing with their IT system on the front end as a customer,&#8221; Winton said, &#8220;my impression is they don&#8217;t know what they are doing.&#8221;</p>
<p>&#8220;Healthcare companies like Anthem have got to invest far more effort and resources in data security to regain public trust,&#8221; said Gerald Kominski, director of the UCLA Center for Health Policy Research.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/05/massive-breach-at-health-care-company/comment-page-1/#comment-1341979</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 13 Feb 2015 10:29:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30048#comment-1341979</guid>
		<description><![CDATA[Cost of Anthem&#039;s data breach likely to exceed $100 million
http://www.cnet.com/news/cost-of-anthems-data-breach-likely-to-exceed-100-million/

The US health-insurance provider&#039;s own cyberinsurance policy is likely to be exhausted following the theft of up to 80 million records.

The financial consequences of Anthem&#039;s massive data breach could reach beyond the $100 million mark, according to reports.

The US health-insurance provider&#039;s own cyberinsurance policy covers losses of up to $100 million. However, when a company has up to 80 million current customers, former customers, employees and investors to notify, this amount may not be enough.

According to Anthem CEO Joseph Swedish, the data stolen included client names, dates of birth, physical and email addresses, medical IDs and Social Security numbers. However, the company has said, there is no current evidence to suggest financial information or medical data -- such as test results -- were taken.

According to industry news site Insurance Insider&#039;s sources, Anthem&#039;s cyberinsurance policy -- written by AIG, Lexington, Safehold and Zurich, among others -- could be exhausted due to the &quot;costs of notifying the affected customers.&quot; Anthem plans to notify every individual affected by the cyberattack and has also provided a hotline for those with question. 

Swedish has called the data breach a &quot;very sophisticated external cyberattack.&quot;]]></description>
		<content:encoded><![CDATA[<p>Cost of Anthem&#8217;s data breach likely to exceed $100 million<br />
<a href="http://www.cnet.com/news/cost-of-anthems-data-breach-likely-to-exceed-100-million/" rel="nofollow">http://www.cnet.com/news/cost-of-anthems-data-breach-likely-to-exceed-100-million/</a></p>
<p>The US health-insurance provider&#8217;s own cyberinsurance policy is likely to be exhausted following the theft of up to 80 million records.</p>
<p>The financial consequences of Anthem&#8217;s massive data breach could reach beyond the $100 million mark, according to reports.</p>
<p>The US health-insurance provider&#8217;s own cyberinsurance policy covers losses of up to $100 million. However, when a company has up to 80 million current customers, former customers, employees and investors to notify, this amount may not be enough.</p>
<p>According to Anthem CEO Joseph Swedish, the data stolen included client names, dates of birth, physical and email addresses, medical IDs and Social Security numbers. However, the company has said, there is no current evidence to suggest financial information or medical data &#8212; such as test results &#8212; were taken.</p>
<p>According to industry news site Insurance Insider&#8217;s sources, Anthem&#8217;s cyberinsurance policy &#8212; written by AIG, Lexington, Safehold and Zurich, among others &#8212; could be exhausted due to the &#8220;costs of notifying the affected customers.&#8221; Anthem plans to notify every individual affected by the cyberattack and has also provided a hotline for those with question. </p>
<p>Swedish has called the data breach a &#8220;very sophisticated external cyberattack.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/05/massive-breach-at-health-care-company/comment-page-1/#comment-1341977</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 13 Feb 2015 10:28:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30048#comment-1341977</guid>
		<description><![CDATA[Anthem says hackers had access to customer data back to 2004
http://www.latimes.com/business/la-fi-anthem-data-breach-20150212-story.html

Insurance giant Anthem Inc. said Thursday that hackers had access to customer data going back to 2004 as investigations continue into the massive breach.

The nation&#039;s second-largest health insurer disclosed the new time frame as it prepares to offer two years of free identity-theft protection to millions of affected consumers starting Friday.

Anthem announced last week that hackers infiltrated one of its giant databases containing Social Security numbers, birth dates, addresses and other personal information of up to 80 million Americans across the country.

The Indianapolis-based company said its internal investigation was ongoing and it hadn&#039;t yet determined which customers might have been affected.

&quot;We appreciate the identity-protection services being put into place by Anthem, but reviewing the scope and implications of this event will be a long process,&quot;]]></description>
		<content:encoded><![CDATA[<p>Anthem says hackers had access to customer data back to 2004<br />
<a href="http://www.latimes.com/business/la-fi-anthem-data-breach-20150212-story.html" rel="nofollow">http://www.latimes.com/business/la-fi-anthem-data-breach-20150212-story.html</a></p>
<p>Insurance giant Anthem Inc. said Thursday that hackers had access to customer data going back to 2004 as investigations continue into the massive breach.</p>
<p>The nation&#8217;s second-largest health insurer disclosed the new time frame as it prepares to offer two years of free identity-theft protection to millions of affected consumers starting Friday.</p>
<p>Anthem announced last week that hackers infiltrated one of its giant databases containing Social Security numbers, birth dates, addresses and other personal information of up to 80 million Americans across the country.</p>
<p>The Indianapolis-based company said its internal investigation was ongoing and it hadn&#8217;t yet determined which customers might have been affected.</p>
<p>&#8220;We appreciate the identity-protection services being put into place by Anthem, but reviewing the scope and implications of this event will be a long process,&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/02/05/massive-breach-at-health-care-company/comment-page-1/#comment-1340300</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 10 Feb 2015 11:55:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=30048#comment-1340300</guid>
		<description><![CDATA[Anthem Breach May Have Started in April 2014
http://krebsonsecurity.com/2015/02/anthem-breach-may-have-started-in-april-2014/

Analysis of open source information on the cybercriminal infrastructure likely used to siphon 80 million Social Security numbers and other sensitive data from health insurance giant Anthem suggests the attackers may have first gained a foothold in April 2014, nine months before the company says it discovered the intrusion.

The Wall Street Journal reported last week that security experts involved in the ongoing forensics investigation into the breach say the servers and attack tools used in the attack on Anthem bear the hallmark of a state-sponsored Chinese cyber espionage group known by a number of names, including “Deep Panda,” “Axiom,” Group 72,” and the “Shell_Crew,” to name but a few.

In November 2014, Crowdstrike published a snapshot of a graphic showing the malware and malicious Internet servers used in what security experts at PriceWaterhouseCoopers dubbed the ScanBox Framework, a suite of tools that have been used to launch a number of cyber espionage attacks.

particular address was until very recently the home for a very interesting domain: we11point.com. The third and fourth characters in that domain name are the numeral one, but it appears that whoever registered the domain was attempting to make it look like “Wellpoint,” the former name of Anthem before the company changed its corporate name in late 2014.

We11point[dot]com was registered on April 21, 2014 to a bulk domain registration service in China. Eight minutes later, someone changed the site’s registration records to remove any trace of a connection to China.

“We were able to verify that the evil we11point infrastructure is constructed to masquerade as legitimate Wellpoint infrastructure,” Barger said.

Interestingly, that extcitrix.we11point[dot]com domain, first put online on April 22, 2014, was referenced in a malware scan from a malicious file that someone uploaded to malware scanning service Virustotal.com.

As noted in a story in HealthITSecurity.com, Anthem has been sharing information about the attack with the Health Information Trust Alliance (HITRUST) and the National Health Information Sharing and Analysis Center (NH-ISAC), industry groups whose mission is to disseminate information about cyber threats to the healthcare industry.

But a variety of data points suggest that the same infrastructure used to attack Anthem may have been leveraged against a Reston, Va.-based information technology firm that primarily serves the Department of Defense.

ANALYSIS

Of course, it could well be that this is all a strange coincidence, and/or that the basic information on Deep Panda is flawed. But that seems unlikely given the number of connections and patterns emerging in just this small data set.

It’s remarkable that the security industry so seldom learns from past mistakes. For example, one of the more confounding and long-running problems in the field of malware detection and prevention is the proliferation of varying names for the same threat. We’re seeing this once again with the nicknames assigned to various cyberespionage groups (see the second paragraph of this story for examples).]]></description>
		<content:encoded><![CDATA[<p>Anthem Breach May Have Started in April 2014<br />
<a href="http://krebsonsecurity.com/2015/02/anthem-breach-may-have-started-in-april-2014/" rel="nofollow">http://krebsonsecurity.com/2015/02/anthem-breach-may-have-started-in-april-2014/</a></p>
<p>Analysis of open source information on the cybercriminal infrastructure likely used to siphon 80 million Social Security numbers and other sensitive data from health insurance giant Anthem suggests the attackers may have first gained a foothold in April 2014, nine months before the company says it discovered the intrusion.</p>
<p>The Wall Street Journal reported last week that security experts involved in the ongoing forensics investigation into the breach say the servers and attack tools used in the attack on Anthem bear the hallmark of a state-sponsored Chinese cyber espionage group known by a number of names, including “Deep Panda,” “Axiom,” Group 72,” and the “Shell_Crew,” to name but a few.</p>
<p>In November 2014, Crowdstrike published a snapshot of a graphic showing the malware and malicious Internet servers used in what security experts at PriceWaterhouseCoopers dubbed the ScanBox Framework, a suite of tools that have been used to launch a number of cyber espionage attacks.</p>
<p>particular address was until very recently the home for a very interesting domain: we11point.com. The third and fourth characters in that domain name are the numeral one, but it appears that whoever registered the domain was attempting to make it look like “Wellpoint,” the former name of Anthem before the company changed its corporate name in late 2014.</p>
<p>We11point[dot]com was registered on April 21, 2014 to a bulk domain registration service in China. Eight minutes later, someone changed the site’s registration records to remove any trace of a connection to China.</p>
<p>“We were able to verify that the evil we11point infrastructure is constructed to masquerade as legitimate Wellpoint infrastructure,” Barger said.</p>
<p>Interestingly, that extcitrix.we11point[dot]com domain, first put online on April 22, 2014, was referenced in a malware scan from a malicious file that someone uploaded to malware scanning service Virustotal.com.</p>
<p>As noted in a story in HealthITSecurity.com, Anthem has been sharing information about the attack with the Health Information Trust Alliance (HITRUST) and the National Health Information Sharing and Analysis Center (NH-ISAC), industry groups whose mission is to disseminate information about cyber threats to the healthcare industry.</p>
<p>But a variety of data points suggest that the same infrastructure used to attack Anthem may have been leveraged against a Reston, Va.-based information technology firm that primarily serves the Department of Defense.</p>
<p>ANALYSIS</p>
<p>Of course, it could well be that this is all a strange coincidence, and/or that the basic information on Deep Panda is flawed. But that seems unlikely given the number of connections and patterns emerging in just this small data set.</p>
<p>It’s remarkable that the security industry so seldom learns from past mistakes. For example, one of the more confounding and long-running problems in the field of malware detection and prevention is the proliferation of varying names for the same threat. We’re seeing this once again with the nicknames assigned to various cyberespionage groups (see the second paragraph of this story for examples).</p>
]]></content:encoded>
	</item>
</channel>
</rss>
