California Dept. of Insurance: Anthem Breach Caused by Foreign Nation | Healthcare Informatics Magazine | Health IT | Information Technology Skip to content Skip to navigation

California Dept. of Insurance: Anthem Breach Caused by Foreign Nation

January 11, 2017
by Rajiv Leventhal
| Reprints

Examination findings from the 2015 cybersecurity breach of health insurance giant Anthem Inc., which compromised 78.8 million consumers' records, have revealed that very likely, “the cyber attacker was acting on behalf of a foreign government,” according to the California Department of Insurance.

The cyber breach was first discovered by Anthem on Jan. 27, 2015. In early February 2015, Anthem and its affiliates announced the company had suffered a major breach, which compromised 78.8 million consumer records, including records of at least 12 million minors.

An investigation by the insurance commissioners' examination team and a separate internal investigation by Mandiant, an information security firm hired by Anthem, revealed the data breach began on Feb. 18, 2014, when a user within one of Anthem's subsidiaries opened a phishing email containing malicious content. Opening the email permitted the download of malicious files to the user's computer and allowed hackers to gain remote access to that computer and at least 90 other systems within the Anthem enterprise, including Anthem's data warehouse.

Anthem agreed to make a number of enhancements to its information security systems, and also agreed to provide credit protection to all consumers whose information was compromised. Anthem is paying more than $260 million dollars for security improvements and remedial actions in response to this breach. California Insurance Commissioner Dave Jones was one of seven insurance commissioners leading the national investigation of the Anthem cyber breach.

"This was one of the largest cyber hacks of an insurance company's customer data," Jones said in a statement last week. "Insurers have an obligation to make sure consumers' health and financial information is protected. Insurance commissioners required Anthem to take a series of steps to improve its cybersecurity and provide credit protection for consumers affected by the breach.”

Jones added, “In this case, our examination team concluded with a significant degree of confidence that the cyber attacker was acting on behalf of a foreign government. Insurers and regulators alone cannot stop foreign government assisted cyber attacks. The United States government needs to take steps to prevent and hold foreign governments and other foreign actors accountable for cyber attacks on insurers, much as the President did in response to Russian government sponsored cyber hacking in our recent presidential election.”

The lead insurance commissioners employed an examination team composed of the cybersecurity firm CrowdStrike and Alvarez & Marsal Insurance and Risk Advisory Services, LLC. The team focused its investigation on Anthem's pre-breach response preparedness, the company's response adequacy at the time of the breach, and their post-breach response and corrective actions.

The team found Anthem had taken reasonable measures prior to the data breach to protect its data and employed a remediation plan resulting in a rapid and effective response to the breach once it was discovered. The team noted Anthem's exploitable vulnerabilities, worked with Anthem to develop a plan to address those vulnerabilities, and conducted a penetration test exercise to validate the strength of Anthem's corrective measures. As a result, the team found Anthem's improvements to its cybersecurity protocols and planned improvements were reasonable.

The team determined with a high degree of confidence the identity of the attacker and concluded with a medium degree of confidence that the attacker was acting on behalf of a foreign government. Notably, the exam team also advised that previous attacks associated with this foreign government have not resulted in personal information being transferred to non-state actors.

Get the latest information on Cybersecurity and attend other valuable sessions at this two-day Summit providing healthcare leaders with educational content, insightful debate and dialogue on the future of healthcare and technology.

Learn More

Topics

News

Digital Health Venture Capital Funding Tops $4 Billion in First Half of 2017

Global venture capital (VC) funding for health IT companies in the first half of 2017 was 36 percent higher year-over-year with a record $4 billion raised in 359 deals versus the $3 billion raised from 286 deals in the first half of 2016, according to a report from Mercom Capital Group.

Survey: 76 Percent of Health IT Execs Confident that IoT Devices are Protected

A survey of IT decision-makers within the healthcare industry found that the majority of IT departments believe that existing security solutions for laptops and servers can also protect connected Internet of Things (IoT) medical devices.

Report: Clinical Decision Support Market to Reach $4.97B by 2021

A changing healthcare landscape that includes a shift to value-based reimbursement will transform the clinical decision support systems market in the U.S., according to a report from Frost & Sullivan.

Ed Marx Named as Next Cleveland Clinic CIO

The Cleveland Clinic has hired Edward Marx, a notable experienced health IT leader, to be its chief information officer (CIO), effective Sept. 1.

Baylor, Geisinger Partner on Diagnostic Safety Lab

Baylor College of Medicine researchers are teaming with integrated health system Geisinger to develop a systematic approach to measure and improve diagnostic performance.

Report: Epic Far Outperforms Other Practice Management Vendors in Overall Satisfaction

A new report from Orem, Utah-based KLAS Research finds that practice management (PM) solutions vendors are struggling to provide consistent experience across practice size.