A breach on a massive scale used to steal tens of millions of personal identification information (PII). How did it happen and what can be learned?

Especially of concern is that Anthem reports that Social Security numbers have been stolen, along with names, date of birth, email, phone number, employment and address details. This level of information is more than enough to easily perpetrate far-reaching identity theft of the individuals affected, potentially causing years of disruption and inconvenience to those affected.

The breach is being investigated now so a fuller picture will become apparent over the coming days. The forensic investigator – believed to be Mandiant – has stated the attack is ‘sophisticated’ and ‘used advanced, custom tools’.

One detail that has been reported is that the breach was first detected by a DBA seeing a suspicious database query run under his user ID. This implies that valid user credentials have been compromised, potentially providing open access to database systems.

As to how the credentials were stolen, or how the hackers were able to access a secure, internal database system is as yet unknown. Likely attack vectors are malware introduced via a phishing attack, allowing user credentials to be logged and reported back to the hackers, or 3rd party access being hijacked. This was a factor in the Target breach when access credentials provided to a 3rd party HVAC service provider were used to gain remote access to Target systems.

By way of a conclusion, it shows that not all breaches are being used to steal payment card details and that any organizations handling personal information for customers need to assume that they will be subject to a cyber attack in the future. Defending against attacks requires a multi-layered approach, and with as much emphasis on Breach Detection as defense.

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.