Anthem: The victim of a dexterous cyber hack

Anthem inc. formerly known as WellPoint is the largest company in the Blue Cross and Blue Shield Association. It has been the victim of a serious cyber attack. The Hackers gained “unauthorized access” to its servers and stole personal information including medical identification and Social Security numbers. American health insurer Anthem claimed that they were the victims of a very dexterous hack. And, after miscreants looted Anthem’s servers and accessed up to 88.8 million private records.

The Office of the Inspector General (OIG) for the US Office of Personnel Management (OPM) wanted to audit Anthem’s information security protections but they turned down. According to the agency, Anthem participates in the US Federal Employees Health Benefits Program, which requires regular audits from the OIG but Anthem continuously ignored these audits.

Now the question arises whether Anthem should be blamed for acting negligently in protecting data. According to U.S. Federal Trade Commission, Anthem failed to institute industry “best practices” as defined by the industry.

Avivah Litan, a cyber security analyst at Gartner, said that she does not think that Anthem should be blamed for the stolen data. As there is a conviction that hackers always will be able to break into secure systems.
Anthem informed their customers to make it tough for the attackers to sell and exploit the data. Customers are now aware so they won’t make any attempt to use their information.

The hackers have access to the customers’ name, date of birth, and address. They can take all the information and use it for creating fake driving license and commit a crime. Regulators must take into account such technologies as they pursue to figure out how to make the customer data secure.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Blind SQL Injection Tutorial to Hack a Website

In the previous article, we have the basics of SQL Injection; what SQLi is and what are the types of SQL injection. And, In...

What is SQL Injection? Tutorial: Type and Example

What is SQL injection, and what are the types of SQL injection? These are the common questions, and we will seek the answer to...

Are Cisco 300-410 Exam and Its Related Certification Your Pathway to Career Success? Find Out about This

Introduction Career success can mean different things to different people. For some, it could mean having a prestigious title and for others, it could be...

How to Hack Windows 10 Password Using FakeLogonScreen in Kali Linux

This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic and...