Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 7 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Anthem: company says five employee's credentials phished and used

by The Gurus
February 12, 2015
in Editor's News
Share on FacebookShare on Twitter

Hackers who raided health insurance records from Anthem may have been inside the system since December.
According to Associated Press, although the breach was first detected on January 27th when an Anthem computer system administrator discovered outsiders were using his own security credentials to log into the company system and steal data, unauthorised data queries with similar hallmarks started as early as December 10th, and continued sporadically until the 27th of January.
Kristin Binns, a spokeswoman for Anthem said that attempts may also have been made earlier in 2014. She declined to be more specific, saying the matter is still under investigation.
Fred Touchette, senior security analyst of AppRiver, said: “It is very hard to anticipate or predict a custom attack that has been specifically crafted for their targets. In the case of a phishing email, for example, these don’t follow any previously used templates, they’re often typed out by hand as a normal email would and any links used within them contain domains with clean reputations.
“These emails often look just like any other email in the eyes of automation. That is why it is so important for the recipient to be well trained and able to spot these scams if and when they arrive in the inbox (or any other route they may take).”
TK Keanini, CTO of Lancope, told IT Security Guru that this shows that the most advanced threats are in your network with valid credentials, meaning that they are not setting off the normal violation alarms that traditional security products provide.
“It is about turning the network in to a sensor and leveraging Netflow/IPFIX, which acts as a general ledger leaving the adversary nowhere to hide,” he said. “Having the operational visibility on network activity that notifies you when abnormalities happen is task one in this battle against advanced threat.”
Although details of the investigation were not fully disclosed, investigators now believe that the hackers compromised the credentials of five different tech workers, possibly through a phishing scheme.
Rohyt Belani, CEO of PhishMe, dismissed the “five employee” theory as speculation, as the attackers likely targeted more employees.
He said: “Phishing is the #1 attack vector. It is important that organisations don’t get distracted in training their users on other theoretical threats that have little to no impact as such an approach can result in employees getting desensitized to security training in general.
“We have found that the most successful security programs take a threat-oriented approach that provides two to three minutes of micro-education if and when employees are found susceptible during the course of immersive phishing exercises.”
Anthem’s security consultants also said that the breach resulted from a “sophisticated” attack by hackers using techniques usually associated with organised financial crime rings or groups working for the government of some country.
Touchette said: “It is not uncommon for more than one person to be a potential target for these phishing attacks. Also, even though one person was ‘accredited’ for the being the main ‘in’ in the RSA attacks, it’s still possible that more than one person had been targeted and this one person was the one who fell for it.
Mike Spykerman, vice president of product marketing at OPSWAT, said: “In the common attack scenario, the more targets – the bigger chance of success. Though in a targeted attack such as this, the number of targets is kept much lower to avoid raising flags.
“It is very hard to anticipate or predict a custom attack that has been specifically crafted for their targets. In the case of a phishing email, for example, these don’t follow any previously used templates, they’re often typed out by hand as a normal email would and any links used within them contain domains with clean reputations.”
Keanini said: “In many cases, a phishing campaign will ‘cast a large net’ across a specific community so those 5 that are being named are from a large set of targets that are in the hundreds, maybe thousands. The other entitlements these five had versus the others that have been compromised during this campaign. These five would likely have had access to something in the attack continuum.”

FacebookTweetLinkedIn
Tags: attackdata breachPhishingUK
ShareTweet
Previous Post

Dridex Trojan targets UK users and businesses

Next Post

Exclusive: Crimestoppers anonymous reporting website contains no SSL

Recent News

large open office, bright.

Employees Feel 10 Times Calmer in an Environmentally Friendly Office Space

June 7, 2023
Blue Logo OUTPOST24

Outpost24 Acquires EASM Provider Sweepatic

June 7, 2023
Standard post, logos of brands, headshot.

J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry

June 6, 2023
iPad with Anxiety written on it in capitals.

Half of UK Employees Suffer From “Sunday Scaries”

June 6, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information