The Anthem medical data breach was a medical data breach of information held by Anthem Inc.
On February 4, 2015, Anthem, Inc. disclosed that criminal hackers had broken into its servers and potentially stolen over 37.5 million records that contain personally identifiable information from its servers. On February 24, 2015 Anthem raised the number to 78.8 million people whose personal information was affected.  According to Anthem, Inc., the data breach extended into multiple brands Anthem, Inc. uses to market its healthcare plans, including, Anthem Blue Cross, Anthem Blue Cross and Blue Shield, Blue Cross and Blue Shield of Georgia, Empire Blue Cross and Blue Shield, Amerigroup, Caremore, and UniCare. Healthlink says it was also a victim. Anthem says the medical information and financial data was not compromised. Anthem has offered free credit monitoring in the wake of the breach. According to Bloomberg News, China may be responsible for this data breach. Michael Daniel, chief adviser on cybersecurity for President Barack Obama, said he would be changing his own password. According to The New York Times about 80 million company records were hacked, and there is fear that the stolen data will be used for identity theft.  The compromised information contained names, birthdays, medical IDs, social security numbers, street addresses, e-mail addresses and employment information, including income data.
Theft of the data
Anthem was not required by law to encrypt the data. Anthem could face civil lawsuits for not having this data encrypted.
The data was stolen over a period of weeks the month before the data breach was discovered.
Use of the data
Data from the attack is expected to be sold on the black market.
Persons whose data was stolen could have resulting problems about identity theft for the rest of their lives. Anthem had a US$100 million insurance policy for cyber problems from American International Group. One report suggested that all of this money could be consumed by the process of notifying customers of the breach.
Anthem advised people whose data was stolen to monitor their accounts and remain vigilant.
Anthem retained Mandiant to review their security systems.
The theft of the data raised fears generally about the theft of medical information. A writer from Harvard Law School suggested that this data breach might spark reform of security practices and government data safety regulation.
An investigation conducted by several state insurance commissioners blames the breach on an attacker whose identity was withheld, and claims that the breach was likely ordered by a foreign government whose name was withheld. It also concluded that Anthem had taken reasonable measures to protect its data before the breach and that its remediation plan was effective at shutting down the breach once it was discovered. It also marks the starting date of the breach as February 18, 2014.
- ^ Riley, Charles (4 February 2015). "Insurance giant Anthem hit by massive data breach". cnn.com. Retrieved 20 February 2015.
- ^ Mathews, Anna (24 February 2015). "Anthem: Hacked Database Included 78.8 Million People". cnn.com. Retrieved 24 February 2015.
- ^ "Data Breach at Health Insurer Anthem Could Impact Millions — Krebs on Security". krebsonsecurity.com.
- ^ "Healthlink homepage". healthlink.com. Center of page; even the Anthem page doesn't reference Healthlink. Retrieved 10 February 2015.
- ^ Pepitone, Julianne. "Anthem Hack: Credit Monitoring Won't Catch Medical Identity Theft". NBC News. Retrieved 5 February 2015.
- ^ Michael A Riley (5 February 2015). "Chinese State-Sponsored Hackers Suspected in Anthem Attack". Bloomberg.com.
- ^ Abelson, Reed; Goldstein, Matthew (5 February 2015). "Anthem Hacking Points to Security Vulnerability of Health Care Industry". The New York Times.
- ^ Weise, Elizabeth (5 February 2015). "Massive breach at health care company Anthem Inc.". USA Today. McLean, VA: Gannett. ISSN 0734-7456. Retrieved 20 February 2015.
- ^ Mathews, Anna; Yadron, Danny (4 February 2015). "Health Insurer Anthem Hit by Hackers - WSJ". wsj.com. Retrieved 20 February 2015.
- ^ Whitney, Lance (6 February 2015). "Anthem's stolen customer data not encrypted - CNET". cnet.com. Retrieved 20 March 2015.
- ^ Zetter, Kim (5 February 2015). "Health Insurer Anthem Is Hacked, Exposing Millions of Patients' Data | WIRED". wired.com. Retrieved 20 February 2015.
- ^ Zetter, Kim (5 February 2015). "Health Insurer Anthem Is Hacked, Exposing Millions of Patients' Data". wired.com. Retrieved 20 February 2015.
- ^ Murphy, Tom; Bailey, Brandon (6 February 2015). "Why hackers are targeting the medical sector". bostonglobe.com. Retrieved 20 February 2015.
- ^ Rudavsky, Shari (7 February 2015). "Anthem data breach could be 'lifelong battle' for customers". indystar.com. Retrieved 20 February 2015.
- ^ a b Osborne, Charlie (12 February 2015). "Anthem data breach cost likely to smash $100 million barrier | ZDNet". ZDNet. Retrieved 20 February 2015.
- ^ Popken, Ben; Grant, Kelli (6 February 2015). "Anthem Breach: What Should I Do Right Now?". nbcnews.com. Retrieved 20 February 2015.
- ^ McNeal, Gregory S. (4 February 2015). "Health Insurer Anthem Struck By Massive Data Breach". forbes.com. Retrieved 20 February 2015.
- ^ Terhune, Chad (5 February 2015). "Anthem hack raises fears about medical data - LA Times". Los Angeles Times. Los Angeles: Tribune Co. ISSN 0458-3035. Retrieved 20 February 2015.
- ^ Abelson, Reed; Creswellfeb, Julie (6 February 2015). "Data Breach at Anthem May Forecast a Trend - NYTimes.com". The New York Times. New York: NYTC. ISSN 0362-4331. Retrieved 20 February 2015.
- ^ Terry, Nicholas (7 February 2015). "Time for a Healthcare Data Breach Review? | Bill of Health". blogs.law.harvard.edu. Petrie-Flom Center for Health Law Policy at Harvard Law School. Retrieved 20 February 2015.
- ^ a b c "Investigation of major Anthem cyber breach reveals foreign nation behind breach" (Press release). Sacramento, California: California Department of Insurance. 2017-01-17. Retrieved 2017-02-16.
- AnthemFacts, Anthem's own website for supporting its customers whose data had been breached