Today's big story is the data breach Anthem, Inc., the second largest health insurance carrier in the United States, disclosed last night. Nearly 80M individuals' records were compromised, and industry observers are saying the incident has the potential to be the largest insurance breach in history.
The attack is thought to have begun on December 8, 2014, with Anthem discovering and reporting "suspicious activity" on January 28, 2015. Anthem's CEO, Joseph R. Swedish, says there was "unauthorized access" to members' personal information including "names, birthdays, medical IDs/social security numbers, street addresses, email addresses and employment information, including income data." He adds, "Based on what we know now, there is no evidence that credit card or medical information, such as claims, test results or diagnostic codes were targeted or compromised."
Anthem has hired FireEye's Mandiant unit to investigate. The FBI is conducting a criminal investigation, and the Bureau praises how Anthem has handled the incident, calling it a model others might follow. (Wired pointedly asks whether the compromised data were encrypted, suggesting there might be a painful teaching example here as well.)
PawnStorm continues to attack iOS.
Sony says it expects to spend a total of $35M fixing its networks (about $15M of that will go to investigation and remediation).
The Anthem incident will reinforce the push, already underway, for the maturation of the cyber insurance market. It's also prompting renewed efforts in the US House to facilitate cyber threat information sharing.
Ross Ulbricht is found guilty in the Silk Road trial.
Today's issue includes events affecting Australia, Canada, New Zealand, Thailand, United Kingdom, United States.
Frequently Asked Questions: Learn more about the cyber attack against Anthem(Anthem, Inc.) Was my information accessed? Anthem is currently conducting an extensive IT Forensic Investigation to determine what members are impacted. We are working around the clock to determine how many people have been impacted and will notify all Anthem members who are impacted through a written communication
Health insurer Anthem hit by massive cybersecurity breach(Reuters) Health insurer Anthem Inc (ANTM.N), which has nearly 40 million U.S. customers, said late on Wednesday that hackers had breached one of its IT systems and stolen personal information relating to current and former consumers and employees
US health insurer Anthem suffers massive data breach(Help Net Security) Anthem, the second-largest health insurer in the United States, has suffered a data breach that may turn out to be the largest health care breach to date, as the compromised database holds records of some 80 million individuals
The Growing Problem of Medical Identity Theft(IBM Security Intelligence) Medical identity theft (MIT) has become a major fraud issue over the past several years. However, most consumers may not be aware of the threats it poses. Unlike traditional financial crimes such as credit card or check fraud, which rarely involves anything more than a loss of money, the consequences of MIT can involve physical harm or potential loss of life
Ransomware isn't a serious threat says threat intelligence firm(CSO) Emails containing malicious links are spreading under the pretense that they offer access to updated versions of Google's Chrome browser. But instead of a new browser, victims are being directed to copies of a Ransomware variant known as Critroni (CTB-Locker)
Hacked Hotel Phones Fueled Bank Phishing Scams(KrebsOnSecurity) A recent phishing campaign targeting customers of several major U.S. banks was powered by text messages directing recipients to call hacked phone lines at Holiday Inn locations in the south. Such attacks are not new, but this one is a timely reminder that phishers increasingly are using lures blasted out via SMS as more banks turn to text messaging to communicate with customers about account activity
How vulnerable is satellite broadband?(SC Magazine) Cyber communications are vulnerable to both cyber-attack and kinetic attacks on physical infrastructure, with satellites potentially at risk says new report
Security Patches, Mitigations, and Software Updates
Insurance, Finance Step Up Cybercrime Fight(InsuranceNewsNet) The insurance and financial industries are stepping up the fight against cybercrime by urging more intelligence sharing and warning companies of the growing risks
The real challenge of the Internet of Things(Help Net Security) More than 40 percent of organizations expect the Internet of Things (IoT) to transform their business or offer significant new revenue or cost-savings opportunities in the short term (over the next three years), rising to 60 percent in the long term (more than five years), according to Gartner, Inc. However, those surveyed said that many of their organizations have not established clear business or technical leadership for their IoT efforts
Cyber insurance becomes the new cost of doing business(FierceCIO) It's no secret that nearly all organizations have grown fearful of a data breach. And in many cases the greatest fears are those known to the company — business partners, external customers and internal employees
Army turns to commercial partners to keep ISR edge(C4ISR & Networks) Facing both shrinking research and development budgets and a need to adopt faster and more flexible ISR network technologies, such as software-defined networks (SDNs), the Army is now looking to its commercial partners for assistance in developing innovative solutions
RSA Executive Chairman Art Coviello To Retire(CNN money) The Security Division of EMC (NYSE:EMC), today announced Art Coviello's decision to retire from his post as Executive Chairman of RSA and Executive Vice President of EMC for health reasons effective February 28, 2015. Through a transition period, Mr. Coviello will serve as strategic advisor to RSA President Amit Yoran, who will remain in his current role while also assuming Mr. Coviello's responsibilities
Products, Services, and Solutions
VMware NSX: A Cloud Pitch To Sell SDN(InformationWeek) Software defined networking is key to VMware's data center ambitions, so it's selling NSX-as-a-service through the vCloud Air public cloud
From Castles to Beer: A different approach to cyber security(Federal Times) In the 11th century, England witnessed an extensive castle building program by William the Conqueror who built some of the first castles made from stone. By the 13th century, the design of castles evolved to a "defense in depth" approach that included constructing a series of concentric walls around the castles. The concentric walls were designed to slow the invading forces and enable the early detection of the invaders
Who are the role models in cyberspace?(Help Net Security) Those of us of who are of a certain age learned how to live our life by playing with our toys — our cars, dolls and, of course, Star Wars action figures
Science and tech chiefs: Stop erosion of U.S. tech superiority(Navy Times) Science and technology chiefs for each service and the Defense Advanced Research Projects Agency urged a united effort with military, academia and industry to develop a "new technology offset" that will reverse the loss of technological superiority and overcome the resulting erosion of operational capabilities
Codebreaking Materials Devised by Turing Discovered(I Programmer) During restoration work at Bletchley Park, papers which had been stuffed between the roof rafters to act as insulation were discovered and found to include unique surviving examples of Banbury Sheets
Legislation, Policy, and Regulation
Big Brother is watching Thailand(CSO) I first read George Orwell's book, 1984 many years ago. I remember thinking that was such a horrible idea and it couldn't possibly come to pass. But, the more I read the news in the last year alone I see a shift taking place
Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise(Intercept) The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents
SecDef Nominee: Cyber threats require holistic defense strategy(Federal Times) As cyberspace becomes an ever more integrated part of daily life, cybersecurity has become a central part of the national defense. Acknowledging this, Defense Secretary nominee Ash Carter was asked several pointed questions about cyber threats and creating a framework for appropriate responses to attacks
Full budget details on cyber, cloud, networks(C4ISR & Networks) The Defense Department's ongoing move to enterprise-wide IT services got a boost in the form of President Barack Obama's proposed 2016 defense budget, with the Pentagon's leading enterprise IT effort receiving more than a six-fold increase in spending
Security-Cleared Population Drops by 10%(Federation of American Scientists) The number of people who hold security clearances for access to classified information has been reduced by ten percent, the White House said in budget request documents released this week
Litigation, Investigation, and Law Enforcement
Canary Watch now legally tracks secret NSA and FBI national security data requests(Techspot) Most major internet services and social networks claim to be as transparent as possible regarding user privacy, but there are times when legal issues prevent them from doing so. Data requests from the likes of the NSA and FBI in many cases come along with stipulations that stop sites from disclosing details about what and when information is given to the government. But now a new site known as Canary Watch claims to have figured some of that out
Apple Security Talks & Craft Beer(Laurel, Maryland, USA, May 8, 2015) The world's first security summit held at a production brewery. Join some of the world's best Apple security researchers as they talk about iOS, OS X, Apple hardware and other Apple-related security topics...
7th International Conference on Cyber Conflict(Tallinn, Estonia, May 26 - 29, 2015) CyCon is the annual NATO Cooperative Cyber Defence Centre of Excellence conference where topics vary from technical to legal, strategy and policy. The pre-conference workshop day, 26 May, features a variety...
Cyber Threat Intelligence Summit(Washington, DC, USA, February 2 - 9, 2015) Join SANS for this innovative event as we focus on enabling organizations to build effective cyber threat intelligence analysis capabilities
ICSS 2015: International Cyber Security Strategy Congress(Leuven, Belgium, February 4 - 5, 2015) ICSS2015 will present the latest developments and thoughts in the field of cybercrime and cybersecurity and will be a unique gathering of cybercrime experts from all over the world. The objective of the...
Suits and Spooks(Washington, DC, USA, February 4 - 5, 2015) Suits and Spooks DC (Feb 4-5, 2015) is moving to the Ritz Carlton hotel in Pentagon City! We're expanding our attendee capacity to 200 and for the first time will be including space for exhibitors. We...
Nullcon 2015(Goa, India, February 4 - 7, 2015) Nullcon discusses and showcase the future of information security, next-generation of offensive and defensive security technology as well as unknown threats
Salt Lake City Tech-Security Conference(Salt Lake City, Utah, USA, February 5, 2015) The Salt Lake City Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security,...
ICISSP 2015(Angers, Loire Valley, France, February 9 - 11, 2015) The International Conference on Information Systems Security and Privacy aims at creating a meeting point of researchers and practitioners that address security and privacy challenges that concern information...
2015 Cyber Risk Insights Conference — London(London, England, UK, February 10, 2015) The cyber threat landscape is undergoing rapid change. Lloyd's and the London market are at the forefront of developing insurance products to address the evolving exposures of organizations throughout...
AFCEA West 2015(San Diego, California, USA, February 10 - 12, 2015) Showcasing emerging systems, platforms, technologies and networks that will impact all areas of current and future Sea Service operations.
DEFCON | OWASP International Information Security Meet(Lucknow, India, February 22, 2015) Defcon | OWASP Lucknow International Information Security Meet is a combined meet of Defcon and OWASP Lucknow. Defcon Lucknow is a DEF CON registered convention for promoting, demonstrating & spreading...
10th Annual ICS Security Summit(Orlando, Florida, USA, February 22 - March 2, 2015) Attendees come to the Summit to learn and discuss the newest and most challenging cyber security risks to control systems and the most effective defenses. The Summit is designed so you leave with new tools...
Workforce Development Forum — CyberWorks Information Session(Baltimore, Maryland, USA, February 24, 2015) Are you a technology company that would like to actively participate in growing the right candidates for your open IT and cybersecurity positions? Are you a job seeker interested in pursuing a career in...
Cybersecurity: You Don't Know What You Don't Know(Birmingham, Alabama, USA, February 24 - 25, 2015) What: Connected World Conference in partnership with University of Alabama at Birmingham's Center for Information Assurance and Joint Forensics Research (The Center) have teamed up to bring professionals...
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.