Skip to Content

Encryption Wouldn’t Have Stopped Anthem’s Data Breach

To prevent breaches companies must strictly control which employees can access sensitive data.
February 10, 2015

The recent data breach at health insurer Anthem saw criminals access the personal details and Social Security numbers of more than 80 million people—the biggest health-care data theft to date. Medical and payment data was not compromised, but the names, addresses, birthdays, and Social Security numbers accessed can be used by criminals to commit various types of fraud.

Many people have been surprised to hear that this sensitive data was not encrypted and that the federal mandate for securing health-related data, HIPAA, does not require it to be. In fact, HIPAA only “strongly encourages” encryption. Organizations that choose not to use encryption are supposed to document the reasons why not and implement an “equivalent alternative measure if reasonable and appropriate.” The vagueness of this requirement is the crux of class action and other lawsuits being filed against Anthem.

But even if Anthem had used encryption, the data could have still have been compromised. Encryption is just one part of the arsenal that organizations need to deploy to secure sensitive data. Encryption is great for securing data in transit and at rest, but if the credentials and keys are compromised it does little to protect the data.

The bigger issue in many breaches is that organizations haven’t properly implemented data access security controls. They need to have safeguards in place in case attackers can bypass perimeter defenses and compromise administrator level credentials.

This is precisely what happened to Anthem, which says its attackers gained access to at least five sets of employee credentials.

It’s ridiculously easy for cybercriminals to find the information they need to compromise almost any organization. A quick look at Anthem job postings and LinkedIn profiles was enough for me to identify the software Anthem uses for its data warehouse.

From there, I could easily identify more than 100 people, such as system architects and database administrators, who would have privileged access to the data warehouse storing tens of millions of sensitive personal records. This was probably the first thing Anthem’s attackers researched before conducting a phishing campaign to distribute the malware used to harvest employee credentials.

An attacker who can compromise a system via the credentials of a user with administrator-level access to the data warehouse can easily steal more credentials, find monetizable information, and exfiltrate unencrypted data.

So what should organizations do to secure sensitive customer data? Sophisticated attackers with enough time and resources can get into any organization eventually. Cybercriminals are fully aware of the constant trade-offs that organizations make to balance security with operational efficiency, and they’ve repeatedly demonstrated that they’re fully capable of exploiting even tiny security weaknesses.

Anthem won’t be the last health-care organization to suffer a massive breach. Just as with retail, many organization will be targeted, since security weaknesses are often shared across an entire industry. Health-care organizations need to reëvaluate their security practices in light of the Anthem breach to ensure that they have appropriate security controls in place to protect their networks.

Ken Westin is a senior security analyst specializing in cybercrime and threat intelligence for computer security company Tripwire Inc.

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

The problem with plug-in hybrids? Their drivers.

Plug-in hybrids are often sold as a transition to EVs, but new data from Europe shows we’re still underestimating the emissions they produce.

Google DeepMind’s new generative model makes Super Mario–like games from scratch

Genie learns how to control games by watching hours and hours of video. It could help train next-gen robots too.

How scientists traced a mysterious covid case back to six toilets

When wastewater surveillance turns into a hunt for a single infected individual, the ethics get tricky.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.