• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Anthem Hacked – US Health Insurance Provider Leaks 70 Million Records

February 5, 2015

Views: 2,450

Anthem Hacked! Everyone is screaming, I was like WTF is Anthem? Turns out it’s part of the 2nd largest health insurance provider in the US (Wellpoint) after United Healthcare – so it’s a pretty big deal with an estimated 70 Million people on its books.

Anthem Hacked - US Healthcare Provider Leaks Millions of Records

Of course according to them, “Anthem was the target of a very sophisticated external cyber attack” – yah, probably just a phishing e-mail or something right?

Hackers have invaded the servers of Anthem, a health insurer used by tens of millions of Americans, and stolen social security numbers, employment records, personal contact details and more. A veritable treasure trove for identity thieves.

Anthem, the US’s second biggest health insurer with about 70 million people on its books across the country, admitted late on Wednesday, Pacific time, that it has been comprehensively ransacked by criminals. Tens of millions of records are likely to have been obtained illegally as a result of the hack, Anthem warned.

If your plan is branded Anthem Blue Cross; Anthem Blue Cross and Blue Shield; Blue Cross and Blue Shield of Georgia; Empire Blue Cross and Blue Shield; Amerigroup; Caremore; Unicare; Healthlink; or DeCare, you are at risk – your data may have been taken by thieves.

Former Anthem customers are just as affected, we’re told. Jackpot.

The health giant, based in Indianapolis, has hired infosec biz Mandiant to work out which customers have had their files accessed. According to this official FAQ, “no diagnosis or treatment data was exposed” nor any credit card information.

It is not clear when the company’s databases were infiltrated nor precisely when the compromise was detected – just that it was discovered some time last week. Staff with high-level access to the IT systems have had their passwords reset, and those using single-factor authentication locked out, we’re told.

People whose records were slurped by the hackers will be warned by mail in the following days. Anthem is offering free credit and identity-theft monitoring cover to those hit by the network security breach.

If the statement by Anthem is true though, it’s not THAT bad for them as they haven’t lost any payment details (credit card numbers etc.) or any medical records. But identity theft wise it’s quite bad as they’ve lost names, social security numbers, addresses, contact details and so on.

As usual there’s no details on what actually went down, was this really a hack? Database compromise? Deep system access? Or access via vendor, or disgruntled employee? Not sure if we’ll ever get to learn more – but it’s happened.

As yet, no one is saying publicly who is behind the attack nor how they managed to infiltrate Anthem’s networks. The insurer says it is “doing everything it can to ensure there is no further vulnerability to its database warehouses.”

Register staff are among those at risk: Anthem Blue Cross is our healthcare insurer in California. Tonight, we received this email from Anthem CEO Joseph Swedish:

Anthem Blue Cross was the target of a very sophisticated external cyber attack. These attackers gained unauthorized access to Anthem’s IT system and have obtained personal information from our current and former members such as their names, birthdays, medical IDs/social security numbers, street addresses, email addresses and employment information, including income data.

Based on what we know now, there is no evidence that credit card or medical information (such as claims, test results or diagnostic codes) were targeted or compromised.

“Anthem’s own associates’ personal information – including my own – was accessed during this security breach. We join you in your concern and frustration, and I assure you that we are working around the clock to do everything we can to further secure your data,” the chief exec added.

“I want to personally apologize to each of you for what has happened, as I know you expect us to protect your information.”

Indeed we did. Popping a huge healthcare insurer was only a matter of time: the data will be worth a pretty penny, and all of it sitting there, conveniently in one place, just waiting to be seized.

They have set up a dedicated website http://www.anthemfacts.com/ (that doesn’t even have a TITLE tag..) for some info or call 1-877-263-7995 – the FBI is already investigating. Maybe it was the Koreans?

We shall keep our ears open for developments on this as it’s a BIG leak – it’d be great to get some technical details of what went down.

Source: The Register

Related Posts:

  • Malaysia Telco Hack - Corporations Spill 46 Million Records
  • Deepfake-as-a-Service 2025 - How Voice Cloning and…
  • Uber Paid Hackers To Hide 57 Million User Data Breach
  • An Introduction To Web Application Security Systems
  • Massive Yahoo Hack - 500 Million Accounts Compromised
  • Ransomware-as-a-Service Economy - Trends, Targets…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Privacy, Web Hacking



Reader Interactions

Comments

  1. Sandeep says

    February 9, 2015 at 9:52 pm

    Fingers are being pointed at Deep Panda too.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Reconnoitre - Open-Source Reconnaissance and Service Enumeration Tool

Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool

Views: 306

Reconnoitre is an open-source reconnaissance tool that automates multithreaded information gathering … ...More about Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool

Scanners-Box - Open-Source Reconnaissance and Scanning Toolkit

Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit

Views: 480

Scanners-Box is an open-source, community-curated collection of scanners and reconnaissance … ...More about Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit

Red Teaming LLMs 2025 - Offensive Security Meets Generative AI

Red Teaming LLMs 2025 – Offensive Security Meets Generative AI

Views: 516

As enterprises deploy large language models (LLMs) at scale, the offensive security discipline of … ...More about Red Teaming LLMs 2025 – Offensive Security Meets Generative AI

gitlab-runner-research - PoC for abusing self-hosted GitLab runners

gitlab-runner-research – PoC for abusing self-hosted GitLab runners

Views: 335

gitlab-runner-research is a proof-of-concept repository and write-up that demonstrates how attackers … ...More about gitlab-runner-research – PoC for abusing self-hosted GitLab runners

mcp-scanner - Python MCP Scanner for Prompt-Injection and Insecure Agents

mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents

Views: 582

mcp-scanner is an open-source Python tool that scans Model Context Protocol (MCP) servers and agent … ...More about mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents

Deepfake-as-a-Service 2025 - How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Views: 670

Deepfake operations have matured into a commercial model that attackers package as … ...More about Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (231)
  • Cryptography (85)
  • Dark Web (4)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (12)
  • Hacker Culture (10)
  • Hacking News (236)
  • Hacking Tools (708)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,394,913)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,813)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,292)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,141)
  • Password List Download Best Word List – Most Common Passwords (934,345)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,066)
  • Hack Tools/Exploits (673,983)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,050)

Search

Recent Posts

  • Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool November 10, 2025
  • Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit November 7, 2025
  • Red Teaming LLMs 2025 – Offensive Security Meets Generative AI November 5, 2025
  • gitlab-runner-research – PoC for abusing self-hosted GitLab runners November 3, 2025
  • mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents October 31, 2025
  • Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses October 29, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy