NOT FOR REPRINT
Page Printed from: propertycasualty360.com/author/profile/jordan-robertson-bloomberg/
The attack may be part of a growing number of breaches where hackers post large stolen databases to embarrass companies and shame them for having poor security or other perceived transgressions.
Sabre confirmed that its systems were breached recently, while American Airlines said it is investigating whether hackers had entered its computers.
The previously unreported breach adds airlines to a growing list of strategic U.S. industries and institutions that have been compromised.
Some investigators suspect the attacks were part of a sweeping campaign to create a database on Americans that could be used to obtain commercial and government secrets.
It's a seller's market for the cyber war's special forces.
The hackers who infiltrated Anthem made off with one of the most prized possessions in computer crime: the Social Security numbers of as many as 80 million customers of the nations second-biggest health insurer.
Investigators of Anthem Inc.s data breach are pursuing evidence that points to Chinese state-sponsored hackers who are stealing personal information from health-care companies for purposes other than pure profit.
Sony was warned a year ago that hackers had infiltrated its network and were stealing gigabytes of data several times a week.
As cyber expands, so do the breaches.
The U.S. Department of Homeland Security said malware called BlackEnergy was used to access digital systems that control water treatment facilities and parts of the electrical grid.
{ "author": { "name": "Jordan Robertson Bloomberg", "webUrl": "/author/profile/jordan-robertson-bloomberg/", "description": "", "imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g", "estimate": 11, "social": [], "articles": [ { "uri": "/2016/04/28/worlds-third-largest-gold-company-hit-by-hackers-scope-of-data-breach-under-investigation/", "title": "World's third-largest gold company hit by hackers, scope of data breach under investigation", "byline": "Jordan Robertson, Bloomberg, Gerrit De Vynck, Danielle Bochove", "kicker": "News", "prettyDate": "April 28, 2016", "timeToRead": "3 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/jordan-robertson-bloomberg-gerrit-de-vynck-danielle-bochove/", "name": "Jordan Robertson, Bloomberg, Gerrit De Vynck, Danielle Bochove" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "The attack may be part of a growing number of breaches where hackers post large stolen databases to embarrass companies and shame them for having poor security or other perceived transgressions.", "body": null }, { "uri": "/2015/08/07/american-airlines-sabre-allegedly-hit-in-hacks-backed-by-china/", "title": "American Airlines, Sabre allegedly hit in hacks backed by China", "byline": "Jordan Robertson, Bloomberg, Michael Riley, Bloomberg", "kicker": "News", "prettyDate": "August 07, 2015", "timeToRead": "7 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/jordan-robertson-bloomberg-michael-riley-bloomberg/", "name": "Jordan Robertson, Bloomberg, Michael Riley, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "Sabre confirmed that its systems were breached recently, while American Airlines said it is investigating whether hackers had entered its computers.", "body": null }, { "uri": "/2015/07/29/hackers-that-hit-u-s-office-of-personnel-managemen/", "title": "Hackers that hit U.S. Office of Personnel Management said to breach United Airlines", "byline": "Michael Riley, Bloomberg, Jordan Robertson, Bloomberg", "kicker": "News", "prettyDate": "July 29, 2015", "timeToRead": "6 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/michael-riley-bloomberg-jordan-robertson-bloomberg/", "name": "Michael Riley, Bloomberg, Jordan Robertson, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "The previously unreported breach adds airlines to a growing list of strategic U.S. industries and institutions that have been compromised.", "body": null }, { "uri": "/2015/07/13/the-vast-cyber-attack-in-washington-began-with-travel-reservations/", "title": "The vast cyber attack in Washington began with travel reservations", "byline": "Chris Strohm, Bloomberg, Michael Riley, Bloomberg, Jordan Robertson, Bloomberg", "kicker": "News", "prettyDate": "July 13, 2015", "timeToRead": "6 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/chris-strohm-bloomberg-michael-riley-bloomberg-jordan-robertson-bloomberg/", "name": "Chris Strohm, Bloomberg, Michael Riley, Bloomberg, Jordan Robertson, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "Some investigators suspect the attacks were part of a sweeping campaign to create a database on Americans that could be used to obtain commercial and government secrets.", "body": null }, { "uri": "/2015/04/14/security-companies-increasingly-hiring-hackers-for/", "title": "Security companies increasingly hiring hackers, former spies to fight cyber attacks", "byline": "Jordan Robertson, Bloomberg", "kicker": "News", "prettyDate": "April 14, 2015", "timeToRead": "4 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/jordan-robertson-bloomberg/", "name": "Jordan Robertson, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "It's a seller's market for the cyber war's special forces.", "body": null }, { "uri": "/2015/02/06/why-social-security-numbers-are-the-holy-grail-for/", "title": "Why Social Security numbers are the holy grail for hackers", "byline": "Jordan Robertson, Bloomberg", "kicker": "News", "prettyDate": "February 06, 2015", "timeToRead": "3 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/jordan-robertson-bloomberg/", "name": "Jordan Robertson, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "The hackers who infiltrated Anthem made off with one of the most prized possessions in computer crime: the Social Security numbers of as many as 80 million customers of the nations second-biggest health insurer.", "body": null }, { "uri": "/2015/02/06/anthem-attack-could-be-work-of-china-backed-hacker/", "title": "Anthem attack could be work of China-backed hackers", "byline": "Michael Riley, Bloomberg, Jordan Robertson, Bloomberg", "kicker": "News", "prettyDate": "February 06, 2015", "timeToRead": "6 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/michael-riley-bloomberg-jordan-robertson-bloomberg/", "name": "Michael Riley, Bloomberg, Jordan Robertson, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "Investigators of Anthem Inc.s data breach are pursuing evidence that points to Chinese state-sponsored hackers who are stealing personal information from health-care companies for purposes other than pure profit.", "body": null }, { "uri": "/2014/12/16/sony-was-warned-about-a-large-network-breach-last-year/", "title": "Sony was warned about a large network breach last year", "byline": "Jordan Robertson, Bloomberg, Michael Riley, Bloomberg", "kicker": "News", "prettyDate": "December 16, 2014", "timeToRead": "5 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/jordan-robertson-bloomberg-michael-riley-bloomberg/", "name": "Jordan Robertson, Bloomberg, Michael Riley, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "Sony was warned a year ago that hackers had infiltrated its network and were stealing gigabytes of data several times a week.", "body": null }, { "uri": "/2014/12/02/iranian-hackers-target-50-companies-and-government-organizations-worldwide/", "title": "Iranian hackers target 50 companies and government organizations worldwide", "byline": "Michael Riley, Bloomberg, Jordan Robertson, Bloomberg", "kicker": "News", "prettyDate": "December 02, 2014", "timeToRead": "6 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/michael-riley-bloomberg-jordan-robertson-bloomberg/", "name": "Michael Riley, Bloomberg, Jordan Robertson, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "As cyber expands, so do the breaches.", "body": null }, { "uri": "/2014/10/30/next-up-for-russian-hackers-utilities/", "title": "Next up for Russian hackers: Utilities", "byline": " Michael Riley, Bloomberg, Jordan Robertson, Bloomberg ", "kicker": "News", "prettyDate": "October 30, 2014", "timeToRead": "4 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/michael-riley-bloomberg-jordan-robertson-bloomberg/", "name": "Michael Riley, Bloomberg, Jordan Robertson, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "The U.S. Department of Homeland Security said malware called BlackEnergy was used to access digital systems that control water treatment facilities and parts of the electrical grid.", "body": null } ] } }
From gryphon.ai
Is your organization protected against costly Do Not Call (DNC) and Telephone Consumer Protection Act (TCPA) violations and fines? This comprehensive checklist explores key compliance areas, offering insights to mitigate risks and protect your brand reputation in 2024.
Download ResourceFrom OneShield
Commercial insurers have faced many challenges in 2023 due to a record number of billion-dollar weather events, inflation and a tightening reinsurance market. The increasing focus on individual risk levels in the reinsurance market requires insurers to embrace new technology, data, and tools to improve loss ratios and customer satisfaction. This eBook explores solutions to navigate these challenges and enhance risk management capabilities.
Download ResourceFrom Origami Risk
Explore common pitfalls in core insurance transformations and how to avoid them. Discover comprehensive strategies and best practices to successfully plan and execute a cloud implementation in this comprehensive white paper.
Download ResourceFrom gryphon.ai
This guide empowers insurance carriers and risk managers to navigate complex regulations, safeguarding their brands from costly SMS and text messaging penalties.
Download ResourceFrom Origami Risk
Navigating the complexities of P&C core insurance digitization is no easy task. Explore the critical decisions between building or buying and how to achieve operational excellence in this white paper.
Download ResourceFrom Melissa
As more customers “unbundle” their insurance products and spread their business among many carriers, agents must look for creative strategies to retain and grow business. Download this white paper to learn top strategies to ensure success in 2024.
Download ResourceFrom gryphon.ai
Empower your organization to excel in marketing outreach without compromising compliance. This guide offers a roadmap to implement a best-in-class contact compliance strategy so that your organization can continue successful marketing campaigns, ethically and legally.
Download ResourceFrom gryphon.ai
Is your organization protected against costly Do Not Call (DNC) and Telephone Consumer Protection Act (TCPA) violations and fines? This comprehensive checklist explores key compliance areas, offering insights to mitigate risks and protect your brand reputation in 2024.
Download ResourceFrom OneShield
Commercial insurers have faced many challenges in 2023 due to a record number of billion-dollar weather events, inflation and a tightening reinsurance market. The increasing focus on individual risk levels in the reinsurance market requires insurers to embrace new technology, data, and tools to improve loss ratios and customer satisfaction. This eBook explores solutions to navigate these challenges and enhance risk management capabilities.
Download ResourceFrom Origami Risk
Explore common pitfalls in core insurance transformations and how to avoid them. Discover comprehensive strategies and best practices to successfully plan and execute a cloud implementation in this comprehensive white paper.
Download ResourceFrom gryphon.ai
This guide empowers insurance carriers and risk managers to navigate complex regulations, safeguarding their brands from costly SMS and text messaging penalties.
Download ResourceFrom Origami Risk
Navigating the complexities of P&C core insurance digitization is no easy task. Explore the critical decisions between building or buying and how to achieve operational excellence in this white paper.
Download ResourceFrom Melissa
As more customers “unbundle” their insurance products and spread their business among many carriers, agents must look for creative strategies to retain and grow business. Download this white paper to learn top strategies to ensure success in 2024.
Download ResourceFrom gryphon.ai
Empower your organization to excel in marketing outreach without compromising compliance. This guide offers a roadmap to implement a best-in-class contact compliance strategy so that your organization can continue successful marketing campaigns, ethically and legally.
Download ResourceFrom gryphon.ai
Is your organization protected against costly Do Not Call (DNC) and Telephone Consumer Protection Act (TCPA) violations and fines? This comprehensive checklist explores key compliance areas, offering insights to mitigate risks and protect your brand reputation in 2024.
Download Resource