Anthem Data Breach Exposed 78 Million Records

  • By David Lukic
  • Published: Aug 21, 2020
  • Last Updated: Mar 18, 2022

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. What started out as a phishing email, ended in disaster. A user at an Anthem subsidiary downloaded an attachment from a scam email, and that allowed the hackers to gain access to Anthem’s database of information. After a lengthy investigation by third-party security experts, the hacking incident was pointed towards a rival nation. Even your private insurance information is not safe these days! Government-backed data breaches are the most difficult to find and control because they are fueled by substantial resources and funding, which is why Anthem's data breach is a special case. Government sources have hinted that China was behind this attack. Along with the personal records, more than 80 million company records were also breached containing names, birthdays, medical IDs, social security numbers, home addresses, email addresses, employment data, and income sources.

This single data breach spiraled into other Anthem brands, including Anthem Blue Cross, Anthem Blue Cross and Blue Shield, Blue Cross and Blue Shield of Georgia, Empire Blue Cross and Blue Shield, Amerigroup, Caremore, UniCare, and Healthlink. Anthem assures customers that no medical or financial data was stolen, just personally identifiable information. 

anthem data breach

When Was the Anthems Cyber Attack?

The Anthem data breach took place during the weeks before February 4, 2015. The breach was discovered quickly, and Anthem responded rapidly, encrypting and protecting the remaining data and formulating a response plan and further safeguards for the future. 

How to Check if Your Victim of Anthems Security Breach

Anthem does not have a website where you can check to see if your data was breached by this hacking event. However, the settlement website does offer some links and phone numbers. However, the deadline to file a claim was July 19, 2018, and has already passed. 

What to Do if Your Data Was Breached in Anthems Cyber Attack

If you believe you were affected by Anthem’s data breach and you were not included in the class action settlement, you do have the option of suing for damages and losses incurred due to identity theft. The settlement deadline has passed. However, you can contact the correct department by mail at the address below: 

In re Anthem, Inc. Data Breach Litigation

P.O. Box 404012

Louisville, KY 40233-9821

Another way to perform an Anthem data breach check is to use IDStrong to scour the internet to see if your information appears to be stolen or used in unfamiliar places and for credit monitoring

Anthems Data Breach Settlement and Lawsuit

Actually, there were two lawsuits. The federal government sued Anthem for allowing the breach to occur and for not adequately protecting citizens’ information. Anthem paid out a $16 million settlement to the federal government as a penalty for Anthem data breach.

Additionally, there was a significant class-action lawsuit and a website explaining all the details for litigants. Anyone affected was able to file a claim and receive credit monitoring and fraud resolution service for four years. Those customers whose identity was stolen and resulted in losses could also receive cash payouts. There were no flat fee payouts for all other litigants. 

Personal Information From Anthem Security Breach Used for Identity Theft

Even basic information like name, home address, social security number, and date of birth can be used to steal your identity. Unfortunately, the data stolen in this breach ended up in the dark web and fell into the hands of various cybercriminals. You cannot be too careful when protecting against identity theft. 

anthems security breach

How To Protect Your Identity

As a matter of regular practice to protect yourself against identity theft and fraud follow these tips below:

  • Always keep your computer antivirus software updated and run scans frequently.
  • Change passwords to banking and credit card websites often and use only long complex passwords.
  • Watch out for phishing or scam emails that look legitimate, but the “from” address is strange, or the links take you to sites that are not real.
  • Never give out your personal information to anyone unless you know them well or initiated the action.
  • Monitor bank and credit card statements to look for any suspicious activity.
  • Review your credit report and consider a credit freeze to protect against anyone using your identity to open new accounts.

The best tool at your disposal when protecting yourself is common sense. Verify everything before you click a link or download anything you receive in email.

About the Author
IDStrong Logo

Related Articles

Adult Friend Finder Hacked, 412 Million Accounts Exposed

Six databases that were owned by Friend Finder Networks, Inc. suffered a massive data breach in 20 ... Read More

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach: 2013, 2015, 2021 and 2023 Hacks

T-Mobile has experienced a number of data breaches in the past decade. The first case occurred som ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that much a ... Read More

The NSA Hack, How Did it Happen?

The National Security Agency (NSA) was the main attraction in a major data breach involving three ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close