Bankers Life—Retirement Solutions Provider—Faces Member Data Breach

  • By Steven
  • Published: Feb 05, 2024
  • Last Updated: Feb 06, 2024

Bankers Life and Casualty Company

Bankers Life and Casualty Company (Bankers) is a nationwide retirement solutions provider. Their services assist members in maintaining and stretching their retirement income, paying for health and treatment programs, finding excellent retirement care, and assisting families with final expenses. There are over 3,800 Bankers agents throughout the US, with most states having one or more physical branches. Thousands of families and retirees entrust their data and accounts to Bankers; however, this may change after the Bankers’ data breach announcement. 

How Did the Attack Occur? 

Although Bankers do not have a notice on their website, the Attorney General of Maine has public information regarding the incident. According to Maine’s breach filing, the event is considered an “external system breach”; however, the consumer notices published with the filing suggest the event was not a threat actor’s hack—but a cellphone swap. 

The public notices state that the event targeted a senior company officer; the perpetrators swapped his cellphone number with the threat actor’s phone number. The assailants made this event possible with a coordinated team, including a nationwide wireless carrier retailer. After the swap, the malicious actor bypassed multi-factor authentication, and all other security policies Bankers had implemented. These attacks are called “SIM swapping,” and while threat actors do not typically use them, the success of this event may signal others to copy-cat the attack. 

What Information Was Viewed or Stolen? 

The consumer notice suggests that the attack targeted Bankers’ systems; however, the threat actors did gain access to the information of over 45k members. Members and their dependents are at risk for information misuse by the assailants. The data accessed in this event includes members’ names, Social Security Numbers, birthdays, and policy numbers. The assailants could use this data in various schemes, from online impersonations to fraud, even extortion.

How Did Bankers Life and Casualty Company Admit to the Breach? 

Bankers’ timeline of the incident began around November 28th, 2023, with the discovery of the event purportedly happening the following day. Presumably, upon officials realizing the breach, they began responding to the threat, including notifying the Federal Bureau of Investigation and the United States Attorney’s Offices. Around January 26th, Bankers officials began sending impact notices to potential victims.

What Will Become of the Stolen Information? 

The compromised data may not have been the assailant’s target; however, the exposed data is in the hands of criminals. Consequently, no one can predict how the threat actors might use it. They could use victims’ identities to commit identity or medical fraud or sell the data on the dark web to make a quick profit. Moreover, now that the information is compromised, there’s no return to confidentiality. 

What Should Affected Parties Do in the Aftermath of the Breach? 

Although there is no way to hide the exposed data, victims can still influence how the threat actors can use the credentials. Victims can’t change their personal information without hassle, so they must focus on preventative rather than proactive options. They can start by securing their accounts with new passwords and contact information where necessary; additionally, they should update any accounts with matching credentials to unique strong passwords and usernames. Further, those who cannot readily watch over their accounts must consider account monitoring options. Professionals can alert victims to suspicious activity within their accounts, meaning more significant mitigation and a faster return to normalcy. Victims shouldn’t wait for their impact notice to start taking action. They can start safeguarding their and their family’s data today.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close