Anthem

Last updated: June 29, 2025

Target Audience

Keywords

Introduction

Overview

Anthem, one of the largest health insurance providers, was revealed to have been breached in 2015 as hackers gained access to the health insurer's database. Personal information of nearly 80 million individuals, including current and former customers and employees was leaked. The attackers executed a sophisticated spear phishing campaign to compromise employee credentials, allowing them to gain access to Anthem's network and exfiltrate data. The stolen information included names, dates of birth, Social Security numbers, and medical data, raising concerns about identity theft and privacy violations. The incident exposed the vulnerability of healthcare organizations to cyber threats highlighted and the importance of proper cybersecurity measures to protect patient information.

Vulnerability Details

The group “Deep Panda”, responsible for the Anthem breach, utilized advanced techniques, such as targeted spear phishing campaigns and a novel attack framework written in javascript. The term APT (Advanced Persistent Threat) refers to a skilled and determined adversary with advanced capabilities.
Hackers posed as Anthem's HR and IT services within emails, and used typosquatting to create fake and malicious websites resembling legitimate domains. The phishing emails contained malicious attachments and embedded links leading to these typosquat domains, myhrsolutions.we11point.com and extcitrix.we11point.com. Once opened, the malware exploited various capabilities, including establishing backdoor channels, executing files and commands, and collecting and sending information about the infected computer.

Learning Objectives

  • Describe the Anthem data breach in 2015
  • Explain email phishing and its role in this breach
  • Explain Advanced Persistent Threat (APT) and possible motives
  • List possible strategies to prevent this kind of attack
  • Compare and contrast the Anthem and Target breaches

Download

  • Includes a PDF case study adapted from a real-world cyber breach
  • Guided questions for student engagement
  • Instructor materials including context and background
  • All content packaged in a downloadable ZIP file

Remote Terminal

Terminal Description

In this lab, we will examine typosquatting, a very common technique used by attackers to phish for credentials. You will search for popular websites and analyze their various typosquatted domains.

  • Use the help-module5 command to explore available commands.
  • View the various typosquatted domains of twitter.com
  • View the various typosquatted domains of google.com
  • Examine the different typo types used by attackers
  • Examine the nameservers of the typosquatted domains
  • In Google.com's domain report, a majority of the typosquatted domains seem to belong to Google. Think about why this is the case

Module Questions

What is an APT?
What is spear phishing? How does it differ from regular phishing?
How could behavioral analysis help discover the attack?
Could data encryption have helped prevent damage caused by the attack?
Could Multi-Factor Authentication (MFA) have potentially prevented such attacks used against Anthem?