Premera and Anthem are health
care providers that were attacked by a group of hackers who compromised
personal data and information from organization servers. Anthem and Premera are
agents of blue shield companies that operate in the USA. They provide services
to government employees, general public, and none government agencies (Tim,
2015). The attack
manipulated to about 11 million customer records that affected by the stolen
data and information. The data and information about patients were neither
exposed nor stolen. It seems that attacking troop were after data and
information of individuals and a group of individuals.
The attack is associated with a
group that has close ties with China government officials. The group is said to
belong to a third party organization that implemented an attack to Anthem and
at the same time extended a similar attack to Premera. Analysis of tools used to
identify attackers reveals that the same person implemented the action. A
collection of tool signatures, domain names as well as time frame of was
similar. The IP addresses pointed to
same users and directed to machines from Chinese that were linked with the
government of China (Tim, 2015).
According to the analyzed report,
no individual data was exposed or stolen. Attackers were after specific
intelligence data that has not yet been revealed till now. However, the
government agencies and other organizations were concerned since their
information was within the organization (Tim, 2015).
The scope of effect touched
Federal Bureau of Intelligence, health care community and insurance agencies
were involved in investigating the attack (Takei, et al., 2014).
The organization responded by
installing intelligence systems that facilitated high-level security on
organization operations. The
organization is sharing intelligence data and information to facilitate better implementation of security (Jordan,
& Taylor, 2008).
References
Jordan, T., & Taylor, P. (2008). A sociology of
hackers. The Sociological Review, 46, 4, 757-780.
Takei, Y., Ohta, K., Kato, N., & Nemoto, Y.
(2014). Detecting and tracing illegal access by using traffic pattern matching
technique. Electronics and Communications in Japan (part I: Communications),
87, 1, 61-71.
Tim G. (2015). Premera, Anthem
breaches probably espionage, expert says: Same group of attackers, likely
Chinese, could be lurking in networks right now: Source: (networkworld.com).
Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in research paper company if you need a similar paper you can place your order for pre written essays.
No comments:
Post a Comment