SlideShare a Scribd company logo
InvisiBits
12/30/2015
Biggest Data Breaches of 2015
Anthem
80 million
Ashley Madison
37 million
OPM
21.5 million
Experian
15 million
Premera
11 million
LastPass
7 million
Anthem
Anthem
80 million
Anthem
 Revealed in February (2015)
 APT attack probably started in April 2014
 5th largest data breach of all time
 Breached data includes social security numbers, birthdays,
street addresses, phone numbers and income data
 Likely by Chinese hackers (Deep Panda)
 Attackers created a bogus domain name, "we11point.com,"
(based onWellPoint, the former name ofAnthem) that may
have been used in phishing-related attacks.
Ashley Madison
Ashley Madison
37 million
Ashley Madison
 A website that encourages people to cheat on their partners
 A hacking group known as ImpactTeam stole private
information
 Hacked in July (2015)
 Leaked 20 GB data inAugust (which had many social
consequences including suicides)
 Breached data includes e-mail addresses and account details
 Suspects to be an insider attack but does not know for sure
U.S. Office of Personal Management
OPM
21.5 million
U.S. Office of Personal Management
 Attack started inApril 2014
 Detected in May (2015) and notified in June (2015)
 Breached data contains security clearance data of past and
current federal workers - including fingerprints, Social
Security numbers, addresses, employment history, and
financial records
 Believed to be originated from China
 They have carried out two attacks
Experian
Experian
15 million
Experian
 The world’s largest consumer credit monitoring firm
 Breach disclosed in October (2015)
 Breached data includesT-Mobile customers who underwent
credit checks by Experian (customer names, addresses, Social
Security numbers, birthdays, and even sensitive identification
numbers)
 Consumer facing companies (e.g.T-mobile) should take more
stringent measures to protect their data at data aggregators
(e.g. Experian)
 The attack seems to have originated in CourtVenture which
Experian had acquired by a humanTrojan
Premera Blue Cross Blue Shield
Premera
11 million
Premera Blue Cross Blue Shield
 Occurred in May 2014, but discovered only in January
 Disclosed in March
 Breached data includes names, dates of birth, Social Security
numbers, addresses, bank-account information and claim
information, including clinical information
 The same group that hackedAnthem seems to have carried
out the attack
 Customers are phished to a fake domain prennera.com
 Fed had warned about security flaws before the attack, no
action was taken
LastPass
LastPass
7 million
LastPass
 A cloud based password management company
 Disclosed the attack in June (2015)
 Breached data includes users’ email addresses, encrypted
master passwords, and the reminder words and phrases that
the service asks users to create for those master passwords
 Due to strong encryption, breached users seem to safe, but
the company advised users to reset their master passwords as
a precautionary measure
What to do in 2016?
 Two of the breaches include state sponsored attacks – need better
security infrastructures to protect and monitor government assets
 Two of the breaches on healthcare data – hackers are after personal data
– similar to government data, healthcare data needs to be better
protected
 Encrypt your data – LastPass leaked master passwords were strongly
protected which averted a catastrophic consequence
 Have good detection technologies in place – most of the attacks took
months to discover
 Take warnings seriously – Premera was warned, but did not take any
actions before the attack happened
 Make sure the same mistake does not happen again – Experian got
hacked twice – not enough action after the first attack
 Live online the same way you live offline – internet cannot hide you
forever (Ashley Madison)

More Related Content

PPTX
Data breach
PPTX
Data Breach
PPTX
Online Identity Theft
PDF
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
PPTX
Top data breaches in 2013
DOCX
Cybercriminals Are Lurking
PDF
10 Steps to Creating a Corporate Phishing Awareness Program
PPTX
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Data breach
Data Breach
Online Identity Theft
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Top data breaches in 2013
Cybercriminals Are Lurking
10 Steps to Creating a Corporate Phishing Awareness Program
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference

What's hot (18)

DOCX
Cybercrime blog
PPTX
Cyber crime final
PPTX
Phishing awareness
PDF
DATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONS
PDF
Type of Threat Actor
PDF
Digital Gen: Security Infographic
PPTX
Email phishing and countermeasures
PPTX
Phishing ppt
PPTX
Phishing technique tanish khilani
PPT
Mod7 Lab Kohne
PPTX
5 Cybersecurity Threats Your Business Can't Afford to Ignore
DOCX
Five cyber threats to be careful in 2018
PDF
PhishingBox Presents 'What is Phishing' 2017
PPT
Cyber law
PPTX
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
PDF
Prevent phishing scams
PPTX
Social Engineering
PPTX
The COVID-19 Phishing Threats to Watch Out For
Cybercrime blog
Cyber crime final
Phishing awareness
DATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONS
Type of Threat Actor
Digital Gen: Security Infographic
Email phishing and countermeasures
Phishing ppt
Phishing technique tanish khilani
Mod7 Lab Kohne
5 Cybersecurity Threats Your Business Can't Afford to Ignore
Five cyber threats to be careful in 2018
PhishingBox Presents 'What is Phishing' 2017
Cyber law
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Prevent phishing scams
Social Engineering
The COVID-19 Phishing Threats to Watch Out For
Ad

Similar to Biggest data breaches of 2015 (20)

PPTX
Top data breaches in 2013
PDF
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
PDF
Can domain intelligence help healthcare service providers combat data breaches
DOCX
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
PDF
List of data breaches and cyber attacks in january 2022
PDF
Breach level index_report_2017_gemalto
PDF
[Infographic] 7 Cyber attacks that shook the world
PDF
CSR&RSA_ACT1: Deep Roots Analytics Proff.pdf
PDF
Critical Update Needed: Cybersecurity Expertise in the Boardroom
PDF
Top 10 Biggest Data Breaches of all Times.pdf
PDF
Top Law Firm Cyber Attacks Throughout History
PDF
Threatsploit Adversary Report January 2019
PPTX
RSA Conference 2016 Review
PDF
HE Mag_New Cyber Threats_ITSource
PDF
2015 Labris SOC Annual Report
PDF
Worst security data breaches till 2015 - SecPod
PDF
Combating Phishing Attacks
DOCX
Case 11. What exactly occurred Twitter is one of popular soci.docx
PPTX
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
PPTX
Baker Tilly Presents: Emerging Trends in Cybersecurity
Top data breaches in 2013
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Can domain intelligence help healthcare service providers combat data breaches
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
List of data breaches and cyber attacks in january 2022
Breach level index_report_2017_gemalto
[Infographic] 7 Cyber attacks that shook the world
CSR&RSA_ACT1: Deep Roots Analytics Proff.pdf
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Top 10 Biggest Data Breaches of all Times.pdf
Top Law Firm Cyber Attacks Throughout History
Threatsploit Adversary Report January 2019
RSA Conference 2016 Review
HE Mag_New Cyber Threats_ITSource
2015 Labris SOC Annual Report
Worst security data breaches till 2015 - SecPod
Combating Phishing Attacks
Case 11. What exactly occurred Twitter is one of popular soci.docx
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Baker Tilly Presents: Emerging Trends in Cybersecurity
Ad

Recently uploaded (20)

PPTX
The various Industrial Revolutions .pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Chapter 5: Probability Theory and Statistics
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Architecture types and enterprise applications.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Unlock new opportunities with location data.pdf
PPT
What is a Computer? Input Devices /output devices
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Hybrid model detection and classification of lung cancer
The various Industrial Revolutions .pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Assigned Numbers - 2025 - Bluetooth® Document
NewMind AI Weekly Chronicles – August ’25 Week III
Chapter 5: Probability Theory and Statistics
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Architecture types and enterprise applications.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
sustainability-14-14877-v2.pddhzftheheeeee
Unlock new opportunities with location data.pdf
What is a Computer? Input Devices /output devices
Web Crawler for Trend Tracking Gen Z Insights.pptx
1 - Historical Antecedents, Social Consideration.pdf
search engine optimization ppt fir known well about this
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
O2C Customer Invoices to Receipt V15A.pptx
Getting started with AI Agents and Multi-Agent Systems
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Hybrid model detection and classification of lung cancer

Biggest data breaches of 2015

  • 2. Anthem 80 million Ashley Madison 37 million OPM 21.5 million Experian 15 million Premera 11 million LastPass 7 million
  • 4. Anthem  Revealed in February (2015)  APT attack probably started in April 2014  5th largest data breach of all time  Breached data includes social security numbers, birthdays, street addresses, phone numbers and income data  Likely by Chinese hackers (Deep Panda)  Attackers created a bogus domain name, "we11point.com," (based onWellPoint, the former name ofAnthem) that may have been used in phishing-related attacks.
  • 6. Ashley Madison  A website that encourages people to cheat on their partners  A hacking group known as ImpactTeam stole private information  Hacked in July (2015)  Leaked 20 GB data inAugust (which had many social consequences including suicides)  Breached data includes e-mail addresses and account details  Suspects to be an insider attack but does not know for sure
  • 7. U.S. Office of Personal Management OPM 21.5 million
  • 8. U.S. Office of Personal Management  Attack started inApril 2014  Detected in May (2015) and notified in June (2015)  Breached data contains security clearance data of past and current federal workers - including fingerprints, Social Security numbers, addresses, employment history, and financial records  Believed to be originated from China  They have carried out two attacks
  • 10. Experian  The world’s largest consumer credit monitoring firm  Breach disclosed in October (2015)  Breached data includesT-Mobile customers who underwent credit checks by Experian (customer names, addresses, Social Security numbers, birthdays, and even sensitive identification numbers)  Consumer facing companies (e.g.T-mobile) should take more stringent measures to protect their data at data aggregators (e.g. Experian)  The attack seems to have originated in CourtVenture which Experian had acquired by a humanTrojan
  • 11. Premera Blue Cross Blue Shield Premera 11 million
  • 12. Premera Blue Cross Blue Shield  Occurred in May 2014, but discovered only in January  Disclosed in March  Breached data includes names, dates of birth, Social Security numbers, addresses, bank-account information and claim information, including clinical information  The same group that hackedAnthem seems to have carried out the attack  Customers are phished to a fake domain prennera.com  Fed had warned about security flaws before the attack, no action was taken
  • 14. LastPass  A cloud based password management company  Disclosed the attack in June (2015)  Breached data includes users’ email addresses, encrypted master passwords, and the reminder words and phrases that the service asks users to create for those master passwords  Due to strong encryption, breached users seem to safe, but the company advised users to reset their master passwords as a precautionary measure
  • 15. What to do in 2016?  Two of the breaches include state sponsored attacks – need better security infrastructures to protect and monitor government assets  Two of the breaches on healthcare data – hackers are after personal data – similar to government data, healthcare data needs to be better protected  Encrypt your data – LastPass leaked master passwords were strongly protected which averted a catastrophic consequence  Have good detection technologies in place – most of the attacks took months to discover  Take warnings seriously – Premera was warned, but did not take any actions before the attack happened  Make sure the same mistake does not happen again – Experian got hacked twice – not enough action after the first attack  Live online the same way you live offline – internet cannot hide you forever (Ashley Madison)