Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Error’d: Pickup Sticklers

      September 27, 2025

      From Prompt To Partner: Designing Your Custom AI Assistant

      September 27, 2025

      Microsoft unveils reimagined Marketplace for cloud solutions, AI apps, and more

      September 27, 2025

      Design Dialects: Breaking the Rules, Not the System

      September 27, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025

      Cailabs secures €57M to accelerate growth and industrial scale-up

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

      September 28, 2025
      Recent

      Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

      September 28, 2025

      Mastering PHP File Uploads: A Guide to php.ini Settings and Code Examples

      September 28, 2025

      The first browser with JavaScript landed 30 years ago

      September 27, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured
      Recent
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Aflac Reports Breach as Insurance Cyberattacks Grow

    Aflac Reports Breach as Insurance Cyberattacks Grow

    June 20, 2025

    Aflac breach data breach

    Insurance giant Aflac reported today that it was hit by a cyberattack on June 12 but was able to stop the intrusion “within hours.”

    Aflac detailed the incident in an SEC filing and press release today. The company didn’t name the suspected attacker but said in the press release that “This attack, like many insurance companies are currently experiencing, was caused by a sophisticated cybercrime group. This was part of a cybercrime campaign against the insurance industry.”

    The Aflac breach disclosure came days after reports that the Scattered Spider threat group was pivoting from retail attacks to a campaign targeting the insurance industry.

    Other recent insurance industry cyber incidents have targeted Erie Insurance and Philadelphia Insurance Companies, among others.

    Aflac Breach Began with Social Engineering

    Aflac said it has engaged third-party cybersecurity experts to help with its response and investigation, and noted that the preliminary investigation suggests that the attackers “used social engineering tactics to gain access to our network.”

    The insurance company said that its business remains operational and its systems were not affected by ransomware, but the company suggested that hackers may have been able to access some sensitive data.

    “[W]e have commenced a review of potentially impacted files,” Aflac said. “It is important to note that the review is in its early stages, and we are unable to determine the total number of affected individuals until that review is completed. The potentially impacted files contain claims information, health information, social security numbers, and/or other personal information, related to customers, beneficiaries, employees, agents, and other individuals in our U.S. business.”

    Aflac said that even though the investigation is ongoing, it is offering any individual who contacts the company’s dedicated call center free credit monitoring, identity theft protection, and Medical Shield for 24 months.

    The SEC filing said Aflac plans to notify regulators and provide “appropriate notifications to individuals affected by this incident. … At this time, the full scope and potential ultimate impact on the Company are not known.”

    Defending Against Scattered Spider

    After Scattered Spider-linked retail incidents in the UK last month, the UK’s National Cyber Security Centre issued guidance for protecting operations from cyberattacks. Those steps include:

    • Comprehensive use of multi-factor authentication
    • Monitoring for signs of account misuse, such as “risky logins” within Microsoft Entra ID Protection
    • Monitoring Domain Admin, Enterprise Admin, and Cloud Admin accounts and making sure that any access is legitimate
    • Review helpdesk password reset processes, including procedures for authenticating staff credentials before resetting passwords
    • Making sure that security operation centers can identify suspicious logins, such as from VPN services in residential ranges
    • Following tactics, techniques, and procedures sourced from threat intelligence

    Google recently issued an advisory looking at Scattered Spider’s vishing attack techniques, or voice-based social engineering, which has included calling corporate service desks and “impersonating employees to have credentials and multi-factor authentication (MFA) methods reset.”

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleNovo is a legal tech startup that helps personal injury law firms automate their most time-consuming tasks using AI.
    Next Article Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms

    Related Posts

    Development

    Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

    September 28, 2025
    Development

    Mastering PHP File Uploads: A Guide to php.ini Settings and Code Examples

    September 28, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Upcoming Kotlin language features teased at KotlinConf 2025

    Tech & Work

    Last Week in AI #312 – Meta’s Superintelligence lab, Anthropic & Midjourney sued

    Artificial Intelligence

    I finally gave NotebookLM my full attention – and it really is a total game changer

    News & Updates

    Jenisis Island: The First Haunting

    Artificial Intelligence

    Highlights

    Rogue WordPress Plugin Unmasked: Stealthy Malware Skims Credit Cards & Steals Credentials

    June 24, 2025

    Rogue WordPress Plugin Unmasked: Stealthy Malware Skims Credit Cards & Steals Credentials

    The Wordfence Threat Intelligence Team has unveiled a powerful malware framework operating under the guise of a rogue WordPress plugin. This campaign, first identified during a site clean on May 16, 2 …
    Read more

    Published Date:
    Jun 25, 2025 (2 hours, 45 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2022-31626

    Magento (Adobe Commerce) or Optimizely Configured Commerce: Which One to Choose

    September 4, 2025

    Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution

    August 15, 2025

    Designing For Neurodiversity

    June 2, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.