Case ID
Anthem 2015: $260M+, the breach that reset HIPAA penalty norms.
Anthem disclosed the largest healthcare breach of its era on 4 February 2015 after a state-sponsored intrusion (later attributed by the FBI to China) accessed names, SSNs, dates of birth, employment, and income data for 78.8 million members and former members. The $16M OCR settlement reached in October 2018 was the largest HIPAA penalty to date and reset the upper bound on what the regulator would seek. Total disclosed cost crossed $260M.
Records exposed
78.8M
Largest healthcare breach until 2024
Total cost
$260M+
Cumulative disclosed
OCR HIPAA settlement
$16M
Then record, since exceeded
Class-action settlement
$115M
In re Anthem Inc. Data Breach Litigation
Section ANT.1
How the breach happened
The intrusion began on 18 April 2014 with a spear-phishing email sent to a small number of Anthem employees. At least one employee clicked the link, triggering download of a backdoor that gave the attacker initial access to the Anthem network. The attacker remained in the environment for nine months, escalating privileges, mapping the data warehouse, and ultimately exfiltrating member-data records from late January 2015 through early February 2015 before Anthem detection.
The exfiltrated data included names, dates of birth, SSNs, home addresses, employment data, email addresses, and income data for 78.8 million current and former members of Anthem and its affiliated Blue Cross plans. Critically, the data was stored in a way that was technically permissible under HIPAA but did not include addressable encryption at rest. The OCR investigation centered on this technical failure to apply encryption to the relevant data warehouse, in addition to identity-management deficiencies that allowed the privilege escalation.
The FBI attributed the attack to Chinese intelligence-affiliated actors in May 2017. The DOJ subsequently indicted Fujie Wang (alias "Dennis Wang") and a second individual in May 2019 for the Anthem intrusion. Neither has been arrested.
Section ANT.2
The $260M cost composition
| Cost line item | Amount | Source |
|---|---|---|
| Class-action settlement (consolidated) | $115M | Northern District of California, In re Anthem Inc. Data Breach Litigation, August 2017 |
| OCR HIPAA settlement | $16M | HHS OCR press release 15 October 2018 |
| Multistate AG settlement (43 states + DC) | $39.5M | California AG announcement 30 September 2020 |
| Credit monitoring and identity restoration (2 years) | ~$60M | Anthem SEC 10-K 2015 disclosure |
| Internal investigation, IT remediation, legal counsel | ~$30M | Anthem SEC 10-K 2015-2017 |
| Total cumulative cost | $260M+ | Anthem / Elevance SEC 10-K filings 2015-2021 |
Cost figures partially overlap. The class-action settlement included credit-monitoring extension that Anthem was also funding separately. The $260M figure reflects the cumulative cash outflow disclosed in SEC filings rather than the strict sum of headline settlement figures.
Section ANT.3
The OCR $16M HIPAA settlement
The $16M OCR HIPAA settlement announced 15 October 2018 was the largest HIPAA penalty in history at the time, nearly triple the previous record. The OCR investigation found Anthem in violation of HIPAA in four specific areas: failure to conduct enterprise-wide risk analysis, failure to implement sufficient procedures to regularly review information system activity, failure to identify and respond to suspected or known security incidents, and failure to implement adequate minimum access controls to prevent unauthorized access.
Beyond the monetary penalty, the settlement required Anthem to implement a corrective action plan including completion of risk analysis and risk management plan, revision of policies and procedures for information-system activity review, implementation of procedures for security incident response, and revision of access-control policies. The corrective action plan ran for two years with quarterly reporting to OCR.
The Anthem settlement reset the upper bound of OCR enforcement. Prior to October 2018 the largest HIPAA penalty was Advocate Health Care Network's $5.55M in August 2016. Anthem nearly tripled that. The Premera $6.85M settlement in September 2020 and subsequent multimillion-dollar OCR resolutions all sit on the trajectory Anthem established.
Section ANT.4
The class-action settlement: $115M
The consolidated class-action in the Northern District of California, In re Anthem Inc. Data Breach Litigation, settled for $115M in August 2017 and received final approval in August 2018. The settlement structure provided $15M for two years of credit monitoring for all class members (administered by AllClear ID), out-of-pocket cost reimbursement up to $10,000 per class member for documented losses, alternative compensation of up to $50 per class member who did not enrol in credit monitoring, and approximately $38M in attorney fees.
The settlement was challenged on multiple grounds including objections from a small number of class members arguing the per-class-member compensation was inadequate. The Ninth Circuit affirmed final approval in 2019 in a decision that has since been cited extensively in subsequent healthcare-breach class-action settlements. The per-class-member effective value of approximately $1.50 (excluding the credit-monitoring component) for the $115M settlement against the 78.8 million class size has become a benchmark cited by both plaintiff and defendant counsel in subsequent matters.
Section ANT.5
The legacy: encryption at rest and continuous monitoring
The two policy lessons from Anthem that the healthcare sector internalised were encryption at rest and continuous monitoring. Anthem's decision to leave the data warehouse unencrypted was technically permissible under HIPAA because encryption is "addressable" rather than "required" in the Security Rule, but the OCR investigation made clear that the addressable standard required documented analysis of why encryption was not implemented and what alternative safeguard was used. Anthem could not produce that documentation. The post-Anthem industry standard moved decisively toward encryption-at-rest as the default with documented exception process.
The nine-month dwell time was the second teaching moment. Continuous monitoring of unusual data-access patterns is the control that should have caught the privilege escalation and the unusual queries against the member-data warehouse. The post-Anthem investment surge in healthcare SIEM and UEBA (user and entity behaviour analytics) tools was driven directly by this lesson. By 2020, IBM's sector survey showed continuous monitoring coverage at major healthcare insurers had risen from below 40% in 2014 to above 90%.
Cross-references
Industry / Healthcare
→Sector context: 15 years at rank #1, $7.42M average.
Case / Change Healthcare 2024
→The breach that displaced Anthem as largest healthcare incident.
Regulation / HIPAA
→OCR penalty tier structure and enforcement architecture.
Cost / Class-action settlement
→Per-plaintiff economics: Anthem $115M as a benchmark.
Cost / Credit monitoring
→Two-year monitoring as settlement compensation: vendor pricing.
Index / All breach cases
→22 verified mega-breach case studies.
Schedule F / Reference Q&A
Frequently Asked Questions
Primary source:Anthem 2015 breach data from In re Anthem Inc. Data Breach Litigation, HHS OCR press release 15 October 2018, California AG announcement 30 September 2020, Anthem SEC 10-K filings 2015-2021, FBI attribution May 2017, and DOJ indictment May 2019.