DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

No evidence that any data removed from system: Premera

Posted on April 21, 2015 by Dissent

On April 18, DataBreaches.net addressed a question raised by some as to whether the Premera breach had resulted in any tax refund fraud or other types of fraud. At the time of posting, Premera had not responded to the inquiries sent to them. Today, DataBreaches.net received the following answers:

1. Does Premera now have any evidence that data was actually acquired or exfiltrated in the attack?

The investigation has not determined that any such data was removed from our systems and we have no evidence to date that such data has been used inappropriately. We continue to encourage affected individuals to sign up for the credit monitoring and identity theft protection products. Members should enroll on line through the www.Premeraupdate.com website or by calling Experian directly at 888-451-6558.

2. Has Premera received any reports of tax refund fraud that appear to be linked to the attack? If so, how many such reports have been received?

The IRS has released warnings on at least 12 different tax scams that are in operation during tax filing season this year. We continue to coordinate with the FBI on its investigation into this attack and it’s important to note that our investigation has not determined that any information has been removed from our systems nor is there any evidence that any such data has been used inappropriately. We do not believe that these scams are related to the cyberattack.

As this site has noted repeatedly and as Premera notes above, given how many breaches have occurred, it will be extremely difficult, if not impossible, for any one victim of tax refund fraud to know from where their information was stolen or acquired. But blaming any one entity when they’ve found no evidence of any data theft really does seem a bit of stretch.

Category: HackHealth DataU.S.

Post navigation

← OS X Yosemite still open to Rootpipe backdoor, warns ex-NSA bod
White House seeks Silicon Valley help on strong yet breakable encryption →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Trump Rewrites Cybersecurity Policy in Executive Order
  • AMI Group – Travel & Tours notice of ransomware attack
  • Resource: Insider Threat reports
  • Za: Cyber extortionist sentenced to eight years in jail
  • ICE takes steps to deport the Australian hacker known as “DR32”
  • Hearing on the Federal Government and AI
  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Decision That Murdered Privacy
  • Hearing on the Federal Government and AI
  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.