Insurance giant Globe Life facing extortion attempts after data theft from subsidiary

Avatar

Insurance firm Globe Life is being extorted by hackers after data on more than 5,000 people was stolen from a subsidiary.

The company told regulators at the U.S. Securities and Exchange Commission (SEC) that it reported the incident to federal law enforcement. 

“Based on the Company’s investigation to date, which remains ongoing, the Company believes that information relayed to the Company by the threat actor may relate to certain customers and customer leads that can be traced to the Company’s subsidiary, American Income Life Insurance Company,” the company explained in the filing. Globe Life declined to comment for this article.

The stolen information includes Social Security numbers, names, addresses, health-related data and more. Globe Life warned that the “full scope of information possessed by the threat actor has not been fully verified.” 

“Most recently, the threat actor also shared information about a limited number of individuals to short sellers and plaintiffs’ attorneys,” the filing adds. “The threat actor claims to possess additional categories of information, which claims remain under investigation and have not been verified.” 

The Texas-based insurance giant said the extortion attempts did not involve ransomware or any cyberattack that disrupted company operations. 

In June, the company told the SEC about an inquiry from a state insurance regulator about “potential vulnerabilities related to access permissions and user identity management for a Company web portal that likely resulted in unauthorized access to certain consumer and policyholder information.” 

The company hired cybersecurity experts to investigate the situation and remediate the incident. 

Globe Life reported $5.21 billion in revenue last year and American Income Life Insurance Company is one of its premiere brands — with more than 4 million policies in force and about $297 million in annualized life premium sales.

CybercrimeNewsNews BriefsPrivacy
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

More than 5,000 arrested, thousands of websites disrupted in crackdown on illegal gambling during Euro tournament

Next Post

Japan’s ruling political party hit by cyberattack from alleged pro-Russian hackers

Related Posts

Reevaluating SSEs: A Technical Gap Analysis of Last-Mile Protection

Security Service Edge (SSE) platforms have become the go-to architecture for securing hybrid work and SaaS access. They promise centralized enforcement, simplified connectivity, and consistent policy control across users and devices. But there's a problem: they stop short of where the most sensitive user activity actually happens—the browser. This isn’t a small omission. It’s a structural
Avatar
Read More

North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress

The North Korea-linked threat actor known as Konni APT has been attributed to a phishing campaign targeting government entities in Ukraine, indicating the threat actor's targeting beyond Russia. Enterprise security firm Proofpoint said the end goal of the campaign is to collect intelligence on the "trajectory of the Russian invasion." "The group's interest in Ukraine follows historical targeting
Avatar
Read More

APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

The Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that's targeting diplomatic entities across Europe with a new variant of WINELOADER and a previously unreported malware loader codenamed GRAPELOADER. "While the improved WINELOADER variant is still a modular backdoor used in later stages, GRAPELOADER is a newly observed initial-stage tool
Avatar
Read More