Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Allianz Life Insurance Impacted By Third Party Breach

By Jordyn Alger, Managing Editor
Man signing paper

Scott Graham via Unsplash

July 30, 2025

On July 16, 2025, Allianz Life Insurance Company of North America experienced a data breach. According to a filing with the Office of the Maine Attorney General, the incident was described as an “external system breach.”

At this time, there is no further information about the data that may be compromised, or how many individuals may be affected. While the threat actor behind this attack is also unknown, there are some initial similarities to Scattered Spider, a group that has recently changed targets from retail to insurance. 

Below, security leaders weigh in on this attack. 

Security Leaders Weigh In  

Boris Cipot, Senior Security Engineer at Black Duck:

This breach highlights that the biggest threats don’t always come from direct attacks, but often a combination of vulnerabilities across the entire supply chain. In this case, the attacker used multiple techniques: social engineering to obtain access rights and a third-party solution as a backdoor into the system. 

Organizations must take a holistic view of their security posture. The supply chain is often the weakest link and must not be overlooked. Allianz responded appropriately by notifying the authorities and the affected customer, and by offering credit and identity monitoring services. However, impacted individuals should remain vigilant. The stolen data could still be used in follow-up social engineering attempts. Be cautious of unsolicited messages, especially those containing links or attachments. Don’t click on links or open files unless you’re absolutely sure they’re legitimate.

Mr. Piyush Pandey, CEO at Pathlock:

This breach is a stark reminder of how critical it is to have a comprehensive security and governance program around enterprise business applications such as CRM platforms, which store a massive amount of sensitive customer PII.

Specifically, it flags to us that it’s no longer enough for enterprises to rely on basic identity provisioning. Instead, it’s important to embrace real-time access risk analysis that continuously monitors whether corporate accounts have the right level of access based on their current context and behavior, not just their job title or group membership.

Additionally, it highlights the importance of adopting a cross-application governance model that can flag excessive privileges, identify dormant or high-risk accounts, and revoke inappropriate access before it can be exploited — and do so across the entire business application footprint.

And let’s not forget the compliance angle. For insurance companies, breaches of this nature can lead to compliance penalties under the laws like the Gramm-Leach-Bliley Act (GLBA) and other data protection regulations.

Mr. Agnidipta Sarkar, Chief Evangelist at ColorTokens:

While this does resemble Scattered Spider, it could also be ShinyHunter. Yes, the attack originated through a third-party CRM platform; however, the compromised data included personally identifiable information (PII) related to the majority of Allianz Life’s 1.4 million customers, financial professionals, and select employees. This poses a lot of questions about how the supply chain security was managed and monitored. The incident also raises questions about regulatory compliance, particularly under laws like the Cybersecurity Information Sharing Act of 2015, set to expire in September 2025, and state-specific data breach notification requirements. 

The exposure of PII poses significant risks to affected individuals, including identity theft, financial fraud, and phishing attacks. Victims may face unauthorized access to financial accounts, credit card fraud, or even medical identity theft, given Allianz Life’s role in life insurance and annuities. There were other similar breaches recently at Aflac and Anthem and to some extent, Allianz Life's offer of 24 months of credit monitoring and identity theft protection through Kroll, could probably help many victims. 

KEYWORDS: data breach notification data breaches data privacy

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Computer and laptop

    1.1M Impacted by Farmers Insurance Data Breach, Security Leaders Discuss

    See More
  • Coding

    850,000 individuals impacted by Globe Life ransomware incident

    See More
  • Laptop with money

    Nearly 22,000 impacted by Western Alliance Bank breach

    See More

Related Products

See More Products
  • High-Rise Security and Fire Life Safety, 3rd edition

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing