CISO Blog
Marriott’s Massive Meltdown: A Tale of Neglect and Fallout
Marriott, the hotel giant that promised luxury and comfort, has instead delivered a nightmare of data breaches. Over the years, Marriott and its subsidiary, Starwood Hotels, have been a veritable buffet for hackers, leaving millions of customers’ personal information exposed.
The breaches were so egregious that Marriott has agreed to pay a hefty $52 million fine and implement stricter security measures. It’s like a slap on the wrist for a company that’s practically invited hackers to their digital party.

Marriott, the hotel giant that promised luxury and comfort, has instead delivered a nightmare of data breaches. Over the years, Marriott and its subsidiary, Starwood Hotels, have been a veritable buffet for hackers, leaving millions of customers’ personal information exposed.
The breaches were so egregious that Marriott has agreed to pay a hefty $52 million fine and implement stricter security measures. It’s like a slap on the wrist for a company that’s practically invited hackers to their digital party.
Let’s recap the highlights of Marriott’s security disaster:
- Breach after breach: From 2014 to 2020, Marriott suffered three major data breaches, exposing the personal information of hundreds of millions of customers.
- Slow response: In some cases, these breaches went undetected for years, allowing hackers to feast on customer data.
- Lax security: Marriott’s lax security practices, including outdated software and weak passwords, made it a prime target for cybercriminals.
It’s like Marriott left the front door wide open with a welcome mat inviting hackers in.
The fallout from these breaches has been significant:
- Customer trust eroded: Millions of customers have had their personal information compromised, leading to a loss of trust in Marriott.
- Financial penalties: The $52 million fine is a significant financial burden, but it’s a small price to pay for the damage done.
- Reputation tarnished: Marriott’s reputation has taken a hit, and it may struggle to regain the trust of customers.
So, what can Marriott do to make amends?
- Invest in security: Marriott needs to beef up its security measures, including implementing stronger password requirements, regularly patching software, and monitoring networks for suspicious activity.
- Take responsibility: The company must acknowledge its mistakes and take steps to prevent future breaches.
- Make amends: Marriott should offer additional compensation to affected customers and provide clear information about the steps they’re taking to protect their data.
It’s time for Marriott to wake up and smell the coffee. The days of lax security are over. Customers deserve better, and Marriott needs to step up its game.
Read more: Marriott’s Massive Meltdown: A Tale of Neglect and FalloutThe hotel giant will be held to higher security standards, including implementing a new annually reviewed security program. The first breach began in June 2014 and involved the payment card information of more than 40,000 Starwood customers; it went undetected for 14 months, until November 2015.
Starwood faced its second breach in July 2014. That intrusion went undetected for years — until 2018, when 339 million Starwood guest accounts were revealed to have been accessed by malicious actors, exposing various data, including 5 million unencrypted passport numbers. And finally, Marriott was breached again in 2018, a breach that went undetected until February 2020. In that incident, 5.2 million guest records were accessed, nearly 2 million of them belonging to Americans.
Going forward, Marriott and Starwood will have to certify compliance with the FTC annually for 20 years, and undergo independent third-party assessments every two years. Marriott has agreed to pay $52 million and to strengthen its data security practices in settlements related to three data breaches dating back to 2014.
The settlements announced today are two-fold: A resolution with 49 U.S. States Attorneys General and the District of Columbia requires the hospitality giant to pay $52 million to those entities. Separately, the Federal Trade Commission will require Marriott and its subsidiary Starwood to implement a “robust information security program.” Additionally the company has agreed to provide all customers in the United States with a way to request deletion of personal information associated with their email address or loyalty rewards account number.
“Marriott’s poor security practices led to multiple breaches affecting hundreds of millions of customers,” said Samuel Levine, director of the FTC’s Bureau of Consumer Protection.
“The FTC’s action today, in coordination with our state partners, will ensure that Marriott improves its data security practices in hotels around the globe.”
Connecticut co-led the multi-state case. Its attorney general, William Tong, said, “Companies have an obligation to take reasonable measures to protect consumer data security. Marriott clearly failed to do that, resulting in the breach of the Starwood computer network and the exposure of personal information for millions of its guests. This 50-state settlement, co-led by Connecticut forces a strong system of risk-based protections to guard against ever-evolving threats to cybersecurity. We will continue to work closely with our multistate partners across the country to ensure companies are taking all reasonable precautions to protect our personal information.”
Marriott announced plans to acquire Starwood in 2015 – and shortly after Starwood notified customers it had experienced a 14-month long data breach involving payment card information for more than 40,000 customers.
Once the $12.2 billion merger went through in 2016, Marriott became responsible for the data security practices of both brands. Two years later, in November 2018, Marriott revealed it had identified what is now termed the second breach, which had been begun in 2014 and involved the copying of information from about 340 million Starwood guests worldwide until it was discovered four years later.
According to the United States Federal Trade Commission, forensic examiners determined this breach was due to “malicious actors” compromising Starwood’s external-facing webserver and installing malware on its network. It said the introducers installed “key loggers, memory-scraping malware and remote access trojans” on more than 480 systems across 58 locations within Starwood’s system, including corporate, data center, customer contact center and hotel property locations.
Personal information stolen during this breach included more than 5.25 million unencrypted passport numbers, payment card numbers, email addresses, user names and dates of birth as well as Starwood loyalty numbers, stay information, flight information and more.
Marriott reported the third breach in March 2020, when it said hackers used login credentials of employees at a franchise property to gain access to Marriott’s network.
The intruders began stealing information in September 2018 – the same month the second breach was discovered – and continued until December 2018, then resumed in January 2020 until they were discovered in February 2020.
During that time they accessed more than 5.2 million guest records that the FTC said contained “significant amounts” of personal information. The FTC complaint alleges Marriott failed to do multiple things, including implementing appropriate password control, patching outdated software, monitoring network environments, implementing appropriate firewalls and applying adequate multifactor authentication.
The agreements with the FTC and the attorneys general indicate that Marriott makes no admission of liability with respect to the underlying allegations. Marriott manages and franchises more than 7,000 properties throughout the United States and across more than 130 other countries.
HONOLULU (KHON2) — The Hawai‘i Department of Commerce and Consumer Affairs has announced that a group of 50 state attorneys general has reached a settlement with Marriott International, Inc. This settlement is part of an investigation into a serious data breach affecting one of Marriott’s guest reservation systems.
The Federal Trade Commission (FTC) has also been involved and has reached a similar agreement with Marriott. As part of the settlement with the attorneys general, Marriott will:
- Improve its data security practices.
- Provide certain protections for consumers.
- Pay $52 million to the states involved in the investigation. Hawai‘i will receive $438,045 from this payment.
Marriott bought Starwood in 2016 and took control of its computer network that same year. However, from July 2014 to September 2018, hackers accessed the system without being noticed. This breach affected 131.5 million guest records, mainly from customers in the United States. T
he leaked information included:
- Contact details.
- Gender.
- Birth dates.
- Starwood Preferred Guest information.
- Reservation details.
- Hotel stay preferences.
- Some unencrypted passport numbers.
- Unexpired payment card information.
After the breach was made public, a group of 50 attorneys general started looking into it.
Today’s settlement addresses claims that Marriott broke state consumer protection laws and failed to secure personal information properly. They did not take reasonable steps to protect customer data, especially when integrating Starwood’s systems. “When companies collect and keep consumer data, they must secure it,” said Mana Moriarty, Executive Director of the Office of Consumer Protection. “We will continue to hold businesses responsible for not doing this.”
Under the settlement, Marriott must improve its cybersecurity practices. Here are some specific measures they have to follow:
- Create a strong Information Security Program: This includes new security rules like using zero-trust principles, regular security updates to top management, and better training for employees on data security.
- Limit data collection and disposal: Marriott will collect less consumer data and dispose of it properly.
- Enhance security for consumer data: This involves better measures like:
- Securing systems to limit hackers’ movement.
- Keeping track of what data they have.
- Ensuring critical security updates are applied quickly.
- Monitoring user access and activity.
- Increase oversight of vendors: Marriott will pay special attention to “Critical IT Vendors” and have clear contracts with cloud service providers.
- Assess new acquisitions: If Marriott buys another company, they must quickly evaluate that company’s data security and fix any problems before combining systems.
- Independent assessments: Every two years for 20 years, an outside group will review Marriott’s security practices.
These terms are part of a thorough risk-based plan, where Marriott must check for risks not just once a year, but regularly. These checks will look at potential harm to consumers.
Additionally, as part of the settlement, Marriott will provide consumers with specific protections, including:
- A way to delete their data, even if the law doesn’t require it.
- Multifactor authentication for loyalty accounts like Marriott Bonvoy, which helps protect against unauthorized access.
- Reviews of loyalty accounts if there are signs of suspicious activity.
Connecticut, Maryland, and Oregon, along with the District of Columbia, led the investigation. They were supported by other states including Alabama, Arizona, Arkansas, Florida, Nebraska, New Jersey, New York, Ohio, Pennsylvania, Vermont and many more.
This settlement is an important step in ensuring that companies protect consumer data and take responsibility when breaches happen.
CISO Blog
Season 2 Episode 5 of The Troublemaker CISO: Black Basta Unmasked – A Chat Log Reveal
Buckle up, folks! The notorious Black Basta ransomware gang just took a major hit as their internal chat logs got spilled online. This isn’t just your average leak—it’s a treasure trove revealing their dark secrets, shady tactics, and the infighting simmering among the ranks. Want to know how they operate, who’s running the show, and how you can fortify your defenses against these digital pirates? Dive into the chaos of Black Basta with us and discover how even the murkiest corners of cybercrime can get shed light on!

Hold onto your hats, folks, because in a twist likely to make even the most seasoned hackers cringe, the infamous Black Basta ransomware gang just got hit with a dose of exposure. In February 2025, their internal chat logs spilled onto the internet, lifting the veil on their clandestine operations and potentially outing some key players behind the digital mayhem.
Who is Black Basta?
If you want the full backstory check out our deep dive into Black Basta, available here
Here is the short version: Emerging in April 2022, Black Basta quickly burst onto the scene as a formidable Ransomware-as-a-Service (RaaS) operation. By targeting sectors ranging from healthcare to entertainment, this gang’s reputation precedes them—over 500 organizations globally can attest to their wrath. Their calling card? The notorious double extortion play: encrypt the system and filch sensitive data, then demand a ransom with the threat of public leaks if unpaid.
Word on the street suggests Black Basta might be the unholy offspring of the now-defunct Conti ransomware and FIN7 threat actor groups. Whether a fusion or a reincarnation, they’re built on a foundation of bad intentions and digital crime prowess.
Digging Into Their Methods
With a toolbox full of advanced techniques, Black Basta crafts their attack strategy like a maestro:
– Starting Point: They breach defenses with spear-phishing, insider help, or buying network access. Recently, they even resorted to misusing Microsoft Teams, impersonating IT help desks to trick employees into opening their networks wide open.
– Onward and Upward: Once inside, they move laterally, scooping up credentials with tools like QakBot and Mimikatz. Vulnerabilities like ZeroLogon and PrintNightmare? They exploit those like kids in a candy store.
– Keeping Tabs: Using Cobalt Strike Beacons and SystemBC, they maintain a firm grip on compromised systems.
– The Double Hit: Before encrypting files and appending their signature “.basta” extension, they disable security measures and exfiltrate data with tools such as Rclone and WinSCP, leaving a ransom note as the cherry on top.
The Chat Log Leak Bombshell
Enter the catalyst for chaos: a character named ExploitWhispers unleashed reams of the gang’s internal chat messages via the Matrix platform, covering conversations from September 2023 to September 2024. The logs unveil more than just tactical playbooks—they expose friction and deceit within Black Basta’s ranks.
PRODAFT, keen-eyed cyber defenders, suggest this leak might stem from discord following alleged attacks on Russian banks—a tale not too dissimilar from the notorious Conti leaks. Leaked messages hint at some operators double-crossing victims by taking ransom without decryptors. Some top dogs ditched for rival groups while the rest grappled with the realization that Black Basta’s punch was getting weaker.
And guess what? Names emerged in the chats:
– Lapa: An admin.
– Cortes: Linked to QakBot.
– YY: The prime administrator.
– Trump (aka GG and AA): Allegedly Oleg Nefedov, the head honcho.
Security researchers are scrutinizing the logs, eager to piece together the digital puzzle, with Hudson Rock even rolling out an LLM to delve deeper.
Ladies and gents, as we peer through this unexpected window into the underworld, remember: even the darkest recesses of the internet can be dragged into the light. Keep eyes peeled, ears to the ground, and let’s keep giving troublemakers like Black Basta a run for their crypto.
CISO Blog
Season 2 Episode 4 of The Troublemaker CISO: Salt Typhoon – An Unrelenting Storm on Telecoms
In the relentless digital battleground of 2025, Salt Typhoon is churning up a storm that telecoms can’t ignore. This state-sponsored cyber squad is at it again, infiltrating networks and dodging detection with their infamous espionage tactics. Targeting telecom giants worldwide, they’re exploiting vulnerabilities faster than you can say “patch it!” How do we defend against this relentless assault? By building robust, multi-layered defenses and staying one step ahead. Ready to weather the storm, troubleshooters? Dive in to uncover the strategies that can fortify our digital fortress against Salt Typhoon’s unyielding deluge.

Ladies and gentlemen, buckle up, because Salt Typhoon is back at it, causing a ruckus in our digital playgrounds. This Chinese state-sponsored APT group is no stranger to controversy, and February 2025 has them splashed across headlines once more. Their playground? Telecommunications and critical infrastructure. Their game? Cyber espionage for world domination, or at least to gather intelligence and strategic advantage.

How It All Began
Salt Typhoon blustered onto the scene around 2020, quickly turning into a high-priority headache for cybersecurity pros everywhere. They cut their teeth by:
- Nabbing holes in public-facing servers like Microsoft Exchange to break in.
- Spying on hotels, governments, and law firms, trying to catch influential figures off guard.
- Crafting sneaky backdoors like SparrowDoor and Demodex to stick around on breached systems.
- Dodging detection with top-notch anti-forensic shenanigans.
Over the years, their style evolved, adding “living off the land” tactics and honing in on juicier targets.
Read the full Threat report on Salt Typhoon
The 2025 Storm Surge
Fast forward to the chaos of 2025, and Salt Typhoon is back under the spotlight:
- Busting into U.S. telecom bones through unpatched Cisco IOS XE devices. Ouch!
- Attacking over 1,000 Cisco network gadgets worldwide, hitting the U.S., South America, and India hard.
- Compromising telecom giants like a U.S. ISP, U.K. affiliate networks, a South African provider, an Italian ISP, and a major player in Thailand.
- Deploying GhostSpider malware to weave their web.
- Exploiting well-trodden vulnerabilities in Cisco gear—CVE-2023-20198 and CVE-2023-20273—to snag admin access.
- Probing universities for their sweet research in telecom, engineering, and tech.
Their focus? Espionage, persistence, and staying ahead of geopolitical showdowns by intercepting data flows whenever it suits them.
The Fallout
Salt Typhoon’s actions ripple far beyond just cybersecurity headaches:
- National security risks: Breaching surveillance systems jeopardizes law enforcement and national operations.
- Data privacy violations: Personal and sensitive info is laid bare, compromising organizations and individuals.
- Threats to critical infrastructure: Telecommunication disruptions can snowball, impacting countless sectors.
Batten Down the Hatches
What’s a savvy guardian of cyberspace to do? Here’s how to withstand the storm:
- Roll out robust security frameworks like zero-trust architectures and keep vigilant with continuous monitoring.
- Patch those vulnerabilities, stat! Quickly seal any discovered holes to keep your defenses tight.
- Boost network visibility and keep an eagle eye on unusual behavior.
- Fortify infrastructure with segmentation, access controls, and souped-up VPN gateways.
- Share the wisdom: Stay in the know about Salt Typhoon’s latest tricky tactics.
- Bolster those Cisco devices.
Taking a hands-on, multi-layered approach is the only way to stay ahead of Salt Typhoon and other nefarious state-sponsored groupies. Let’s keep the umbrella of preparedness over our heads in the fast-moving digital storm. Stay sharp, troubleshooters—the world depends on it!
CISO Blog
Season 2 Episode 3 of The Troublemaker CISO: Trusting Third-Party Security Promises – The Risks We Forget

In today’s digital reimagining, where digital is king and cyber threats are the court jesters causing chaos, we’ve placed a precarious trust in third-party promises to shield us from scammers and ne’er-do-wells. But guess what? These promises too often teeter like a house of cards, leaving us exposed when the wind blows wrong. This tale, sponsored by Bitdefender, unravels the shaky reality we’ve woven with telco strategies for consumer security in 2025.

Telcos worldwide are ramping up spending on consumer security software, set to hit $606 million by 2030. Despite healthy growth forecasts, what’s more important to note is the increase in high-impact, multi-platform scams. Scammers are evolving like they just binged on a tech-advancement series, and it’s up to us to keep pace.
Here’s a harsh dose of reality: as much as 70% of telcos’ spending goes into endpoint security, yet large-scale destruction like Windstream’s 600,000 router obliteration in 2023 sounds the alarm against complacency. With AI enhancing scams, from phishing emails to identity spoofing, the threat is more pervasive and personal than ever.
But let’s not put all the security eggs in the telco basket. As consumers, we’ve got a role to play too. Here’s a guide for you to stay a step ahead of scammers:
- Educate Yourself: Knowledge is your first layer of defense. Familiarize yourself with common scam tactics. Don’t blindly trust caller IDs and do learn to recognize phishing attempts.
- Use Strong, Unique Passwords: Trust me, “1234” is not a password, it’s an invitation. Use complex passwords and change them regularly, or better yet, use a password manager.
- Enable Multi-Factor Authentication (MFA): Add another hurdle for bad actors. If one factor is compromised, a second can prevent unauthorized access.
- Be Skeptical of Unsolicited Communications: If a bank, telco, or other service provider contacts you out of the blue asking for personal info, be skeptical. Verify the legitimacy of the request through official channels.
- Regularly Update Software: Ensure all devices, from your smartphones to your smart fridges, are current. Updates often include patches for newly-discovered vulnerabilities.
- Consider Dedicated Security Apps: Use apps like Bitdefender’s ‘Scam Alert’ which provide pop-up notifications of suspicious activity across messaging platforms. These supplements can offer an added layer of scrutiny against scams.
- Beware of Fake Identity Red Flags: AI-generated lures are getting more convincing, so question authenticity—even the quick glance at a familiar email domain isn’t enough. Always double-check for discrepancies.
While telcos and tech companies like Bitdefender work tirelessly to innovate defense frameworks, it’s crucial we arm ourselves with awareness and active participation. Remember, in this interconnected landscape, your vigilance is as potent a defense as any firewall. Scammers never clock out—and neither should your focus on personal security.
So, folks, let’s keep our shields up and minds sharper. In this game of digital survival, staying one step ahead is not just an advantage—it’s essential. Prepare yourselves, maintain skepticism, and keep those cybersecurity layers thick and many. Stay safe out there, troubleshooters—the world needs your digital resilience.
-
CISO Blog2 months ago
Salt Typhoon, an advanced persistent threat
-
Organizational Transformation4 months ago
Digital Transformation: Shaping the Future of Modern Enterprises
-
Threat Actors4 months ago
The Russian Bear Unleashed: The Cyber Threat of APT28
-
CISO Blog4 months ago
The Troublemaker’s Take on Liminal Panda
-
Digital Transformation4 months ago
The Importance of Digital Transformation in Today’s Business World
-
CISO Blog1 month ago
It’s Time to Close the Software Understanding Gap
-
CISO Blog3 months ago
Part 2 of keeping our parents digitally safe
-
CISO Blog5 months ago
NIST Drops Password Complexity and Mandatory Reset Rules: A New Era for Password Security