Connect with us

CISO Blog

Marriott’s Massive Meltdown: A Tale of Neglect and Fallout

Marriott, the hotel giant that promised luxury and comfort, has instead delivered a nightmare of data breaches. Over the years, Marriott and its subsidiary, Starwood Hotels, have been a veritable buffet for hackers, leaving millions of customers’ personal information exposed.

The breaches were so egregious that Marriott has agreed to pay a hefty $52 million fine and implement stricter security measures. It’s like a slap on the wrist for a company that’s practically invited hackers to their digital party.

Published

on

Marriott, the hotel giant that promised luxury and comfort, has instead delivered a nightmare of data breaches. Over the years, Marriott and its subsidiary, Starwood Hotels, have been a veritable buffet for hackers, leaving millions of customers’ personal information exposed.

The breaches were so egregious that Marriott has agreed to pay a hefty $52 million fine and implement stricter security measures. It’s like a slap on the wrist for a company that’s practically invited hackers to their digital party.

Let’s recap the highlights of Marriott’s security disaster:

  • Breach after breach: From 2014 to 2020, Marriott suffered three major data breaches, exposing the personal information of hundreds of millions of customers.
  • Slow response: In some cases, these breaches went undetected for years, allowing hackers to feast on customer data.
  • Lax security: Marriott’s lax security practices, including outdated software and weak passwords, made it a prime target for cybercriminals.

It’s like Marriott left the front door wide open with a welcome mat inviting hackers in.

The fallout from these breaches has been significant:

  • Customer trust eroded: Millions of customers have had their personal information compromised, leading to a loss of trust in Marriott.
  • Financial penalties: The $52 million fine is a significant financial burden, but it’s a small price to pay for the damage done.
  • Reputation tarnished: Marriott’s reputation has taken a hit, and it may struggle to regain the trust of customers.

So, what can Marriott do to make amends?

  • Invest in security: Marriott needs to beef up its security measures, including implementing stronger password requirements, regularly patching software, and monitoring networks for suspicious activity.
  • Take responsibility: The company must acknowledge its mistakes and take steps to prevent future breaches.
  • Make amends: Marriott should offer additional compensation to affected customers and provide clear information about the steps they’re taking to protect their data.

It’s time for Marriott to wake up and smell the coffee. The days of lax security are over. Customers deserve better, and Marriott needs to step up its game.

Read more: Marriott’s Massive Meltdown: A Tale of Neglect and Fallout

The hotel giant will be held to higher security standards, including implementing a new annually reviewed security program. The first breach began in June 2014 and involved the payment card information of more than 40,000 Starwood customers; it went undetected for 14 months, until November 2015.

Starwood faced its second breach in July 2014. That intrusion went undetected for years — until 2018, when 339 million Starwood guest accounts were revealed to have been accessed by malicious actors, exposing various data, including 5 million unencrypted passport numbers. And finally, Marriott was breached again in 2018, a breach that went undetected until February 2020. In that incident, 5.2 million guest records were accessed, nearly 2 million of them belonging to Americans.

Going forward, Marriott and Starwood will have to certify compliance with the FTC annually for 20 years, and undergo independent third-party assessments every two years. Marriott has agreed to pay $52 million and to strengthen its data security practices in settlements related to three data breaches dating back to 2014.

The settlements announced today are two-fold: A resolution with 49 U.S. States Attorneys General and the District of Columbia requires the hospitality giant to pay $52 million to those entities. Separately, the Federal Trade Commission will require Marriott and its subsidiary Starwood to implement a “robust information security program.” Additionally the company has agreed to provide all customers in the United States with a way to request deletion of personal information associated with their email address or loyalty rewards account number.

“Marriott’s poor security practices led to multiple breaches affecting hundreds of millions of customers,” said Samuel Levine, director of the FTC’s Bureau of Consumer Protection.

“The FTC’s action today, in coordination with our state partners, will ensure that Marriott improves its data security practices in hotels around the globe.”

Connecticut co-led the multi-state case. Its attorney general, William Tong, said, “Companies have an obligation to take reasonable measures to protect consumer data security. Marriott clearly failed to do that, resulting in the breach of the Starwood computer network and the exposure of personal information for millions of its guests. This 50-state settlement, co-led by Connecticut forces a strong system of risk-based protections to guard against ever-evolving threats to cybersecurity. We will continue to work closely with our multistate partners across the country to ensure companies are taking all reasonable precautions to protect our personal information.”

Marriott announced plans to acquire Starwood in 2015 – and shortly after Starwood notified customers it had experienced a 14-month long data breach involving payment card information for more than 40,000 customers.

Once the $12.2 billion merger went through in 2016, Marriott became responsible for the data security practices of both brands. Two years later, in November 2018, Marriott revealed it had identified what is now termed the second breach, which had been begun in 2014 and involved the copying of information from about 340 million Starwood guests worldwide until it was discovered four years later.

According to the United States Federal Trade Commission, forensic examiners determined this breach was due to “malicious actors” compromising Starwood’s external-facing webserver and installing malware on its network. It said the introducers installed “key loggers, memory-scraping malware and remote access trojans” on more than 480 systems across 58 locations within Starwood’s system, including corporate, data center, customer contact center and hotel property locations.

Personal information stolen during this breach included more than 5.25 million unencrypted passport numbers, payment card numbers, email addresses, user names and dates of birth as well as Starwood loyalty numbers, stay information, flight information and more.

Marriott reported the third breach in March 2020, when it said hackers used login credentials of employees at a franchise property to gain access to Marriott’s network.

The intruders began stealing information in September 2018 – the same month the second breach was discovered – and continued until December 2018, then resumed in January 2020 until they were discovered in February 2020.

During that time they accessed more than 5.2 million guest records that the FTC said contained “significant amounts” of personal information. The FTC complaint alleges Marriott failed to do multiple things, including implementing appropriate password control, patching outdated software, monitoring network environments, implementing appropriate firewalls and applying adequate multifactor authentication.

The agreements with the FTC and the attorneys general indicate that Marriott makes no admission of liability with respect to the underlying allegations. Marriott manages and franchises more than 7,000 properties throughout the United States and across more than 130 other countries.

HONOLULU (KHON2) — The Hawai‘i Department of Commerce and Consumer Affairs has announced that a group of 50 state attorneys general has reached a settlement with Marriott International, Inc. This settlement is part of an investigation into a serious data breach affecting one of Marriott’s guest reservation systems.

The Federal Trade Commission (FTC) has also been involved and has reached a similar agreement with Marriott. As part of the settlement with the attorneys general, Marriott will:

  • Improve its data security practices.
  • Provide certain protections for consumers.
  • Pay $52 million to the states involved in the investigation. Hawai‘i will receive $438,045 from this payment.

Marriott bought Starwood in 2016 and took control of its computer network that same year. However, from July 2014 to September 2018, hackers accessed the system without being noticed. This breach affected 131.5 million guest records, mainly from customers in the United States. T

he leaked information included:

  • Contact details.
  • Gender.
  • Birth dates.
  • Starwood Preferred Guest information.
  • Reservation details.
  • Hotel stay preferences.
  • Some unencrypted passport numbers.
  • Unexpired payment card information.

After the breach was made public, a group of 50 attorneys general started looking into it.

Today’s settlement addresses claims that Marriott broke state consumer protection laws and failed to secure personal information properly. They did not take reasonable steps to protect customer data, especially when integrating Starwood’s systems. “When companies collect and keep consumer data, they must secure it,” said Mana Moriarty, Executive Director of the Office of Consumer Protection. “We will continue to hold businesses responsible for not doing this.”

Under the settlement, Marriott must improve its cybersecurity practices. Here are some specific measures they have to follow:

  1. Create a strong Information Security Program: This includes new security rules like using zero-trust principles, regular security updates to top management, and better training for employees on data security.
  2. Limit data collection and disposal: Marriott will collect less consumer data and dispose of it properly.
  3. Enhance security for consumer data: This involves better measures like:
    • Securing systems to limit hackers’ movement.
    • Keeping track of what data they have.
    • Ensuring critical security updates are applied quickly.
    • Monitoring user access and activity.
  4. Increase oversight of vendors: Marriott will pay special attention to “Critical IT Vendors” and have clear contracts with cloud service providers.
  5. Assess new acquisitions: If Marriott buys another company, they must quickly evaluate that company’s data security and fix any problems before combining systems.
  6. Independent assessments: Every two years for 20 years, an outside group will review Marriott’s security practices.

These terms are part of a thorough risk-based plan, where Marriott must check for risks not just once a year, but regularly. These checks will look at potential harm to consumers.

Additionally, as part of the settlement, Marriott will provide consumers with specific protections, including:

  • A way to delete their data, even if the law doesn’t require it.
  • Multifactor authentication for loyalty accounts like Marriott Bonvoy, which helps protect against unauthorized access.
  • Reviews of loyalty accounts if there are signs of suspicious activity.

Connecticut, Maryland, and Oregon, along with the District of Columbia, led the investigation. They were supported by other states including Alabama, Arizona, Arkansas, Florida, Nebraska, New Jersey, New York, Ohio, Pennsylvania, Vermont and many more.

This settlement is an important step in ensuring that companies protect consumer data and take responsibility when breaches happen.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

CISO Blog

The Scourge of Vulnerabilities and Our Ever-Vigilant Duty

Published

on

Hold onto your hats, folks! We’re diving headfirst into the murky waters of cyber vulnerabilities—a relentless scourge that’s as persistent as the Monday morning blues. In a world where everything and everyone is connected, staying vigilant isn’t just a best practice; it’s a downright necessity.

Let’s face it: vulnerabilities in our digital systems are the gifts that keep on giving—to cybercriminals, that is. Nobody wants to hear that their latest software update shipped with a gaping hole just begging to be exploited, yet here we are, playing an eternal game of cybersecurity whack-a-mole.

The problem is simple: as technology evolves, so do the avenues for attack. Every new feature, line of code, or interconnected device is a potential weak point waiting to be discovered. Don’t get me wrong—I love new tech as much as the next person, but security needs to evolve with it, preferably at twice the speed.

Think back to the headlines: massive data breaches, ransomware attacks, and even critical infrastructure takedowns. These aren’t just abstract incidents happening elsewhere; they’re reality checks demanding our constant attention. And with the Internet of Things (IoT) ushering in a tech revolution, we’re adding new devices faster than ever, increasing our attack surface exponentially. Who knew your smart toaster could be the weak link in your home network’s defense?

So, what’s the takeaway here? Vigilance, cloud partners, is key. Ensuring the security of our systems isn’t a one-time affair—it requires ongoing diligence and a proactive approach. Here are some golden nuggets to keep in mind:

  1. Patch, Patch, Patch: It sounds like a broken record, but timely updates and patches are your first line of defense against newly discovered vulnerabilities. Outdated software is a cybercriminal’s playground.
  2. Comprehensive Monitoring: Keep tabs on your networks and systems with robust monitoring tools. The sooner you detect an anomaly, the faster you can respond before it snowballs into a crisis.
  3. Security Education: Arm your workforce with knowledge. Regular training sessions, phishing simulations, and awareness campaigns should be part of your innate company culture. The more your people know, the less likely they are to be the unwitting door-opener for an attack.
  4. Zero Trust Approach: Treat every connection as a potential threat. Implement identity verification at every access point and minimize trust zones within your network.
  5. Incident Response Plans: Like a fire drill, everybody should know what to do when the alarm sounds. A well-rehearsed incident response plan can mean the difference between a minor hiccup and a major meltdown.
  6. Community Sharing: The cybersecurity community thrives on collaboration. Sharing intelligence about vulnerabilities and attack vectors can help us bolster defenses collectively. Be part of the conversation.

In this age of rampant connectivity, imperfections are the norm. Vulnerabilities will exist, but our approach to managing them dictates whether we become sitting ducks or remain at the forefront of defense. The threat landscape is ever-changing, but so too is our capacity to adapt, innovate, and strengthen our digital fortresses.

As guardians of the cyber realm, let’s commit to not only recognizing the challenges but rising to meet them head-on. Our vigilance today is an investment in the security of tomorrow. Stay sharp, stay aware, and remember: in cyberspace, complacency is not an option—it’s a liability. So gear up, troubleshooters, and let’s keep our networks safe and sound. Another day, another battle—let’s win it together!

Continue Reading

Troublemaker CISO

Silly Thoughts Lead to Epic Failures: The Cybersecurity Circus of 2025

Published

on

Welcome to the wild world of cybersecurity in 2025, where organizations are still finding new ways to trip over the same proverbial rake, all while the mainstream media sensationalizes each breach like it’s the latest blockbuster hit. You’d think by now that companies would realize the door isn’t just wide open; it’s practically got a neon sign flashing “Welcome, Hackers!” with an arrow pointing straight to their data vaults.

Let’s face it: sometimes, a silly thought leads to an epic failure—but sometimes, it’s the absence of thought that gets us into trouble! Just the other day, I stumbled upon a report about Company X getting breached through a poorly coded API. I mean, seriously, folks? It’s like someone threw caution to the wind and thought, “Hey, why not push this disaster to production? What could possibly go wrong?” Sure, hindsight is 20/20, but you can bet that the attackers didn’t find that open API just lying around; they probably spent ages scouting it like some kind of digital treasure hunt.

We defenders know the drill. There are countless layers of security designed to keep the bad guys at bay, but let’s be real: the only guarantees in life are death, taxes, and the fact that there is no such thing as a truly secure system. Period. Now, imagine this scenario: our crafty attacker finds that golden API and begins their meticulous exploration. We throw around terms like “lateral movement” and “privilege escalation,” but really, it’s no different than watching a fox in the henhouse.

Once they’ve sniffed out the jewels—your personal information, trade secrets, whatever they can turn into cash—they start assessing those defenses in what can only be described as a ruthless game of chess. They poke, they prod, and they wait to see how we react—like military strategists plotting their next grand operation, because let’s be honest, they want those spoils without ending up in a shiny orange jumpsuit.

Now, let’s talk about the fallout for the CISO, who likely spent months if not years building up their defense strategy only to find themselves in epic trouble the moment things go south. If the breach is public enough, CISO could find themselves facing the axe, their name dragged through the mud while everyone wonders how they let this happen. But let’s not forget: if the CISO did their job right (and wasn’t slacking off), they probably have documentation proving they rang the alarm bells and recommended necessary investments. Spoiler alert: leadership doesn’t necessarily prioritize funding for these recommendations—those discussions rarely make the headlines.

What happens next? After signing a gag order—oops, I mean a mutual separation agreement—the CISO walks away with a nice little cash settlement while the rest of us roll our eyes. Because here’s the kicker: most breaches are far from “point-and-click” attacks. The more sophisticated ones involve years of planning and a deep understanding of corporate networks, not just random DDOS attacks meant to annoy.

The chilling reality is that information security departments are stretched thinner than ever, expected to be omnipresent and all-knowing while facing tighter budgets, a shrinking workforce, and an ever-evolving tech landscape. It’s a high-wire act that would leave any seasoned performer with their heart in their throat.

So, as we continue to navigate this crazy cybersecurity circus in 2025, remember this: the stakes are high, the threats are real, and while we can acknowledge that silly thoughts lead to epic failures, we must also ensure that we’re all pulling our weight to mitigate the inevitable risks. After all, in the digital realm, ignorance is not bliss—it’s a recipe for disaster. Now, I’d love to chat about this more, but that might just be NSFW!

Continue Reading

CISO Blog

Salt Typhoon, an advanced persistent threat

Published

on

Sun Tzu made the statement “If you know the enemy and know yourself, you need not fear the result of a hundred battles.”

This highlights the significance of knowledge and strategy in overcoming adversaries. The more you know about your opponent, the better equipped you are to achieve victory.

So, to help you achieve that goal, here is some research on Salt Typhoon.

Salt Typhoon, an advanced persistent threat (APT) group, is a Chinese state-sponsored entity known for its cyber espionage activities and strategic operations aiming to disrupt critical infrastructures. Active since at least 2019, Salt Typhoon, also referred to as Earth Estries, FamousSparrow, GhostEmperor, and UNC2286, has been linked to China’s Ministry of State Security (MSS). This affiliation provides them with significant resources, protection, and strategic direction.

Targets and Objectives

Salt Typhoon primarily targets telecommunications companies, government bodies, and technology firms to gather crucial intelligence and exert strategic influence. Their operations span globally, focusing on regions such as North America, Southeast Asia, and Africa. Key targets include:

  • Telecommunications Providers: Collecting call metadata, intercepting communications, and tracing target movements.
  • Hotels: Tracking locations and movements of significant individuals.
  • Government Agencies: Extracting sensitive information for intelligence purposes.
  • Internet Service Providers (ISPs): Compromising systems managing court-authorized wiretaps.

Additional targets include military institutions, solar energy companies, financial bodies, NGOs, engineering firms, and law practices, reflecting a broad interest in sectors holding strategic or sensitive data.

Tactics, Techniques, and Procedures (TTPs)

Salt Typhoon employs a range of sophisticated tactics to infiltrate and exploit targeted networks:

  • Exploiting Vulnerabilities: Using both known and zero-day vulnerabilities in public-facing systems to gain access. Notable exploits include ProxyLogon (CVE-2021-26855) and various vulnerabilities in VPN configurations.
  • “Living off the Land” Techniques: Employing legitimate tools like PowerShell for stealthy operations, including reconnaissance and data exfiltration.
  • Custom Malware: Deploying bespoke malware such as SparrowDoor, GhostSpider, and the Demodex rootkit to maintain persistence and evade detection.
  • DLL Search-order Hijacking: Used to covertly deploy backdoors like SparrowDoor.
  • Lateral Movement: Utilizing tools such as PsExec and WinRAR for network navigation and data compression; deploying Certutil and BITSAdmin for downloading malicious scripts.
  • Credential Harvesting: Employing tools like Mimikat_ssp and new NinjaCopy variants for credential extraction and file exfiltration.

Notable Campaigns

Salt Typhoon’s operations have included high-impact campaigns:

  • ProxyLogon Exploitation (2021): A swift exploitation of Microsoft Exchange server vulnerabilities following patch releases.
  • Telecom Breaches (2024): Major breaches of US telecom giants like AT&T and Verizon, compromising sensitive communications data.
  • ISP Infiltration: Accessing sensitive ISP data, including information from legal wiretaps.
  • Political Targeting: Attempts to compromise phones of high-profile US political figures, indicating ambitions to influence political processes.

Government and Industry Responses

In response to Salt Typhoon’s aggression, various measures have been implemented:

  • Cyber Unified Coordination Group: A US initiative to mitigate breaches and investigate security lapses.
  • Guidance Issuance: Recommendations for telecom sectors to detect, address vulnerabilities, and enhance cybersecurity.
  • China Telecom Ban: A move to limit possible espionage activities.
  • Enhanced Cybersecurity Measures: Promotion of zero-trust architecture, continuous monitoring, and collaboration between private and public entities.

Security agencies like CISA, NSA, and the FBI have also provided guidelines to strengthen defenses against such threats, emphasizing robust authentication processes and secure communications.

Impact and Implications

Salt Typhoon’s espionage activities have significant ramifications:

  • Threatening Privacy and Security: Theft of communications records undermines privacy and security protocols.
  • Jeopardizing Law Enforcement: Breach of wiretap systems hampers law enforcement capabilities.
  • Critical Infrastructure Exposure: Endangers sectors crucial to national security and economic stability, highlighting vulnerabilities to external threats.
  • Political Process Influence: Attempts to compromise political figures imply a strategic approach to destabilize confidence in cybersecurity governance.

Defense Strategies

Organizations are advised to adopt comprehensive defense strategies to counteract Salt Typhoon:

  • Network Segmentation and Monitoring: Ensuring critical systems are isolated and network activity is consistently monitored.
  • Regular Patch Management: Keeping up-to-date with security patches to close vulnerability exploitation windows.
  • Zero Trust Architecture: Implementing strict access control, communication encryption, and principle of least privilege.
  • Threat Intelligence Utilization: Leveraging threat intelligence data to preemptively guard against known TTPs.
  • Secure by Design Principles: Encouraging integration of security measures throughout software development.

Salt Typhoon represents a significant cyber threat, equipped with sophisticated techniques and far-reaching strategic objectives. Their focus on espionage and infrastructure disruption urges a fortified global cybersecurity stance. Continuous vigilance strengthened cybersecurity protocols, and collaboration between public and private sectors.

Continue Reading

Trending

Copyright © 2017 Keller Holdings