sb-au logo
Story image

Marriott International reports breach affecting 5.2 million customers

Marriott International, the hospitality company that operates and manages hotels across the world, yesterday revealed it had fallen victim to coordinated and wide-reaching cyber attack, potentially putting at risk 5.2 million hotel guests’ personal information.

Marriott said in statement that an ‘unexpected’ amount of guest information may have been accessed in mid-January this year, using the login credentials of two employees at one of the company’s franchise properties.

The attack was carried out via third-party software that Marriott hotel properties use to provide guest services.

The company says contact details, loyalty account information, partnerships and affiliation details, and preferences such as room and language preferences ‘may have been involved’ in the attack, affecting 5.2 million people who had stayed in Marriott properties in the past.

Marriott says the company had no reason to believe that the vulnerable information also included more sensitive data, like payment card information, account passwords or passport data.

In response, the company says it is in the process of emailing potentially affected customers with advice on the next steps to take but believes that the total costs related to this incident would not be significant.

This represents the second large data breach that the company has faced in the last two years, generating concern about Marriott’s cyber security hygiene.

"A global company like Marriott, which holds a massive amount of personal information about its guests, will always be an attractive target for bad actors,” says LogRhythm Labs senior director Andrew Hollister.

“Whilst this is the second data breach Marriott has reported in the last two years, there are some positives to draw from the statement released today.

“In the previous incident in 2018, Marriott detected signs of unauthorised activity going back four years. 

“In this new case, the activity appears to have begun in January 2020 and been detected during the course of February 2020. This is a significant improvement in time to detect and respond to a data breach,” says Hollister.

“Whilst a significant number of records has been breached, the reduced time to detect has no doubt contributed to the number being substantially lower than on the previous occasion.”

Cybersecurity company Sophos says the breach is potentially one of many large-scale attacks which may happen as a result of the worldwide trends of security systems being rendered vulnerable as a result of the COVID-19 pandemic. 

“[This breach] highlights the fact that, even during a global pandemic, criminals will not stop attacking us,” says Sophos senior security advisor John Shier.

“Even though no passwords, PINs, identity documents, or financial information was reportedly stolen, enough personal information was compromised that can be of use to identity thieves. 

“This information can be used to lend credibility to phishing emails and increase their chance of success,” says Shier.

“Let's not give cyber criminals an easy win during these unprecedented times stay vigilant against their dirty tricks. They won't rest, neither should we."

Story image
WatchGuard report tracks rise of network attacks in Q3
WatchGuard’s Q3 2020 Internet Security Report has called to attention the rise in attacks on corporate networks, even as many organisations shifted to remote work.More
Story image
Cybersecurity strategies must involve every part of the organisation - study
In the past year, a third of the breaches incorporated social engineering techniques and the cost of a breach caused by a human error averaged to $3.33 million. More
Story image
Dark net vendors wanting Bitcoin payments for unverified COVID-19 vaccines
As the medicines are being offered on the dark net, purchasers have no way of knowing whether they are genuine, according to Check Point.More
Story image
Microsoft top targeted brand by cyber criminals in Q4 2020
In Q4, 43% of all brand phishing attempts related to Microsoft (up from 19% in Q3), as threat actors continued to try to capitalise on people working remotely during the COVID-19 pandemic’s second wave. More
Story image
Hornetsecurity acquires Altaro, the latest in acquisition spree
The move is a culmination of a medley of acquisitions made by Hornetsecurity recently, following the January 2019 acquisition of Spamina, a Spanish cloud email security company, as well as EveryCloud, its British market partner, in early 2020.More
Story image
The current state of ransomware — and its future
Discoveries made by analysts at Sophos have unearthed a new development: ransomware code appears to have been shared across ‘families’, and some of the ransomware groups seemed to work in collaboration more than in competition with one another. More