Motivations of hackers are unclear, but proprietary Wi-Fi may have been a target.
Read the whole story
Read the whole story
3 billion customers at Yahoo, half a billion at Marriot??
I think those numbers are extremely inflated. Perhaps counting people that didn't have a customer account as a new customer each time they used a service?
I used to work at a Marriott (before I changed careers to software development, lol), and that's probably unique customer IDs, not unique customers which would be only a portion of that. I worked at a higher end property that had a lot of guests properly assigned to accounts with a lot of attached information (stay preferences, etc), but if you go to a Fairfield Inn or something then you can search somebody's name and pull up 5 IDs that are all probably theirs from various stays within the company's portfolio, just stays where the guest didn't bother to use an awards account or didn't let the front desk associate them with one.
This is still nuts though.
I haven't seen any mention of whether in-room, ahem, "entertainment" purchases might be divulged by this. Is that a possibility?
Good question. Though, why anyone would pay for adult channels vs just using the internet is beyond me.
Don't these businesses have data retention policies? like delete sensitive data after X days/months*? Or were they just hedging their bets to build some BigData advertising thing to better target their customers. I would love to see some accountability, to the point, that businesses will be scared into not wanting data for fear of reprisal during these breaches.
*I realize that if the system is compromised, getting around data policies is trivial, but still, the extra mile could have minimized these kind of things.
"Hacker" You mean the disgruntled IT guy that lost his job in the merger but left a back door open that Marriott security did catch?
Just speculation, but ockham's razor.
Okay, but how did that contribute to the customer data breach?So what is the implication about the wifi exactly? Jamming rogue hotspots forced people onto the hotel's wifi, then what? And if people were not forced onto the hotel's wifi, wouldn't plenty of people have used it anyway because not everyone brings their own hotspot.
The issue was that Marriott charged for using their Wi-Fi, so they made money by blocking people from using the own hot spots. Only the higher end Marriott brands charge, brands like Courtyard give free Wi-Fi.
TBH, I think that Marriott is just trying to shift blame to the wifi policy when it was other aspects of their IT security that enabled the data to be copied.
I always wonder how they know what data was compromised in their investigation. One would assume if the system can be compromised for many years with nobody knowing, there would not be sophisticated audit trails of database access. So how do they know which columns in the database were compromised and which records were affected? Usually a read on a database will not leave a detailed trace unless full auditing is enabled.
in this case I believe they found a file of encrypted data someone was trying to exfiltrate from their systems, once the file was decrypted they could see exactly what data it contained, so at that point they know who and what.
in many other cases, it's log files. most databases have access logs for example
As a Starwoods member, can I get and email, a smoke signal, something to tell me what the hell happened. At least a driveby "Hey you might be screwed, but hey at least we aren't Equifax" kind of thing???
Check your starwood profile - it may not have an email address associated with it after they migrated the SPG accounts to Marriott's systems. Mine doesn't, which would also explain why I wasn't notified when my SPG points expired![]()
When something like this happens, I often think, "That's so much data that hopefully they'll just never get to mine."
Also, I have no idea what people do with this data, so I probably have no idea what I'm talking about/thinking.
When something like this happens, I often think, "That's so much data that hopefully they'll just never get to mine."
Also, I have no idea what people do with this data, so I probably have no idea what I'm talking about/thinking.
Dozens of hotels over many years, I can't keep track of where I stayed for vacations/business but I have to assume I'm affected by this breach. The CC number I'm really not that worried about, it's insured and I can get a new one within a week. The Passports are another issue on another level. Not only an expensive pain to replace but I assume I should be worried that the old information is in the wild now. Never understood and definitely never felt comfortable about hotels or cruise ships holding your passport during a stay.
So what is the implication about the wifi exactly? Jamming rogue hotspots forced people onto the hotel's wifi, then what? And if people were not forced onto the hotel's wifi, wouldn't plenty of people have used it anyway because not everyone brings their own hotspot.
What part was proprietary, like were the AP's and the switches behind it completely custom made for starwood, or were they just <name brand> with the DDOS-rogue-AP option set?
Imagine if corporations were allowed to use tech to penetrate through walls, and take pictures of everyones homes.
Now imagine the data is stolen, publicized, and a rash of successful burglaries came out as a result.
You would rightly first blame the company, but when the company didnt get any meaningful punishment you should also blame the government for not regulating this kind of business, or following up on failure.
Marriott says it confirmed unauthorized access to the Starwood guest reservation database on November 19, which contained guest information dating back to September 10, 2018. The hackers had allegedly copied encrypted information from the Starwood reservation database. When Marriott was able to decrypt the information, the company found that of the approximately 500 million guests that had their name and contact information stolen, a subset of 327 million had "some combination of name, mailing address, phone number, email address, passport number, Starwood Preferred Guest (“SPG”) account information, date of birth, gender, arrival and departure information, reservation date, and communication preferences."
To make matters worse, Marriott says that credit card numbers were likely stolen as well. Although the numbers were encrypted using the AES-128 standard, Marriott says it cannot rule out that the hackers also stole the keys to decrypt the credit card number information.
One thing for sure. GDPR is going to hit them very, very hard. Their last year revenue was US$22.894 billion. 4% of that as fine is US$915M. Most of their 2017 profit. Going to be "fun" explaining the cost to shareholders.
a breach does not automagically invoke GDPR fines..
So far they appear to be playing by GDPR rules, for example they just decrypted the data less than two weeks ago, and the breach is already announced. Prior to the decrypt they couldn't really notify as they had no idea who and what-data was affected.
Access appeared to start (based on my reading) back in 2014, prior to both Marriott acquiring Starwood, and long before obligations to secure private data under GDPR came into play. So even if (as I suspect) Starwood's IT security was a complete dumpster file, that would be basically ex-post-facto with respect to GDPR.
If they act in good faith, follow GDPR regs regarding notifications etc, they are unlikely to trigger any severe fines under GDPR..
I'd predict that the first huge fines we see will be for someone who totally stonewalls, delays reporting, and basically tries to ignore GDPR.. I think there's one or more of those already in play. My money on the moment is on Cathay Pacific event we first heard about in October, involving 9.4 mill users worth of data including passport numbers. They discovered stuff in March, by May they knew the details.. but did not report until about 6 months later.. GDPR went into effect in May.. they HAD to know that.. but delayed reporting for half a year..
That's who'd be in my sights for fines if I was a GDPR regulator.
EDIT: the forbes piece another poster linked does seem to indicate they may have failed in initial reporting to GDPR authorities that a breach was detected.. OTOH there's a lot of wiggle room in wording like "without unreasonable delay" and the size and scope of the investigation very likely play into what is considered reasonable in any given situation. I'm also not sure for a company not located in the EU, who the proper supervisory authority is (each EU nation has one basically)
My money is still on Cathay as the folks to get the first big slapdown.
Some decent high level info around breach reporting obligations can be found here: https://iapp.org/news/a/top-10-operatio ... -the-gdpr/
Plus why are they storing all this? Every time I've stayed at a hotel where credit card and passport mattered, they asked for it at the time. Prudent security would be to then not store this data any longer than needed.
Lets see if I can be positive about this... Here we go:
Your Honor, I'm sorry, but there is no way to tell based on Credit card information or reservations, etc. that I was the person at this location. My personal identifiable information was disclosed by Equifax, and the Marriott hack... It could be anybody at this point.
Thanks for all the Alibis shitty security folks! Swell.
"None of your business" is a NGO founded by Max Schrems, the Austrian guy who successfully went after FB in the EU before GDPR.
(Disclaimer: I became a Gold member as soon as I heard of it, to help kickstart that project)
<nods>I really wish there were more severe punishments for companies (and culpable executives!) when these breaches happen. It would:
A) Maybe make this a little less common, and -
B) Actually make these companies "deeply regret" these breaches.
But hey, I look forward to yet another year of completely useless credit account / personal information monitoring, just like I have from OPM, Equifax, etc, etc...
Luckily/sadly, technology capable to make short work of 500M records is now widely available and inexpensive. Amazon, Google and Microsoft will sell you that kind of storage and processing power for pennies or dollars per hour.When something like this happens, I often think, "That's so much data that hopefully they'll just never get to mine."
Also, I have no idea what people do with this data, so I probably have no idea what I'm talking about/thinking.
Why the guest WiFi network is connected to the corporate network that handles billing is left as an exercise to the reader."Wi-Fi at these hotels could be a vector of attack. In 2015, before Marriott had acquired Starwood Hotels, the company briefly tried to block guests' personal hotspots at some properties in order to force their guests to pay for the Marriott proprietary Wi-Fi network. The Federal Communications Commission (FCC) ordered Marriott to stop that practice."
Oh come on! I just stayed at a Sheriton, and they were so generous with their free Wi-Fi: a full 7 megabits! How hospitable!
I'm certain PhantomPhoton was merely referring to the occasional minibar treat.I haven't seen any mention of whether in-room, ahem, "entertainment" purchases might be divulged by this. Is that a possibility?
Doubtful.
If it was, you can be sure Washington would be batting an eye, the same way they were very suspiciously concerned about video rental histories all those years ago for no particular reason wink wink.
TIL travel agencies still exist.Not good. I work for a UK travel agency. I emailed this article to all@
That's a non sequitur.Alas, since the original breach happened in 2014, four years before GDPR took effect, the new regulations won't affect Marriott/Starwood at all. Like most major multi-national corporations, they get a free pass.One thing for sure. GDPR is going to hit them very, very hard. Their last year revenue was US$22.894 billion. 4% of that as fine is US$915M. Most of their 2017 profit. Going to be "fun" explaining the cost to shareholders.
WTF does DNSSEC have to do with a data breach?"Hacker" You mean the disgruntled IT guy that lost his job in the merger but left a back door open that Marriott security did catch?
Just speculation, but ockham's razor.
...or finally got around to implementing DNSSEC.
At this point, I think I've got free locks on all my credit pretty much for life. The irony is that for the last 15 years, I've not used any credit at all, and conducted all of my purchases on a cash-only basis. It makes monitoring my credit report brain-dead simple: Any credit activity at all is fraud.
It’s huge in UK despite all online booking sites.TIL travel agencies still exist.Not good. I work for a UK travel agency. I emailed this article to all@
WTF does DNSSEC have to do with a data breach?"Hacker" You mean the disgruntled IT guy that lost his job in the merger but left a back door open that Marriott security did catch?
Just speculation, but ockham's razor.
...or finally got around to implementing DNSSEC.
<nods>I really wish there were more severe punishments for companies (and culpable executives!) when these breaches happen. It would:
A) Maybe make this a little less common, and -
B) Actually make these companies "deeply regret" these breaches.
But hey, I look forward to yet another year of completely useless credit account / personal information monitoring, just like I have from OPM, Equifax, etc, etc...
Home Depot, Target, Mariott, the VA - the list of breaches in which my personal credit information has been stolen is long and sad.
At this point, I think I've got free locks on all my credit pretty much for life. The irony is that for the last 15 years, I've not used any credit at all, and conducted all of my purchases on a cash-only basis. It makes monitoring my credit report brain-dead simple: Any credit activity at all is fraud.
But the issue is that these breaches have all but destroyed any pretense to privacy, and yet we don't have legislation that mandates the kind of credit monitoring services that everyone at this point (like everyone on the fucking PLANET) should be getting as a matter of course.
Because it seems that ALL of the personal, private information that has been provided to businesses have been compromised by some breach somewhere in the last couple of years.
I mean, where has anyone who HASN'T been breached been living?