Back to Data breach

Data breach

World's largest hotel chain under fire for data breach impacting 500 million customers

On November 30th, Marriott confirmed that a breach in the guest reservation database of Starwood Hotels, a subsidiary of Marriott, exposed data belonging to up to 500 million customers. This leaked information includes guests’ names, mailing addresses, phone numbers, email addresses, passport numbers, dates of birth, and payment card information, although not all guests were impacted equally by the breach.

What really happened

On September 8th, an internal security tool flagged unauthorized activity in the guest reservation database of Starwood Hotels. Marriott discovered that hackers had accessed customer information, encrypted it, and attempted to remove it. It took Marriott until late November to decrypt the information. During the investigation, Marriot discovered that hackers have had access to the reservation systems of many of its hotel chains since 2014. Starwood Hotels includes W Hotels, St. Regis, Sheraton Hotels & Resorts, Westin Hotels & Resorts, Le Méridien Hotels & Resorts, and timeshare properties.

Marriot mentioned that even though the stolen credit card details were encrypted, it could not rule out the possibility that the encryption keys were also taken by hackers. The company said that Marriott Group hotels are not believed to be affected, as Marriot Group’s reservation system is on a different network. Marriott has reported this incident to law enforcement officials.

Marriott is offering free web monitoring services for a year to all affected customers. This tool will monitor internet sites and alert customers if evidence of their personal information is found.

Don't want to make the news for the wrong reasons? Download ManageEngine Log360, the tool that can help combat internal and external security attacks.

Here's how ManageEngine can help

Log360, our comprehensive SIEM solution, can help your organization:

  • Detect cross-site scripting (XSS) attacks, malicious file installation, DoS attacks, SQL injection, and more with its real-time correlation capability. The solution also notifies you instantly about attempted and successful attacks, and provides detailed investigation reports to prevent future attacks.
  • Spot potential intrusions or unauthorized network access attempts by correlating your network's log data with the data from the global IP threat database and STIX/TAXII threat feed processors of Log360.
  • Detect potential insider threats with the user behavior analytics engine powered by machine learning, which creates a baseline of normal activities that are specific to each user and only notifies security personnel when there is a deviation from this norm.
  • Monitor user activity within a database; account and permission changes in database servers; and more.

Get started with Log360.

log-management-real-time-active-directory-change-auditing

+

Stay In The Know

Thank you

You will receive weekly cybersecurity news soon!

  • Please enter a business email id
  •  
  •  
    By clicking 'I'm Interested', you agree to processing of personal data according to the Privacy Policy.

2022 Zoho Corporation Pvt. Ltd. All rights reserved.