Monday, February 10, 2025
HomeCyber Security NewsMarriott Hacked - Over 20 GB of Data Including Credit Card Leaked

Marriott Hacked – Over 20 GB of Data Including Credit Card Leaked

Published on

SIEM as a Service

Follow Us on Google News

Marriott Hotels & Resorts International based in Bethesda, Maryland suffered a data breach. An unnamed hacking group claimed to have stolen approximately 20GB of data including personal and credit card details of guests.

According to a Marriott spokesperson, “the company is aware of a threat actor who used social engineering to trick one associate at a single Marriott hotel into providing access to the associate’s computer.”

 The access “only occurred for a short amount of time on one day. Marriott identified and was investigating the incident before the threat actor contacted the company in an extortion attempt, which Marriott did not pay”’ he added.

Exposing Information of Hotel Guests and Employees

The incident involves access to around 20 GB of files, which included credit card information and confidential information about guests and workers from an employee at the BWI Airport Marriott in Baltimore.

The reports say the attackers “emailed numerous employees” at Marriott about the breach, and had been in at least limited communications with Marriott.

The attack vector involved the hackers tricking a Marriott associate into giving access to the associate’s computer through ‘social engineering.

The attackers provided Data breaches, samples of the documents they claimed to have stolen, and screenshots posted to the site state to verify reservation logs for airline crew members from January 2022 and credit card authorization forms.

According to data breaches, which first reported the attack, the hackers have documents detailing names and other details of guests, as well as credit card information used to make bookings.

The company confirmed the breach to data breaches, but said the information stolen was mostly “non-sensitive business files”. Also, they have informed between 300-400 affected parties, as well as relevant data protection watchdogs and law enforcement agencies.

Marriott’s Data Breaches in the Past

Earlier, in November 2018, Marriott suffered serious data breaches in the past. The hack involved the theft of data relating to some 500 million customers and was later linked to Chinese state-sponsored hackers, a claim the Chinese government denied.

Marriott suffered yet another data breach believed to have involved data that includes the PII of some 5.2 million guests and is believed to have been accessed by an unknown third party using the login credentials of two employees at a group hotel operated as a franchise.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Tor Browser 14.0.6 Released, What’s New!

The Tor Project has officially unveiled Tor Browser 14.0.6, now accessible for download from the...

Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released

A newly discovered vulnerability in AnyDesk, the popular remote desktop software, has sparked serious...

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Tor Browser 14.0.6 Released, What’s New!

The Tor Project has officially unveiled Tor Browser 14.0.6, now accessible for download from the...

Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released

A newly discovered vulnerability in AnyDesk, the popular remote desktop software, has sparked serious...

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...