Saturday, July 13, 2024

Marriott Hacked – Over 20 GB of Data Including Credit Card Leaked

Marriott Hotels & Resorts International based in Bethesda, Maryland suffered a data breach. An unnamed hacking group claimed to have stolen approximately 20GB of data including personal and credit card details of guests.

According to a Marriott spokesperson, “the company is aware of a threat actor who used social engineering to trick one associate at a single Marriott hotel into providing access to the associate’s computer.”

 The access “only occurred for a short amount of time on one day. Marriott identified and was investigating the incident before the threat actor contacted the company in an extortion attempt, which Marriott did not pay”’ he added.

Exposing Information of Hotel Guests and Employees

The incident involves access to around 20 GB of files, which included credit card information and confidential information about guests and workers from an employee at the BWI Airport Marriott in Baltimore.

The reports say the attackers “emailed numerous employees” at Marriott about the breach, and had been in at least limited communications with Marriott.

The attack vector involved the hackers tricking a Marriott associate into giving access to the associate’s computer through ‘social engineering.

The attackers provided Data breaches, samples of the documents they claimed to have stolen, and screenshots posted to the site state to verify reservation logs for airline crew members from January 2022 and credit card authorization forms.

According to data breaches, which first reported the attack, the hackers have documents detailing names and other details of guests, as well as credit card information used to make bookings.

The company confirmed the breach to data breaches, but said the information stolen was mostly “non-sensitive business files”. Also, they have informed between 300-400 affected parties, as well as relevant data protection watchdogs and law enforcement agencies.

Marriott’s Data Breaches in the Past

Earlier, in November 2018, Marriott suffered serious data breaches in the past. The hack involved the theft of data relating to some 500 million customers and was later linked to Chinese state-sponsored hackers, a claim the Chinese government denied.

Marriott suffered yet another data breach believed to have involved data that includes the PII of some 5.2 million guests and is believed to have been accessed by an unknown third party using the login credentials of two employees at a group hotel operated as a franchise.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.


Latest articles

mSpy Data Breach: Millions of Customers’ Data Exposed

mSpy, a widely used phone spyware application, has suffered a significant data breach, exposing...

Advance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity in the automotive industry, has...

Hackers Using ClickFix Social Engineering Tactics to Deploy Malware

Cybersecurity researchers at McAfee Labs have uncovered a sophisticated new method of malware delivery,...

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept...

Hackers Created 700+ Fake Domains to Sell Olympic Games Tickets

As the world eagerly anticipates the Olympic Games Paris 2024, a cybersecurity threat has...

Japanese Space Agency Spotted zero-day via Microsoft 365 Services

The Japan Aerospace Exploration Agency (JAXA) has revealed details of a cybersecurity incident that...

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage and secure Active...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles