Monday, May 27, 2024

Marriott International Facing More than $120 Million Fine Under GDPR for 2018 Data Breach

Marriott International fined over £99 million ($123 Millon) under the General Data Protection Regulation (GDPR) for failure to protect customer data.

Information Commissioner’s Office (ICO) issued a fine notice to Marriott for 2018 data breach, in which approximately 339 million guest records were exposed globally.

The fine imposed to Marriott for breaches of data protection law which applies to all companies that collect and process data belonging to the European Union (EU) citizens.

The cyber incident that was targeted to Marriott caused around 30 million related to residents records of 31 countries in the European Economic Area (EEA). Seven million records related to UK residents.

Marriott learned hackers exploit the vulnerability and gained unauthorized access to the Starwood network since 2014, they copied, encrypted information and taken steps to remove it. Marriott International acquired Starwood Hotels & Resorts in the mid-2016.

The investigation done by the Information Commissioner’s Office (ICO) found that  Marriott failed to undertake sufficient security measures when it bought Starwood.

According to Information Commissioner Elizabeth Denham said, “The GDPR makes it clear that organisations must be accountable for the personal data they hold. This can include carrying out proper due diligence when making a corporate acquisition, and putting in place proper accountability measures to assess not only what personal data has been acquired, but also how it is protected.”

Also, ICO warns “personal data is highly valuable and the companies ensure the security to their customers, if its failed, we will not hesitate to take strong action when necessary to protect the rights of the public.”

ICO has investigated this case with the lead supervisory authority on behalf of other EU Member State data protection authorities.

Marriott has completely cooperated with ICO and made adequate security changes soon after they learned this security incident.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Website

Latest articles

Kesakode: A Remote Hash Lookup Service To Identify Malware Samples

Today marks a significant milestone for Malcat users with the release of version 0.9.6,...

Cisco Firepower Vulnerability Let Attackers Launch SQL Injection Attacks

 A critical vulnerability has been identified in Cisco Firepower Management Center (FMC) Software's web-based...

Hackers Exploit WordPress Plugin to Steal Credit Card Data

Hackers have exploited an obscure WordPress plugin to inject malware into websites, specifically targeting...

Google Patches Chrome Zero-Day: Type Confusion in V8 JavaScript

Google has released a patch for a zero-day exploit in its Chrome browser.The...

Hackers Created Rogue VMs in Recent MITRE’s Cyber Attack

State-sponsored hackers recently exploited vulnerabilities in MITRE's Networked Experimentation, Research, and Virtualization Environment (NERVE).They...

Hackers Weaponizing Microsoft Access Documents To Execute Malicious Program

In multiple aggressive phishing attempts, the financially motivated organization UAC-0006 heavily targeted Ukraine, utilizing...

Microsoft Warns Of Storm-0539’s Aggressive Gift Card Theft

Gift cards are attractive to hackers since they provide quick monetization for stolen data...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles