CPAF LOGO

Unveiling Marriott's Latest Data Privacy Breach in 2020

A Cybersecurity Incident Analysis Report

June 17, 2024Raphael J. Olowo, MBA,CISA,CFE

Marriott's 2020 data breach exposed 5.2M guests' personal information. Analysis reveals attack details, threat actors, & lessons learned, emphasizing need for robust cybersecurity & employee awareness training.

Introduction

Marriott International suffered a significant data breach in 2020, compromising the personal information of approximately 5.2 million guests (Wired, 2020). This report analyzes the incident, identifying the affected parties, nature and severity of the attack, threat actors, indicators of compromise, and lessons learned.

Incident Overview

The breach occurred in early 2020, with unauthorized individuals accessing guest data using stolen employee login credentials (Wired, 2020).

Incident Analysis

Affected Parties: 5.2 million Marriott guests.

Nature and Type of Cyber Attack: Unauthorized access incident involving sensitive customer data.

Severity of the Cyber Attack: Significant, with potential identity theft and fraudulent activities

Threat Actors and Their Motives: Unknown, but possibly financial gain or espionage

Identified Indicators of Compromise (IOCs): Unusual login activity, data exfiltration patterns, unusual network activity, and suspicious processes.

Elements of Security Compromised (C.I.A. Triad): Confidentiality, Integrity, and Availability.

Systems, Data, or Users Affected: Guest reservation system and personally identifiable information (PII).

Vulnerability or Vulnerabilities Exploited: Weak passwords, insufficient authentication measures, and compromised user accounts.

Actions Taken by Marriott

Marriott engaged external experts to investigate and contain the breach, notified affected customers, and offered identity monitoring services.

Lessons Learned

Regularly review and update authentication processes and access controls

Implement multi-factor authentication.

Continuously monitor for anomalous behaviour.

Prioritize employee cybersecurity awareness training.

Regularly assess and update security systems and protocols to address emerging threats and vulnerabilities.

Carry out Regular penetration tests.

Maintain robust incident response and communication plans.

Implement strong password policies.

Conclusion

The Marriott data breach highlights the ongoing challenges organizations face in protecting sensitive customer data. It is crucial for organizations to learn from incidents like this, improve their cybersecurity defenses, and prioritize protecting customer data to safeguard their reputation and maintain customer trust.

References

1. Bowen, P., Hash, J., & Wilson, M. (2006). Information Security Handbook: A Guide for Managers. National Institute of Standards and Technology. Gaithersburg, MD. NIST SP 800-100. DOI: 10.6028/NIST.SP.800-100.

2. Bright, P. (2011, 15th February). Anonymous Speaks: The Inside Story of the HBGary Hack. Retrieved 9th March 2017. Accessed from [URL]: https://attack.mitre.org/techniques/T1586/.

3. Federal Trade Commission (2023). Data Breach Response: A Guide for Business. Accessed 9th September 2023. URL: https://www.ftc.gov/business-guidance/resources/data-breach-response-guide-business.

4. Chichonski, P., Millar, T., Grance, T., Scarfone, Karen. (2012). Computer Security Incident Handling Guide. National Institute of Standards and Technology.Gaithersburg, MD. NIST SP800-61R2 DOI:10.6028/NIST.SP.800-61r2

5. ISO/IEC. (2016). ISO/IEC 27035:2016 - Information technology - Security techniques - Information security incident management.

6. ISO/IEC. (2013). ISO/IEC 27002:2013 - Information technology - Security techniques - Code of practice for information security controls.

7. MITRE. (2023). MITRE ATT&CK® Framework.

8. National Institute of Standards and Technology (2018). Cybersecurity Framework version 1.1. Accessed 5th September 2023. DOI: 10.6028/NIST.CSWP.04162018.

9. Microsoft. (2022, 22nd March). DEV-0537 Criminal Actor Targeting Organizations for Data Exfiltration and Destruction. Retrieved 23rd March 2022. Accessed from [URL]: https://attack.mitre.org/techniques/T1586/.

10. Reuters. (2023). ICO fines Marriott 18.4 million pounds for failing to secure customer data. Reuters. Retrieved 18th September 2023. [URL: https://www.reuters.com/article/us-marriott-intnl-ico-idUSKBN27F1LH]

11. Santos, O. (2020, 19th October). Attackers Continue to Target Legacy Devices. Retrieved 20th October 2020. Accessed from [URL]: https://attack.mitre.org/techniques/T1056/001/.

12. Temoshok, David. (2022). Digital Identity Guidelines: Authentication and Lifecycle Management. National Institute of Standards and Technology. Gaithersburg, MD. NIST SP 800-63B-4 ipd. DOI: 10.6028/NIST.SP.800-63B-4.ipd.

13. Tinaztepe, E. (n.d.). The Adventures of a Keystroke: An in-depth look into keyloggers on Windows. Retrieved 27th April 2016. Accessed from [URL]: https://attack.mitre.org/techniques/T1056/001/.

14. Wilson, M., & Hash, J. (2003). Building an Information Technology Security Awareness and Training Program. National Institute of Standards and Technology. Gaithersburg, MD. NIST SP 800-50. DOI: 10.6028/NIST.SP.800-50.

15. Wired. (2020). "Marriott Hacked, Yes Again." Accessed 17th July 2023. URL: https://www.wired.com/story/marriott-hacked-yes-again-2020/.

Contact US

Find out how CPAF can help your organisation to achieve mitigate cybersecurity risks and avert cyber threats. Benefit from our information security audits, cybersecurity penetration tests, digital forensics services and more.

Find out how CPAF can help your organisation to achieve mitigate cybersecurity risks and avert cyber threats. Benefit from our information security audit services, digital forensics, penetration test services and m.

Email: adminsitrator@africacpaf.com