Sagsmappe

Marriott breach: China linked, 500M victims, 4 years hidden

Mappe Åbnet: JUNE 6, 2025 AT 10:00 AM
A Starwood-branded server room with tangled Ethernet cables and a laptop displaying a web shell interface, symbolizing the vulnerability exploited in Marriott's data breach affecting 500 million guests
BEVIS

Sep 2018: Marriott alert shows 4 years of Starwood breach

An automated security tool on Marriott International's servers raised an alarm in September 2018. This signaled one of history's largest [Internal Link Placeholder], a digital catastrophe that had been unfolding secretly for four full years. The root of this massive data breach lay buried in Starwood [Internal Link Placeholder]' systems. Marriott International had acquired the hotel chain in 2016, but apparently without discovering the critical vulnerabilities that hackers were already actively exploiting. The story of the Marriott [Internal Link Placeholder] is more than a technical mishap. It's a tale of [Internal Link Placeholder] that exposes the vulnerability of global corporations to [Internal Link Placeholder], fuels suspicions of state-sponsored [Internal Link Placeholder], and underscores the severe consequences of underestimating the constant cyber threat.

Backdoor: Web shell on Starwood Accolade gave access from 2014

When Marriott's cybersecurity team received the alert on September 8, 2018, digital trails pointed to Starwood's guest reservation system. This older technology platform was, ironically, still running separately, two years after Marriott International's acquisition of Starwood [Internal Link Placeholder]. Marriott's digital investigators began digging, and the revelation was shocking: Unknown perpetrators behind this extensive [Internal Link Placeholder] had enjoyed unimpeded access to the database since July 2014. The attackers, using advanced [Internal Link Placeholder] and sophisticated social engineering techniques, had installed a "web shell" – a digital backdoor – on a server associated with Starwood's Accolade software. This backdoor gave them free rein to steal sensitive data, including [Internal Link Placeholder], establish persistent access, and move undetected through Starwood's network. An anonymous expert compared the situation to discovering that a thief had been living unnoticed in one's house for four years.

Fatal flaw: Starwood's old system, keys hidden insecurely

This extensive [Internal Link Placeholder] revealed a fatal combination of outdated technology and a reprehensible lack of due diligence within the corporate [Internal Link Placeholder]. Starwood's guest reservation system was known for its vulnerabilities long before Marriott International acquired the chain. Instead of integrating it into Marriott's own, more secure network, it was allowed to continue operating as an isolated and vulnerable entity. The cybercriminals exploited this separation to steal vast amounts of data, including encrypted [Internal Link Placeholder] numbers, payment card details, and loyalty program data. Most alarmingly, it was discovered that the decryption keys for the stolen data were stored on the same servers as the encrypted data itself. A spokesperson for the FTC (Federal Trade Commission) in the [Internal Link Placeholder] later compared this grave security flaw to hiding the key to a safe under the doormat.

Disaster: 500M affected, ICO and FTC fines follow breach

On November 30, 2018, the full extent of the disaster was made public: Information belonging to up to 500 million guests had been compromised in this massive [Internal Link Placeholder]. The stolen data included alarming details such as 24 million unencrypted [Internal Link Placeholder] numbers, 9.1 million payment card details, and 383 million unique guest profiles. The authorities' reaction was prompt. In the UK, the ICO (Information Commissioner's Office) announced an intended fine of almost £100 million under GDPR. However, after an appeal and taking the COVID-19 pandemic into account, this fine was reduced to £18.4 million in November 2020. In the [Internal Link Placeholder], Marriott International reached a settlement with the FTC and 50 states in October 2024. The settlement included a $52 million fine and a requirement to implement stricter zero-trust security protocols. For the countless affected guests, including travelers from [Internal Link Placeholder], the risk of [Internal Link Placeholder] increased significantly. Although Marriott offered compensation, such as covering the cost of new passports and credit monitoring, for many, according to an affected Danish traveler, it could not outweigh the feeling of having their digital identity compromised.

Pursuit: Suspected China espionage behind Marriott hack

The major unanswered question in this [Internal Link Placeholder] case is who was behind it. Although Marriott International has officially acknowledged the possibility of ordinary [Internal Link Placeholder], strong technical [Internal Link Placeholder] and the attackers' advanced methods point towards state-sponsored [Internal Link Placeholder]. Security experts have highlighted similarities with tactics used by known Chinese hacking groups. This includes the use of sophisticated, custom-designed [Internal Link Placeholder] and the noteworthy fact that the vast quantities of stolen data have never been offered for sale on the dark web. The absence of the compromised data on the so-called black market (part of the dark web) reinforces many experts' theory that the motive was intelligence gathering rather than direct financial gain through, for example, [Internal Link Placeholder] or sale.

Lessons: Boosted M&A diligence, lawsuits post-Marriott

The Marriott [Internal Link Placeholder] has become a landmark case for the [Internal Link Placeholder] world, especially concerning mergers and acquisitions (M&A). The case brutally underscored the necessity for due diligence processes to henceforth include in-depth cybersecurity audits on par with financial reviews, as a judge in the case pointed out. Marriott International has since implemented AI-driven threat detection systems and a mandatory zero-trust architecture across all its brands in an effort to rebuild the trust lost after the extensive [Internal Link Placeholder]. However, the story is not over. A November 2023 court ruling on the recertification of a class-action lawsuit means there is still the prospect of new judgments and potential further compensation for millions of affected guests. As a lawyer for the victims of this data breach remarked, the case is more than just a data breach; it represents a systemic erosion of trust in the digital age, where [Internal Link Placeholder] services are ubiquitous.

Warning: Cybersecurity necessary, not optional detail

In the aftermath of the Marriott [Internal Link Placeholder] lies a serious warning for all global companies: In a world where data is the new [Internal Link Placeholder], robust cybersecurity is not an optional technical detail but a fundamental [Internal Link Placeholder] and existential necessity to prevent widespread [Internal Link Placeholder] and [Internal Link Placeholder]. This [Internal Link Placeholder] at Marriott International underscores how vulnerable even the largest global infrastructures are to persistent and sophisticated threats. It demonstrates how a lack of attention to cybersecurity and digital negligence can lead to consequences of enormous scale, affecting millions of people worldwide.

Sources:

Follow KrimiNyt for more in-depth cases on cybercrime, espionage, and the darkest sides of the digital age.

Susanne Sperling

Admin

Share this post: