More than 5 million unencrypted passport numbers were stolen as part of the Marriott data breach last year, according to an update from the hotel giant.
The information accessed in the breach, which was first disclosed on Nov. 30th, also includes approximately 20.3 million encrypted passport numbers, the Bethesda, Md.-based hotel chain revealed in an online statement Friday.
Also exposed in the Marriott data breach are approximately 8.6 million encrypted payment cards, 354,000 of which were unexpired as of September 2018, the company said. Marriott added there is no evidence the threat actors accessed the master encryption key needed to decrypt the encrypted passport and payment card numbers.
Marriott also revealed that fewer guests were affected than the previously estimated number of 500 million. Following the work of “forensics and analytics investigation team,” Marriott has identified “information for fewer than 383 million unique guests was involved” in the incident.
With the ability to encrypt information at rest becoming much easier in the last several years, TCE Strategy’s Bryce Austin said, it’s difficult to “excuse in this day and age that someone isn’t encrypting all sensitive data in their databases.”
Marriott’s initial breach disclosure noted that threat actors had access to the Starwood network since 2014 (Marriott acquired Starwood in 2016). Austin believes that people impacted by the Marriott data breach should assume that even the data that was encrypted was compromised. “If someone has been in your system for four years they have lots and lots of information including your encryption certificates,” he said. “We should make the assumption that they were able to decrypt everything.”
Stolen passport numbers can be used for identity theft and to commit fraud, Austin said. Having access to information like someone’s passport and credit card number and the itinerary of where they tend to travel makes it much easier to impersonate the victim, he said.
Accessing the master encryption key
Given the scale and breadth of the Marriott data breach, Sumit Agarwal, co-founder and COO at Shape Security said, it’s likely the hackers did gain access to the master key. “At this point many experts believe that a foreign intelligence agency was behind this hack, which makes it very likely that the passport numbers were a key target and more desired,” Agarwal said.
The difficulty for a hacker gaining access to a master encryption key depends on how the organization has chosen to configure, control, monitor and manage access to the key, ISACA’s Raef Meeuwisse said in an email interview.
Bryce AustinCEO at TCE Strategy
If the key is held in a security-hardened environment designed to manage cryptographic keys where access to keys is monitored and limited to those individuals who absolutely require it, it should be hard to gain unauthorized access, Meeuwisse said. “But a failure to have a cryptographic key management system can leave the key vulnerable to unauthorized access.”
“Most significantly, any basic due diligence review of the Starwood cybersecurity in place should easily have identified the gaps and risks present,” Meeuwisse said. “I advocate that every security function should have an annual independent review — but when it comes to acquisitions, those reviews are even more important. In my experience, the more resistant a potential acquisition is to an independent security review, the more significant the existing security deficits are likely to be.”
Data retention, protection best practices
In the case of the Marriott data breach, the decision to store but not encrypt certain personal data is likely to increase the organization’s exposure to larger regulatory financial penalties, Meeuwisse said.
It’s a good data retention practice to only retain personal information for the minimum amount of time necessary, he said, and to ensure that all personal data is encrypted as standard. “This should be enforced by regularly auditing the systems used to store personal information to ensure compliance and by making sure any security gaps or failures to encrypt are addressed.”
The problem for many organizations, he said, is that they underestimate the cyber threat levels, under-invest in achieving appropriate levels of cybersecurity and the security investments they do make are often added to technologies and digital landscapes as an afterthought. Many organizations also fail to provide their security functions with the power and authority they need to get the job done, he added.
TCE Strategy’s Austin advised businesses to invest in SIEM products, which can aggregate an organizations log files as well as other data and alert security teams to anomalies and potential malicious activity on the network.