Hotels Facing Increased Pressure From Cyber Threats
While government, healthcare, and financial organizations remain among the most preferred prey of cybercriminals, the hospitality sector is emerging as a growing target for e-crime and, in a more unsettling turn, nation-state adversary groups as well.
International hotel chains, in particular, offer ripe picking for financial crimes, from stealing identities to pilfering credit card numbers via point-of-sale (POS) transactions. State-affiliated adversaries have also developed a deep interest in the hospitality sector, whether for tracking persons of interest while they are traveling, or to enable access to these potential victims when they use electronic devices outside the confines of protected networks.
Why is this sector becoming a key target for cybercriminal organizations and nation-state threat actors?
Rather simply, hotels present a vast array of people that represent potential targets. These include business travelers, large conferences with thousands of attendees, government officials, and even those in the technology or academic fields that may be traveling with valuable information assets. In addition, the variety of types of hotels and hotel chains, which may not be employing the most modern security practices, also makes the industry a soft target.
Throughout 2017 and continuing this year, data has revealed a rise in attacks by financially motivated adversaries focused on POS devices, an operational model that often results in the resale of stolen credit cards in criminal marketplaces. Personally identifying information such as passport scans or loyalty card information holds value on the dark web, too.
While every industry has challenges with maintaining best practices with security and implementing the most modern tools to secure networks, the hospitality sector deals with some unique circumstances. Locations can be widely dispersed, with transient workforces, and a high level of outsourcing, especially for technology needs. Hotels are also highly dependent on third-party vendors for their operations, which introduces a likelihood for attackers to search for weak points in the vendor or supply chain environment.
Finally, hotels and retail are facing significant pressure to improve the customer experience, primarily with technology that’s similar to what consumers are used to in their homes. Visitors want reliable, fast WiFi, they want to be able to use multiple personal devices in their rooms or to pay for services via personal apps. If a hotel elects to pursue speed and experience at the expense of investing in security, they’re leaving the door wide open for attackers to compromise information held by the hotel itself but also access to guests directly. This becomes critical to the hospitality sector with the introduction of privacy and security regulations under the General Data Protection Regulation (GDPR), which becomes official on May 25, which requires businesses to be prepared to report data breaches quickly and demonstrate that they have prevention and detection efforts in place to protect consumers’ information.
Read More: AI/Machine Learning To The Rescue For Companies In GDPR Battle
Sophisticated targeting
There are documented examples of certain adversary groups targeting WiFi networks as a way to penetrate back into the network on the machine of the user. Nation-state adversaries have maintained a deep interest in the sector, which may be for the purposes of tracking persons of interest while they are traveling or to enable access to these potential victims when they use equipment outside of normal corporate networks.
One type of spear-phishing attack, designated Carbon Spider by CrowdStrike, was especially prominent in the sector in 2017. This attack utilizes spear-phishing emails with subject lines that reference customer details, invoices or payment information for a booking. The body of the email then explains that this information is contained within a document attached to the email, with instructions on how to unlock the protected document. The emails are usually directed to customer-facing personnel within the victim organization, and open-source reporting has documented that quite often these emails will be followed by telephone conversations to enable successful exploitation. The primary objective of these operations is to deploy specialized tools which scrape PoS credit card data from the temporary memory where it is stored.
One of the more concerning developments taking place across sectors is growing use of malware-free attacks, or attacks that went undetected by traditional antivirus software. Overall, a recent CrowdStrike report found that in 2017, 39 percent of attacks involved no malware. In the hospitality sector, it was even higher, with 45 percent of attacks being malware-free. This indicates that the industry is not only a prime target, it is relying on legacy technologies that don’t provide the real-time visibility and risk management required to combat today’s attacks.
Checking in with modern security
Extortion and weaponization of data have become mainstream among cybercriminals, heavily impacting sectors like hospitality. Data from CrowdStrike research shows that “breakout time” – the time it takes an intruder to begin moving laterally to other systems in the network – is an average of one hour and 58 minutes. The largest hotel chains are implementing better security with emphasis on faster detection, but more in the industry need to develop a sense of urgency with faster detection rates and faster responses to global threats. Every hotel is dealing with highly sensitive information and a high number of transactions, and has its reputation at stake with every threat.
Business leaders in hospitality need to start by thinking about what threats would target the data of their guests. As an organization, creating a security culture means the frontline of defense is the employees in that hotel. Employees must recognize the value of the information they’re capturing on a daily basis, and protecting the digital identity of guests just as they would with physical security, like locked doors. With hotels modernizing the customer experience with things like Internet of Things-connected vending machines or new ways to process payments, each of those devices need to be secure.
Finally, vendor relationships and employee access controls must be carefully considered, as these are often points of weakness in the security profile.
Read More: Interview With Adam Meyers, VP, Intelligence At CrowdStrike
Higher Positions is a premier SEO company in Maryland City, and a Google Partner and SEO-Certified, with over 10 years of search engine marketing experience.
Copper scrap auctions Copper scrap innovation Metal reclamation and regeneration
Reliable Copper cable scrap reception, Metal scrap reprocessing facility, Recycling regulations for Copper scrap
I think what you postedwrotesaidbelieve what you postedwrotebelieve what you postedtypedbelieve what you postedtypedsaidWhat you postedtypedsaid was very logicala ton of sense. But, what about this?consider this, what if you were to write a killer headlinetitle?content?wrote a catchier title? I ain’t saying your content isn’t good.ain’t saying your content isn’t gooddon’t want to tell you how to run your blog, but what if you added a titleheadlinetitle that grabbed a person’s attention?maybe get a person’s attention?want more? I mean %BLOG_TITLE% is a little vanilla. You ought to look at Yahoo’s home page and see how they createwrite news headlines to get viewers interested. You might add a related video or a pic or two to get readers interested about what you’ve written. Just my opinion, it might bring your postsblog a little livelier.
Thanks for sharing the article, and more importantly, your personal experience! Mindfully using our emotions as data about our inner state and knowing when it’s better to de-escalate by taking a time out are great tools. Appreciate you reading and sharing your story, since I can certainly relate and I think others can too.
1 day only
wonderful issues altogether, you just gained a emblem new reader. What may you suggest in regards to your submit that you made a few days ago? Any positive?
Heya i’m for the first time here. I came across this board and I find It truly useful & it helped me out a lot. I hope to give something back and help others like you helped me.
A person necessarily help to make significantly articles I would state. This is the first time I frequented your web page and thus far? I amazed with the research you made to create this actual publish incredible. Wonderful activity!
One of the leading academic and scientific-research centers of the Belarus. There are 12 Faculties at the University, 2 scientific and research institutes. Higher education in 35 specialities of the 1st degree of education and 22 specialities.
Great post. I am going through a few of these issues as well..
It is perfect time to make some plans for the future and it is time to be happy. I have read this post and if I could I wish to suggest you few interesting things or advice. Perhaps you could write next articles referring to this article. I wish to read more things about it!
Today, I went to the beachfront with my kids. I found a sea shell and gave it to my 4 year old daughter and said “You can hear the ocean if you put this to your ear.” She put the shell to her ear and screamed. There was a hermit crab inside and it pinched her ear. She never wants to go back! LoL I know this is completely off topic but I had to tell someone!
Actually no matter if someone doesn’t know after that its up to other users that they will help, so here it occurs.
Howdy terrific blog! Does running a blog like this take a lot of work? I have no knowledge of programming but I was hoping to start my own blog soon. Anyway, if you have any suggestions or tips for new blog owners please share. I know this is off topic but I just needed to ask. Thanks a lot!
Hi there, I found your web site by the use of Google even as searching for a comparable matter, your web site got here up, it looks good. I have bookmarked it in my google bookmarks.
My programmer is trying to persuade me to move to .net from PHP. I have always disliked the idea because of the expenses. But he’s tryiong none the less. I’ve been using Movable-type on several websites for about a year and am worried about switching to another platform. I have heard excellent things about blogengine.net. Is there a way I can transfer all my wordpress content into it? Any kind of help would be really appreciated!
Pretty great post. I simply stumbled upon your blog and wanted to mention that I have really enjoyed browsing your blog posts. In any case I’ll be subscribing on your feed and I am hoping you write again soon!
There is definately a lot to know about this topic. I like all the points you made.
“Строительство автомоек под ключ” с нашей командой гарантирует использование последних технологий и высочайших стандартов качества.
Hey I know this is off topic but I was wondering if you knew of any widgets I could add to my blog that automatically tweet my newest twitter updates. I’ve been looking for a plug-in like this for quite some time and was hoping maybe you would have some experience with something like this. Please let me know if you run into anything. I truly enjoy reading your blog and I look forward to your new updates.
What’s up Dear, are you really visiting this web site regularly, if so then you will absolutely take nice experience.
Write more, thats all I have to say. Literally, it seems as though you relied on the video to make your point. You definitely know what youre talking about, why waste your intelligence on just posting videos to your site when you could be giving us something enlightening to read?
Play, strategize, and conquer Your victory awaits Lucky Cola