Starwood Breach Reaction Focuses on 4-Year Dwell

  /     /     /  
Publicated : 23/11/2024   Category : security


Starwood Breach Reaction Focuses on 4-Year Dwell


The unusually long dwell time in the Starwood breach has implications for both parent company Marriott International and the companies watching to learn from.



Four years. Thats how long an attacker was in Starwood Hotels databases. While dwell time — the delay between when a breach begins and when its discovered — is an issue across cybersecurity, the unusually long dwell time in the Starwood breach has implications for both Marriott International and the companies watching to learn from.
According to Mandiant, the
average dwell time
for an attack is 101 days. Though there are few details about the Starwood/Marriott breach, experts say several factors might have contributed to the longer-than-usual dwell time.
According to Avivah Litan, a vice president and distinguished analyst at Gartner who has researched many large-scale breaches, the long dwell time is an indicator that the attackers were nation-state threat actors. These guys are really good at what they do, she says. You know, theyre very stealthy — they hide in places you cant find.
In support, Litan points to details contained in the indictments for the
Democratic National Conventions email server breach
, which show that the DNC hired a forensic security specialist (Company 1 in the indictment) to clean up the breach when it was discovered. Despite their efforts, the attackers maintained persistence on the servers and took files for months following the remediation efforts.
And Stephen Moore, chief security strategist at Exabeam, was part of the Anthem Healthcare security team that followed up on the
insurance companys 2015 breach
. He says that Starwoods 2016 purchase by Marriott could easily have increased the time the attackers had inside the network. Thats a prime moment to attack, and then it would absolutely make things more difficult, Moore explains. I could say it would be at least twice as difficult to identify an adversary in the network because there are so many other things going on politically and otherwise.
For some professionals, the activity going on around the IT department is no excuse. In my opinion as somebody who works in the field, a month is too long, a week is too long. You should be catching that data is being actively sent from your system to another location that you didnt authorize in a couple of days tops, says Jessica Ortega, security research analyst at Sitelock.
The Impact Spreads
Though some have focused on the financial fraud possible with stolen payment card information, Moore says other, more serious consequences are possible from this breach, or any breach in the hospitality industry. In the past there have been travel-related incidents tied to hospitality that were for intelligence-gathering and espionage, he says. There are at least two very heavy-handed adversaries looking to either prosper from us financially or utilize us much like a lamprey attaches to a shark to draw information about who is staying where, who is going where, and which passport numbers were included.
Moore also points out that a four-year breach isnt the result of an opportunistic hack. Litan agrees. Nation-states are interested in hotel data because it gives them really good information on where their targets are, she says. If theyre targeting people, there are many different uses for the data, ranging from stealing money to targeting individuals to national cybersecurity implications where they want to manipulate populations for political purposes.
A Stream Of Breaches
Public response to the Starwood breach has been muted, perhaps because its merely the latest in a long line of large data breaches. Breaches continue for a simple reason, Ortega says. Theres no accountability for these businesses that have data breaches as of right now in the US, she says. And any possible accountability is merely passed off to others, Litan adds.
The problem is the CEOs dont really want to spend extra money on security, she says. They want to buy cyber insurance. If you look at Equifax, like they got a $95 million payout from their insurance company. And thats the way a lot of these CEOs think. In fact, she explains, in general, CEOs would rather spend money on cyber insurance than on security.
There is a regulatory framework that carries the possibility of serious penalty, though no one knows what impact it will have on Marriott.
There are accountability measures built into the GDPR regulations in the European Union, but those regulations are still relatively new, and we havent really seen a large scale or a large enterprise business like this, Ortega says. This, if nothing else, will be an interesting test for what actually happens with a large-scale data breach under GDPR. And well get an idea more of future penalties from this experience than we will be able to predict what will happen to Marriott in particular.
Related Content:
Dell Forces Password Reset for Online Customers Following Data Breach
Federal Indictments in SamSam Ransomware Campaign
Buckle Up: A Closer Look at Airline Security Breaches
5 Things the Most Secure Software Companies Do (and How You Can Be Like Them)

Last News

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Starwood Breach Reaction Focuses on 4-Year Dwell