Best Western forced to play defense on data breach disclosure
Could hotel chain have done a better job of defusing story about system intrusion?
Computerworld - The headline in this week's Glasgow Sunday Herald — "Revealed: 8 million victims in the world's biggest cyber heist" — was a grabber.
And it certainly got the attention of the Best Western hotel chain, which found itself scrambling to do damage control after the Scottish newspaper reported that hackers had broken into its online reservation system and stolen 8 million customer records. According to the Sunday Herald, the theft netted data on everybody who had stayed at Best Western's 1,312 European hotels this year and in 2007.
After the story appeared on Aug. 24, Phoenix-based Best Western International Inc. acknowledged that the Herald had alerted it to a "possible compromise" of data. But the company disputed the newspaper's claims about the scope of the system intrusion, saying that the story was "grossly unsubstantiated." Best Western said the breach had affected just 13 customers at a single hotel in Berlin — a number that it later reduced to 10.
Nonetheless, the company couldn't stanch the online flood of stories and blog posts about the data breach that followed the publication of the Herald's story, which said that a hacker from India had obtained log-in credentials for Best Western's online booking system via a keystroke-logging program. The hacker then sold information on how to access the data in the system "through an underground network operated by the Russian mafia," the story said.
Best Western's experience highlights the public relations problems that can result from breach disclosures, as well as the need for companies to have comprehensive incident-response plans in place for dealing with such disclosures.
In this case, Best Western could have beaten the Herald to the punch by breaking the news about the breach itself. The intrusion took place on Aug. 21; according to the newspaper, it brought the breach to the company's attention the following day, two days before the story was published.
In comments sent via e-mail this week, a Best Western spokeswoman indicated that the company was blindsided by the Herald's claims about the scope of the breach. The reporter who wrote the story didn't mention the possibility that 8 million records had been stolen when he talked to Best Western officials, the spokeswoman said. She said that he simply asked for the number of Best Western hotels and rooms in Europe, and that he appears to have used those numbers to extrapolate the 8 million figure.
And the only evidence of a breach that the reporter presented was a screenshot of a single log-in suggesting a possible compromise, the spokeswoman added. "Basically, the Herald elicited a statement from us on one issue and used the statement to report on another," she said.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different.... All Cybercrime and Hacking White Papers | Webcasts