Hotel chain Marriott International confirmed it has suffered a new data breach after a threat actor stole 20GB of files from one of its properties.
The attacker compromised the network at the BWI Airport Marriott Maryland (BWIA), as confirmed later by the company.
The threat actor told DataBreaches.net website that they had access to the Marriott property’s network about a month ago, they also added that the 0 GB of data exfiltrated included some credit card info and confidential information.
According to statements made to DataBreaches, the attackers also notified numerous employees at Marriot about the security breach. The company initially responded to them, but later interrupted any communication.
“This incident only involved one property. The threat actor did not gain access to Marriott’s core network. The access to one device at the property involved only lasted for approximately six hours,” a Marriott spokesperson told to media [1][2].
The threat actor attempted to extort Marriot by threatening to leak the stolen files, but the company refused to pay a ransom and notified the authorities.
Marriott also hired a leading cyber security firm to investigate the security breach.
“Marriott acknowledged that while most of the data acquired by GNN was what Marriott described as non-sensitive internal business files, they will be notifying approximately 300-400 individuals and any regulators, as required. They did not provide a full description as to what kinds of personal information were involved for the individuals being notified.” reported DataBreaches.
This isn’t the first incident suffered by Marriot, below is a list of some of the security breaches it was the victim of:
Follow me on Twitter: @securityaffairs and Facebook
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, data breach)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.