The pwnage continues with Hyatt Hotels being the latest to get pwned. And it’s not the first time. In the first breach which was in 2015, hackers had gained access to credit card systems at 250 properties in 50 different countries. This time, the breach appears to have impacted 41 properties across 11 countries. Brian Krebs had this to say:
Hyatt said its cyber security team discovered signs of unauthorized access to payment card information from cards manually entered or swiped at the front desk of certain Hyatt-managed locations between March 18, 2017 and July 2, 2017.
“Upon discovery, we launched a comprehensive investigation to understand what happened and how this occurred, which included engaging leading third-party experts, payment card networks and authorities,” the company said in a statement. “Hyatt’s layers of defense and other cybersecurity measures helped to identify and resolve the issue. While this incident affects a small percentage of total payment cards used at the affected hotels during the at-risk dates.
The hotel chain said the incident affected payment card information – cardholder name, card number, expiration date and internal verification code – from cards manually entered or swiped at the front desk of certain Hyatt-managed locations. It added there is no indication that any other information was involved.
The fact that they’ve been pwned twice in two years implies that they have a problem that they need to fix. As in right the hell now.
I keep saying this every time someone gets pwned. There needs to be legislation combined with swift and meaningful punishment for getting pwned to encourage companies do take measures in order to not get pwned. Otherwise, the pwnage will continue and you and I will eventually become collateral damage as part of that.
Like this:
Like Loading...
Related
This entry was posted on October 13, 2017 at 10:45 am and is filed under Commentary with tags Hyatt. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
Hyatt Hotels Pwned…. Credit Card Info Swiped
The pwnage continues with Hyatt Hotels being the latest to get pwned. And it’s not the first time. In the first breach which was in 2015, hackers had gained access to credit card systems at 250 properties in 50 different countries. This time, the breach appears to have impacted 41 properties across 11 countries. Brian Krebs had this to say:
Hyatt said its cyber security team discovered signs of unauthorized access to payment card information from cards manually entered or swiped at the front desk of certain Hyatt-managed locations between March 18, 2017 and July 2, 2017.
“Upon discovery, we launched a comprehensive investigation to understand what happened and how this occurred, which included engaging leading third-party experts, payment card networks and authorities,” the company said in a statement. “Hyatt’s layers of defense and other cybersecurity measures helped to identify and resolve the issue. While this incident affects a small percentage of total payment cards used at the affected hotels during the at-risk dates.
The hotel chain said the incident affected payment card information – cardholder name, card number, expiration date and internal verification code – from cards manually entered or swiped at the front desk of certain Hyatt-managed locations. It added there is no indication that any other information was involved.
The fact that they’ve been pwned twice in two years implies that they have a problem that they need to fix. As in right the hell now.
I keep saying this every time someone gets pwned. There needs to be legislation combined with swift and meaningful punishment for getting pwned to encourage companies do take measures in order to not get pwned. Otherwise, the pwnage will continue and you and I will eventually become collateral damage as part of that.
Share this:
Like this:
Related
This entry was posted on October 13, 2017 at 10:45 am and is filed under Commentary with tags Hyatt. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.