{"id":7384,"date":"2017-04-18T19:17:03","date_gmt":"2017-04-19T03:17:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/18\/news-1175\/"},"modified":"2017-04-18T19:17:03","modified_gmt":"2017-04-19T03:17:03","slug":"news-1175","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/18\/news-1175\/","title":{"rendered":"InterContinental Hotel Chain Breach Expands"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 19 Apr 2017 01:35:39 +0000<\/strong><\/p>\n<p>In December 2016, KrebsOnSecurity <a href=\"https:\/\/krebsonsecurity.com\/2016\/12\/holiday-inn-parent-ihg-probes-breach-claims\/\" target=\"_blank\">broke the news<\/a> that fraud experts at various banks were seeing a pattern suggesting a widespread credit card breach across some 5,000 hotels worldwide owned by <strong>InterContinental Hotels Group<\/strong> (IHG). In February, IHG acknowledged a breach but said it appeared to involve\u00a0<a href=\"https:\/\/krebsonsecurity.com\/2017\/02\/intercontinental-confirms-breach-at-12-hotels\/\" target=\"_blank\">only a dozen properties<\/a>. Now,\u00a0IHG has released data showing that cash registers\u00a0at more than 1,000 of its properties were compromised with malicious software designed to siphon customer debit and credit card data.<\/p>\n<div id=\"attachment_37384\" style=\"width: 590px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-37384\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2016\/12\/ihg-ny-580x356.png\" alt=\"An Intercontinental hotel in New York City.\" width=\"580\" height=\"356\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2016\/12\/ihg-ny-580x356.png 580w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2016\/12\/ihg-ny-768x471.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2016\/12\/ihg-ny-940x576.png 940w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2016\/12\/ihg-ny.png 943w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/p>\n<p class=\"wp-caption-text\">An Intercontinental hotel in New York City.<\/p>\n<\/div>\n<p>Headquartered in Denham, U.K., IHG operates more than 5,000 hotels across nearly 100 countries. The company\u2019s <a href=\"https:\/\/www.ihgplc.com\/our-brands\" target=\"_blank\">dozen brands<\/a> include <strong>Holiday Inn<\/strong>, <strong>Holiday Inn Express<\/strong>, <strong>InterContinental<\/strong>, <strong>Kimpton Hotels<\/strong>, and <strong>Crowne Plaza<\/strong>.<\/p>\n<p>According to <a href=\"https:\/\/www.ihg.com\/content\/us\/en\/customer-care\/protecting-our-guests\/california-residents\" target=\"_blank\">a statement<\/a> released by IHG, the investigation &#8220;identified signs of the operation of malware designed to access payment card data from cards used onsite at front desks at certain IHG-branded franchise hotel locations between September 29, 2016 and December 29, 2016.&#8221;<\/p>\n<p>IHG didn&#8217;t say how many properties total were affected, although it has published a state-by-state lookup tool <a href=\"https:\/\/www.ihg.com\/content\/us\/en\/customer-care\/protecting-our-guests\/property-listing\" target=\"_blank\">available here<\/a>. I counted 28 in my hometown state of Virginia alone, California more than double that; Alabama almost\u00a0the same number as Virginia. So north of 1,000 locations nationwide seems very likely.<\/p>\n<p>IHG has been offering its franchised properties a free examination by an outside computer forensic team hired to look for signs of the same malware infestation known to have hit other properties. But not all property owners have been anxious to take the company up on that offer. As a consequence, there may be more breached hotel locations yet to be added to the state lookup tool.<\/p>\n<div id=\"attachment_39035\" style=\"width: 590px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-39035\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/04\/ihgurgent1-580x726.png\" alt=\"A letter from IHG to franchise customers, offering to pay for the cyber forensics examination.\" width=\"580\" height=\"726\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/04\/ihgurgent1-580x726.png 580w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/04\/ihgurgent1.png 712w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/p>\n<p class=\"wp-caption-text\">A letter from IHG to franchise customers, offering to pay for the cyber forensics examination.<\/p>\n<\/div>\n<p>IHG franchises who accepted the security inspections <a href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/04\/ihgurgent1.png\" target=\"_blank\">were<\/a> <a href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/04\/ihgurgent2.png\" target=\"_blank\">told<\/a> they would receive a consolidated report sharing information specific to the property, and that &#8220;your acquiring bank and\/or processor may contact you regarding this investigation.&#8221;<\/p>\n<p>IHG also has been trying to steer franchised properties toward adopting\u00a0its &#8220;secure payment solution&#8221; (SPS)\u00a0that ensures cardholder data remains encrypted at all times and at every &#8220;hop&#8221;\u00a0across the electronic transaction. According to IHG, properties that used its solution prior to the initial intrusion on Sept. 29, 2016 were not affected.<\/p>\n<p>&#8220;Many more properties implemented SPS after September 29, 2016, and the implementation of SPS ended the ability of the malware to find payment card data,&#8221; IHG wrote.<span id=\"more-39034\"><\/span><\/p>\n<p>Card-stealing cyber thieves have broken into some of the largest hotel chains over the past few years. Hotel brands that have acknowledged card breaches over the last year after prompting by KrebsOnSecurity include <a href=\"https:\/\/krebsonsecurity.com\/2016\/09\/kimpton-hotels-acknowledges-data-breach\/\" target=\"_blank\">Kimpton Hotels<\/a>,\u00a0<a href=\"http:\/\/krebsonsecurity.com\/2015\/07\/banks-card-breach-at-trump-hotel-properties\/\" target=\"_blank\">Trump Hotels<\/a> (<a href=\"http:\/\/krebsonsecurity.com\/2016\/04\/sources-trump-hotels-breached-again\/\" target=\"_blank\">twice<\/a>), <a href=\"http:\/\/krebsonsecurity.com\/2015\/09\/banks-card-breach-at-hilton-hotel-properties\/\" target=\"_blank\">Hilton<\/a>, <a href=\"http:\/\/krebsonsecurity.com\/2015\/03\/credit-card-breach-at-mandarian-oriental\/\" target=\"_blank\">Mandarin Oriental<\/a>, and <a href=\"http:\/\/krebsonsecurity.com\/2014\/01\/hotel-franchise-firm-white-lodging-investigates-breach\/\" target=\"_blank\">White Lodging<\/a> (<a href=\"http:\/\/krebsonsecurity.com\/2015\/04\/white-lodging-confirms-second-breach\/\" target=\"_blank\">twice<\/a>). Card breaches also have hit hospitality\u00a0chains <a href=\"http:\/\/krebsonsecurity.com\/2015\/11\/starwood-hotels-warns-of-credit-card-breach\/\" target=\"_blank\">Starwood Hotels<\/a>\u00a0and <a href=\"http:\/\/krebsonsecurity.com\/2016\/01\/hyatt-card-breach-hit-250-hotels-in-50-nations\/\" target=\"_blank\">Hyatt<\/a>.\u00a0<span id=\"more-36174\"><\/span><\/p>\n<p>In many of those incidents, thieves planted malicious software on the point-of-sale devices at restaurants and bars inside of the hotel chains.\u00a0Point-of-sale based malware has driven most of the credit card breaches over the past two years, including intrusions at <a href=\"https:\/\/krebsonsecurity.com\/?s=target+breach&amp;x=0&amp;y=0\" target=\"_blank\">Target<\/a> and <a href=\"https:\/\/krebsonsecurity.com\/?s=home+depot+breach&amp;x=0&amp;y=0\" target=\"_blank\">Home Depot<\/a>, as well as breaches at <a href=\"https:\/\/krebsonsecurity.com\/?s=point-of-sale+vendor&amp;x=0&amp;y=0\" target=\"_blank\">a slew of point-of-sale vendors<\/a>. The malicious code\u00a0usually is installed via hacked remote administration tools. Once the attackers have their malware loaded onto the point-of-sale devices, they can remotely capture data from each card swiped at that cash register.<\/p>\n<p>Thieves can then <a href=\"https:\/\/krebsonsecurity.com\/2014\/06\/peek-inside-a-professional-carding-shop\/\" target=\"_blank\">sell that data to crooks<\/a> who specialize in encoding the stolen data onto any card with a magnetic stripe, and using the cards to purchase high-priced electronics and gift cards from big-box stores like Target and Best Buy.<\/p>\n<p>It&#8217;s a good bet that none\u00a0of the above-mentioned companies were running <a href=\"https:\/\/www.pcisecuritystandards.org\/assessors_and_solutions\/point_to_point_encryption_solutions\" target=\"_blank\">point-to-point encryption<\/a> (P2PE) solutions\u00a0<em>before<\/em> they started hemorrhaging customer credit cards. P2PE is an added cost for sure, but it can protect customer card data even on point-of-sale systems that are already compromised because the malware can no longer read the data going across the wire.<\/p>\n<p>Readers\u00a0should remember that they\u2019re not\u00a0liable for fraudulent charges on their credit or debit cards, but they still have to report the unauthorized transactions. There is no substitute for keeping a close eye on your card statements. Also, consider using credit cards instead of debit cards; having your checking account emptied of cash while your bank sorts out the situation can be a hassle and lead to secondary problems (bounced checks, for instance).<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2017\/04\/intercontinental-hotel-chain-breach-expands\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2016\/12\/ihg-ny-580x356.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 19 Apr 2017 01:35:39 +0000<\/strong><\/p>\n<p>In December 2016, KrebsOnSecurity broke the news that fraud experts at various banks were seeing a pattern suggesting a widespread credit card breach across a large number of the 5,000 hotels worldwide owned by InterContinental Hotels Group (IHG). In February, IHG acknowledged a breach but said it appeared to involve only a dozen properties. Now, IHG has released data showing that cash registers at more than 1,000 of its properties were compromised with malicious software designed to siphon customer debit and credit card data.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[12018,10645,12019,10646,10647,10644,12020,11706],"class_list":["post-7384","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-crowne-plaza-breach","tag-holiday-inn-breach","tag-holiday-inn-express-breach","tag-ihg-breach","tag-intercontinental-hotels-group","tag-other","tag-secure-payment-solution","tag-sms"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7384"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7384\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}