{"id":7508,"date":"2017-05-02T13:18:27","date_gmt":"2017-05-02T21:18:27","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/05\/02\/news-1293\/"},"modified":"2017-05-02T13:18:27","modified_gmt":"2017-05-02T21:18:27","slug":"news-1293","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/05\/02\/news-1293\/","title":{"rendered":"Breach at Sabre Corp.&#8217;s Hospitality Unit"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Tue, 02 May 2017 18:41:42 +0000<\/strong><\/p>\n<p>Breaches involving major players in the hospitality industry continue to pile up. Today, travel industry giant <strong>Sabre Corp.<\/strong> disclosed what could be a significant breach of payment and customer data tied to bookings\u00a0processed through a reservations system that serves more than 32,000 hotels and other lodging establishments.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-39253\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/05\/sabre.png\" alt=\"sabre\" width=\"312\" height=\"95\" \/>In <a href=\"http:\/\/investors.sabre.com\/secfiling.cfm?filingID=1597033-17-104&amp;CIK=1597033\" target=\"_blank\">a quarterly filing<\/a> with the <strong>U.S. Securities and Exchange Commission<\/strong> (SEC) today, Southlake, Texas-based Sabre said it was &#8220;investigating an incident of unauthorized access to payment information contained in a subset of hotel reservations processed through our Hospitality Solutions <strong>SynXis Central Reservations system<\/strong>.&#8221;<\/p>\n<p>According to Sabre&#8217;s <a href=\"http:\/\/www.sabrehospitality.com\/services\" target=\"_blank\">marketing literature<\/a>, more than 32,000 properties use Sabre&#8217;s XynXis reservations system, described as an\u00a0inventory management Software-as-a-Service (SaaS) application that &#8220;enables hoteliers to support a multitude of rate, inventory and distribution strategies to achieve their business goals.&#8221;<\/p>\n<p>Sabre said it has engaged security forensics firm <strong>Mandiant<\/strong> to support its investigation, and that it has notified law enforcement.<\/p>\n<p>&#8220;The unauthorized access has been shut off and there is no evidence of continued unauthorized activity,&#8221; reads a brief statement that Sabre sent to affected properties today. &#8220;There is no reason to believe that any other Sabre systems beyond SynXis Central Reservations have been affected.&#8221;<\/p>\n<p>Sabre&#8217;s software, data, mobile and distribution solutions are used by hundreds of airlines and thousands of hotel properties to manage critical operations, including passenger and guest reservations, revenue management, flight, network and crew management. Sabre also operates a leading global travel marketplace, which processes more than <span class=\"xn-money\">$110 billion<\/span> of estimated travel spend annually by connecting travel buyers and suppliers.<\/p>\n<p>Sabre told customers that it didn&#8217;t have any additional details about the breach to share at this time, so it remains unclear what the exact cause of the breach may be or for how long it may have persisted.<\/p>\n<p>A card involving traveler transactions for even a small percentage of the 32,000 properties that are using Sabre&#8217;s impacted technology could jeopardize a significant number of customer credit cards in a short amount of time.<\/p>\n<p>The news comes amid revelations about a blossoming breach at <strong>Intercontinental Hotel Group<\/strong> (IHG), the parent company that manages some 5,000 hotels worldwide, including <strong>Holiday Inn<\/strong> and <strong>Holiday Inn Express<\/strong>.<span id=\"more-39249\"><\/span><\/p>\n<p>KrebsOnSecurity <a href=\"https:\/\/krebsonsecurity.com\/2016\/12\/holiday-inn-parent-ihg-probes-breach-claims\/\" target=\"_blank\">first reported in December 2016<\/a> that cards used at IHG properties were being sold to fraudsters, but it took until February 2017 for IHG <a href=\"https:\/\/krebsonsecurity.com\/2017\/02\/intercontinental-confirms-breach-at-12-hotels\/\" target=\"_blank\">to announce<\/a> it had found malicious software installed at front-desk systems at just a dozen of its properties. On April 18, IHG <a href=\"https:\/\/krebsonsecurity.com\/2017\/04\/intercontinental-hotel-chain-breach-expands\/\" target=\"_blank\">disclosed in an update<\/a> on the investigation that more than 1,200 properties were affected, and that there could well be more added in the coming days.<\/p>\n<p>According to <strong>Verizon<\/strong>&#8216;s latest annual <a href=\"http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/\" target=\"_blank\">Data Breach Investigations Report<\/a> (DBIR), malware attacks on point-of-sale systems used at front desk and hotel restaurant systems &#8220;are absolutely rampant&#8221; in the hospitality sector. Accommodation was the top industry for point-of-sale intrusions in this year\u2019s data, with 87% of breaches within that pattern.<\/p>\n<p>&#8220;Apparently, it is not only The Eagles that are destined for a long stay at the hotel,&#8221; Verizon mused in its report. &#8220;The hackers continue to be checked in indefinitely as well. Breach timelines continue to paint a rather dismal picture\u2014with time-to-compromise being only seconds, time-to-exfiltration taking days, and times to discovery and containment staying firmly in the months camp.&#8221;<\/p>\n<p>Card-stealing cyber thieves have broken into some of the largest hotel chains over the past few years. Hotel brands that have acknowledged card breaches over the last year after prompting by KrebsOnSecurity include <a href=\"https:\/\/krebsonsecurity.com\/2016\/09\/kimpton-hotels-acknowledges-data-breach\/\" target=\"_blank\">Kimpton Hotels<\/a>,\u00a0<a href=\"http:\/\/krebsonsecurity.com\/2015\/07\/banks-card-breach-at-trump-hotel-properties\/\" target=\"_blank\">Trump Hotels<\/a> (<a href=\"http:\/\/krebsonsecurity.com\/2016\/04\/sources-trump-hotels-breached-again\/\" target=\"_blank\">twice<\/a>), <a href=\"http:\/\/krebsonsecurity.com\/2015\/09\/banks-card-breach-at-hilton-hotel-properties\/\" target=\"_blank\">Hilton<\/a>, <a href=\"http:\/\/krebsonsecurity.com\/2015\/03\/credit-card-breach-at-mandarian-oriental\/\" target=\"_blank\">Mandarin Oriental<\/a>, and <a href=\"http:\/\/krebsonsecurity.com\/2014\/01\/hotel-franchise-firm-white-lodging-investigates-breach\/\" target=\"_blank\">White Lodging<\/a> (<a href=\"http:\/\/krebsonsecurity.com\/2015\/04\/white-lodging-confirms-second-breach\/\" target=\"_blank\">twice<\/a>). Card breaches also have hit hospitality\u00a0chains <a href=\"http:\/\/krebsonsecurity.com\/2015\/11\/starwood-hotels-warns-of-credit-card-breach\/\" target=\"_blank\">Starwood Hotels<\/a>\u00a0and <a href=\"http:\/\/krebsonsecurity.com\/2016\/01\/hyatt-card-breach-hit-250-hotels-in-50-nations\/\" target=\"_blank\">Hyatt<\/a>.\u00a0<span id=\"more-36174\"><\/span><\/p>\n<p>In many of those incidents, thieves planted malicious software on the point-of-sale devices at restaurants and bars inside of the hotel chains.\u00a0Point-of-sale based malware has driven most of the credit card breaches over the past two years, including intrusions at <a href=\"https:\/\/krebsonsecurity.com\/?s=target+breach&amp;x=0&amp;y=0\" target=\"_blank\">Target<\/a> and <a href=\"https:\/\/krebsonsecurity.com\/?s=home+depot+breach&amp;x=0&amp;y=0\" target=\"_blank\">Home Depot<\/a>, as well as breaches at <a href=\"https:\/\/krebsonsecurity.com\/?s=point-of-sale+vendor&amp;x=0&amp;y=0\" target=\"_blank\">a slew of point-of-sale vendors<\/a>. The malicious code\u00a0usually is installed via hacked remote administration tools. Once the attackers have their malware loaded onto the point-of-sale devices, they can remotely capture data from each card swiped at that cash register.<\/p>\n<p>Thieves can then <a href=\"https:\/\/krebsonsecurity.com\/2014\/06\/peek-inside-a-professional-carding-shop\/\" target=\"_blank\">sell that data to crooks<\/a> who specialize in encoding the stolen data onto any card with a magnetic stripe, and using the cards to purchase high-priced electronics and gift cards from big-box stores like Target and Best Buy.<\/p>\n<p>Readers\u00a0should remember that they\u2019re not\u00a0liable for fraudulent charges on their credit or debit cards, but they still have to report the unauthorized transactions. There is no substitute for keeping a close eye on your card statements. Also, consider using credit cards instead of debit cards; having your checking account emptied of cash while your bank sorts out the situation can be a hassle and lead to secondary problems (bounced checks, for instance).<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2017\/05\/breach-at-sabre-corp-s-hospitality-unit\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/05\/sabre.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Tue, 02 May 2017 18:41:42 +0000<\/strong><\/p>\n<p>Breaches involving major players in the hospitality industry continue to pile up. Today, travel industry giant Sabre Corp. disclosed what could be a significant breach of payment and customer data tied to bookings processed through a reservations system that serves more than 32,000 hotels and other lodging establishments.    In a quarterly filing with the U.S. Securities and Exchange Commission (SEC) today, Southlake, Texas-based Sabre said it was &#8220;investigating an incident of unauthorized access to payment information contained in a subset of hotel reservations processed through our Hospitality Solutions SynXis Central Reservations system.&#8221;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[12132,10646,11219,11290,10644,12133,12134,2212],"class_list":["post-7508","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-data-breach-investigations-report-2017","tag-ihg-breach","tag-intercontinental-hotels-group-breach","tag-mandiant","tag-other","tag-sabre-corp-breach","tag-synxis-central-reservations-system","tag-verizon"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7508"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7508\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}