Hungarian man threatened to expose confidential company information he'd stolen unless the hotel chain offered him a job.
8 IT Hiring Strategies Of Top CIOs
(click image for larger view and for slideshow)
Marriott International Corp. was recently the victim of a rare type of targeted attack: A hacker pilfered sensitive documents from the hotel chain and then attempted to use the stolen intelligence to blackmail it for employment.
Attila Nemeth, 26, from Hungary, has pleaded guilty in U.S. District Court to hacking and extortion charges stemming from a bizarre case in which he placed backdoor malware on Marriott computers, exfiltrated sensitive documents, and then threatened Marriott with exposing the information if the company didn't offer him an IT position.
The case puts a whole new spin on the targeted attack; rather than trying to cash in on the intelligence or use it for competitive purposes, the perpetrator used it as leverage. Nemeth's methods were similar to those of advanced persistent threat (APT) attackers: He got a foot in the door of Marriott's computers by targeting some of its employees with spear-phishing emails. Marriott did not publicize details about what happened next, but one or more of the users appear to have fallen for the phony emails and either opened infected documents or a link that silently installed a backdoor on Marriott's systems.
"I also found it interesting that instead of using the data to embarrass or ruin Marriott, he used it to try and land a job. It is something I have not seen a lot of, personally. Even in cases where employees go bad, rarely does the attacker want to link his name with the attack, so they will deface, hack, release, and ruin, but try to hide their identity," says Chris Hadnagy, lead developer of Social-Engineer.Org and a professional Social Engineering Penetration Tester and trainer for Social-Engineer.Com. "This man obviously had different goals, and what he found he must have felt was devastating enough to warrant a well-paying job over the release of that intel."
It all started on Nov. 11, 2010, when Nemeth emailed Marriott's personnel group to tell them he had been able to get inside the hotel chain's computers for months and had stolen proprietary data. He warned that if Marriott did not give him a job maintaining the hotel chain's computers, he would reveal the information he had stolen.
Sensitive customer and business data is scattered in hidden corners of your infrastructure. Find and protect it before it winds up in the wrong hands. Also in the new issue of Dark Reading: The practical side of data defense. Download the issue now. (Free registration required.)
Published: 2014-07-23 Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger cer...
Published: 2014-07-23 Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Published: 2014-07-23 Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Published: 2014-07-23 The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and applica...
Published: 2014-07-23 Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.