Attacks/Breaches
11/29/2011
09:11 AM
50%
50%

Marriott Hacker's Blackmail Goal: An IT Job

Hungarian man threatened to expose confidential company information he'd stolen unless the hotel chain offered him a job.

8 IT Hiring Strategies Of Top CIOs
8 IT Hiring Strategies Of Top CIOs
(click image for larger view and for slideshow)
Marriott International Corp. was recently the victim of a rare type of targeted attack: A hacker pilfered sensitive documents from the hotel chain and then attempted to use the stolen intelligence to blackmail it for employment.

Attila Nemeth, 26, from Hungary, has pleaded guilty in U.S. District Court to hacking and extortion charges stemming from a bizarre case in which he placed backdoor malware on Marriott computers, exfiltrated sensitive documents, and then threatened Marriott with exposing the information if the company didn't offer him an IT position.

The case puts a whole new spin on the targeted attack; rather than trying to cash in on the intelligence or use it for competitive purposes, the perpetrator used it as leverage. Nemeth's methods were similar to those of advanced persistent threat (APT) attackers: He got a foot in the door of Marriott's computers by targeting some of its employees with spear-phishing emails. Marriott did not publicize details about what happened next, but one or more of the users appear to have fallen for the phony emails and either opened infected documents or a link that silently installed a backdoor on Marriott's systems.

"I also found it interesting that instead of using the data to embarrass or ruin Marriott, he used it to try and land a job. It is something I have not seen a lot of, personally. Even in cases where employees go bad, rarely does the attacker want to link his name with the attack, so they will deface, hack, release, and ruin, but try to hide their identity," says Chris Hadnagy, lead developer of Social-Engineer.Org and a professional Social Engineering Penetration Tester and trainer for Social-Engineer.Com. "This man obviously had different goals, and what he found he must have felt was devastating enough to warrant a well-paying job over the release of that intel."

It all started on Nov. 11, 2010, when Nemeth emailed Marriott's personnel group to tell them he had been able to get inside the hotel chain's computers for months and had stolen proprietary data. He warned that if Marriott did not give him a job maintaining the hotel chain's computers, he would reveal the information he had stolen.

Read the rest of this article on Dark Reading.

Sensitive customer and business data is scattered in hidden corners of your infrastructure. Find and protect it before it winds up in the wrong hands. Also in the new issue of Dark Reading: The practical side of data defense. Download the issue now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
mdalton5117
50%
50%
mdalton5117,
User Rank: Apprentice
11/29/2011 | 6:55:24 PM
re: Marriott Hacker's Blackmail Goal: An IT Job
I might consider hiring someone who came to me and said "I found this vulnerability in your system, and I can show you how to fix it." But if he waits months before contacting me, and then opens the dialog with a threat, he's out. I would only invite him in so the police can pick him up.
Bprince
50%
50%
Bprince,
User Rank: Ninja
11/29/2011 | 3:08:46 PM
re: Marriott Hacker's Blackmail Goal: An IT Job
I suppose this is one way to go about getting a job. :) People sometimes ask whether companies should hire former criminal hackers. @ Readers, what do you guys think: should companies roll the dice with people who were once on the dark side?
Brian Prince, InformationWeek/Dark Reading, Comment Moderator
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8511
Published: 2014-12-27
Buffer overflow in an ActiveX control in Atx45.ocx in Schneider Electric ProClima before 6.1.7 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8512. NOTE: this may be clarified later based on details provided by researchers.

CVE-2014-8512
Published: 2014-12-27
Buffer overflow in an ActiveX control in Atx45.ocx in Schneider Electric ProClima before 6.1.7 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8511. NOTE: this may be clarified later based on details provided by researchers.

CVE-2014-8513
Published: 2014-12-27
Buffer overflow in an ActiveX control in MDraw30.ocx in Schneider Electric ProClima before 6.1.7 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8514 and CVE-2014-9188. NOTE: this may be clarified later based on details provided by ...

CVE-2014-8514
Published: 2014-12-27
Buffer overflow in an ActiveX control in MDraw30.ocx in Schneider Electric ProClima before 6.1.7 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8513 and CVE-2014-9188. NOTE: this may be clarified later based on details provided by ...

CVE-2014-9188
Published: 2014-12-27
Buffer overflow in an ActiveX control in MDraw30.ocx in Schneider Electric ProClima before 6.1.7 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8513 and CVE-2014-8514. NOTE: this may be clarified later based on details provided by ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.