Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security //

Database Security

Starwood Breach Reaction Focuses on 4-Year Dwell

The unusually long dwell time in the Starwood breach has implications for both parent company Marriott International and the companies watching to learn from.

Four years. That's how long an attacker was in Starwood Hotels' databases. While "dwell time" — the delay between when a breach begins and when it's discovered — is an issue across cybersecurity, the unusually long dwell time in the Starwood breach has implications for both Marriott International and the companies watching to learn from.

According to Mandiant, the average dwell time for an attack is 101 days. Though there are few details about the Starwood/Marriott breach, experts say several factors might have contributed to the longer-than-usual dwell time.

According to Avivah Litan, a vice president and distinguished analyst at Gartner who has researched many large-scale breaches, the long dwell time is an indicator that the attackers were nation-state threat actors. "These guys are really good at what they do," she says. "You know, they're very stealthy — they hide in places you can't find."

In support, Litan points to details contained in the indictments for the Democratic National Convention's email server breach, which show that the DNC hired a forensic security specialist ("Company 1" in the indictment) to clean up the breach when it was discovered. Despite their efforts, the attackers maintained persistence on the servers and took files for months following the remediation efforts.

And Stephen Moore, chief security strategist at Exabeam, was part of the Anthem Healthcare security team that followed up on the insurance company's 2015 breach. He says that Starwood's 2016 purchase by Marriott could easily have increased the time the attackers had inside the network. "That's a prime moment to attack, and then it would absolutely make things more difficult," Moore explains. "I could say it would be at least twice as difficult to identify an adversary in the network because there are so many other things going on politically and otherwise."

For some professionals, the activity going on around the IT department is no excuse. "In my opinion as somebody who works in the field, a month is too long, a week is too long. You should be catching that data is being actively sent from your system to another location that you didn't authorize in a couple of days tops," says Jessica Ortega, security research analyst at Sitelock.

The Impact Spreads
Though some have focused on the financial fraud possible with stolen payment card information, Moore says other, more serious consequences are possible from this breach, or any breach in the hospitality industry. "In the past there have been travel-related incidents tied to hospitality that were for intelligence-gathering and espionage," he says. "There are at least two very heavy-handed adversaries looking to either prosper from us financially or utilize us much like a lamprey attaches to a shark to draw information about who is staying where, who is going where, and which passport numbers were included."

Moore also points out that a four-year breach isn't the result of an opportunistic hack. Litan agrees. "Nation-states are interested in hotel data because it gives them really good information on where their targets are," she says. "If they're targeting people, there are many different uses for the data, ranging from stealing money to targeting individuals to national cybersecurity implications where they want to manipulate populations for political purposes."

A Stream Of Breaches
Public response to the Starwood breach has been muted, perhaps because it's merely the latest in a long line of large data breaches. Breaches continue for a simple reason, Ortega says. "There's no accountability for these businesses that have data breaches as of right now in the US," she says. And any possible accountability is merely passed off to others, Litan adds.

"The problem is the CEOs don't really want to spend extra money on security," she says. "They want to buy cyber insurance. If you look at Equifax, like they got a $95 million payout from their insurance company. And that's the way a lot of these CEOs think." In fact, she explains, "in general, CEOs would rather spend money on cyber insurance than on security."

There is a regulatory framework that carries the possibility of serious penalty, though no one knows what impact it will have on Marriott.

"There are accountability measures built into the GDPR regulations in the European Union, but those regulations are still relatively new, and we haven't really seen a large scale or a large enterprise business like this," Ortega says. "This, if nothing else, will be an interesting test for what actually happens with a large-scale data breach under GDPR. And we'll get an idea more of future penalties from this experience than we will be able to predict what will happen to Marriott in particular."

Related Content:

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
12/6/2018 | 9:49:24 AM
The Ostrich Principle
If we wait long enough, maybe it will go away and nobody will notice
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15208
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can ...
CVE-2020-15209
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one....
CVE-2020-15210
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and ...
CVE-2020-15211
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices f...
CVE-2020-15212
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `outpu...