Marriott hack: 60 per cent of cyber attacks now involve multiple targets in one organisation warns Carbon Black

Peter Gothard
clock
A Marriott Hotel, in happier times
Image:

A Marriott Hotel, in happier times

"Island hopping" attacks targeting suppliers and acquisitions also growing threat, say experts

Nearly 60 per cent of cyber attacks target multiple components on an organisation's network, reseach from security firm Carbon Black states.

This supports the theory that breaches like today's reported Marriot Hotel Group hack - which involved criminals spending more than four years inside the company's system to steal 500 million customer data records over that time - may not be isolated attacks.

Tom Kellermann, chief cybersecurity cfficer at Carbon Black said:

"It appears there had been unauthorised access to the Starwood network since 2014, demonstrating that attackers will get into an enterprise and attempt to remain undetected.

"A recent Carbon Black threat report found that nearly 60 per cent of attacks now involve lateral movement, which means attackers aren't just going after one component of an organisation - they're getting in, moving around and seeking more targets as they go."

Carbon Black's report also found that more than half of attackers now use their victim primarily for a practice known as "island hopping".

"In these campaigns, attackers first target an organisation's affiliates, often smaller companies with immature security postures and this can often be the case during a merger or acquisition," said Kellermann.

"This means that data at every point in the supply chain may be at risk, from customers, to partners and potential acquisitions."

Forrester analyst Enza Iannopollo has also called the Marriott breach an attack with "the potential to trigger the first hefty GDPR fine".

"The ingredients are all here," said Iannopollo.

"The volume of personal data exfiltrated, more than 500 million customers, the sensitivity of the data, potentially including customers' passport details, name, address, and even encryption keys, and the length of the breach which started in 2014."

To learn more about protecting about cyber threats in an increasingly hostile landscape, read a new report from Computing and experts at Carbon Black, which focuses on introducing the human element of "threat hunters" into an organisation to more proactively tackle the more sophisticated, human-driven activities which are becoming a greater reality of the IT security world.

More on Security Technology

Application security: shift-left is necessary but insufficent

Application security: shift-left is necessary but insufficent

Integrating security checks into code should be seen as part of a bigger picture, says Kubecon panel

John Leonard
clock 20 May 2022 • 4 min read
Image: Eurovision

Italian police block pro-Russia attacks during Eurovision

The authorities foiled cyberattacks pro-Russian groups Killnet and Legion during the 2022 Eurovision Song Contest in Turin last week.

Tom Allen
clock 16 May 2022 • 3 min read
Interview: Sunlight, AI & Machine Learning Awards finalist

Interview: Sunlight, AI & Machine Learning Awards finalist

"Sunlight was born out of a collaboration with ARM in 2013 and that was to build a lightweight hypervisor that could really efficiently virtualise low power and embedded processor platforms"

Computing Staff
clock 13 May 2022 • 2 min read