Checking In Securely: How IAM Keeps Hackers Out of Your Hotel

The Cybersecurity Landscape in Hospitality

 

The hospitality industry has rapidly embraced digital transformation to enhance guest experiences, streamline operations, and remain competitive in a global marketplace. From digital key cards and automated check-ins to interconnected IoT devices and sophisticated reservation systems, hotels are increasingly becoming technology-driven enterprises. While this digital evolution has brought unprecedented convenience and efficiency, it has also created a vast attack surface for cybercriminals.

According to a Trustwave SpiderLabs report from 2023, the hospitality sector faces an alarming increase in cyber threats, with nearly 31% of hospitality organisations reporting data breaches in their history. More concerning is that 89% of those affected have experienced multiple breaches within a single year. With the average cost of a data breach in the hospitality sector estimated at $3.4 million, cybersecurity is no longer just an IT concern but a critical business function.

The hospitality industry presents an especially attractive target for cybercriminals for several key reasons:

  1. Wealth of Sensitive Data: Hotels collect and store vast amounts of valuable personal and financial information from guests, including credit card details, passport numbers, addresses, and other personally identifiable information (PII).
  2. Complex Digital Ecosystem: Modern hotels operate numerous interconnected systems such as property management systems, point-of-sale terminals, Wi-Fi networks, IoT devices, and third-party vendor connections, which create multiple potential entry points for attackers.
  3. High User Turnover: With guests and staff (e.g. seasonal) constantly changing, managing access rights and maintaining security across constantly shifting user bases becomes extremely challenging.
  4. Distributed Operations: Many hotel chains operate globally with inconsistent security practices across properties, creating vulnerabilities that can be exploited.
  5. Legacy Systems: The industry often relies on outdated technology that may lack modern security features or regular security updates.

 

Major Cybersecurity Threats

Now let us discuss a few types of attacks that can happen in this industry along with some real world examples and their impacts.

1. Data Breaches using Malware

Example: Marriott/Starwood Breach (2014–2018)

One of the most notorious breaches in hospitality history occurred when attackers compromised Starwood Hotels’ systems in 2014. The breach remained undetected even after Marriott acquired Starwood in 2016. When finally discovered in 2018, it was revealed that personal information of approximately 500 million guests had been exposed, including names, contact details, dates of birth, gender, and even passport numbers. The breach originated from a Remote Access Trojan (RAT) and credential-harvesting tools that allowed attackers to infiltrate the network and obtain access to the guest reservation database.

Impact: Beyond regulatory fines exceeding $100 million, Marriott faced massive reputational damage, legal actions, and the cost of offering identity monitoring services to affected customers.

2. Point-of-Sale (POS) Attacks

Example: Hyatt Hotels Breach (2015)

In January 2016, Hyatt Hotels Corporation disclosed that payment card malware had affected 250 of its properties across 50 countries, making it one of the most widespread hotel POS breaches at the time. The malware infected their payment processing systems primarily at restaurants, but also affected spas, golf shops, parking facilities, and some front desks. The attack lasted from August 13 to December 8, 2015. The malware collected cardholder names, card numbers, expiration dates, and internal verification codes as the data was being routed through the affected payment systems.

Impact: The breach affected hundreds of thousands of customers globally, requiring Hyatt to provide identity protection services to affected guests. The company faced significant costs for forensic investigations, system remediation, legal services, and customer notification. Beyond direct costs, the breach damaged consumer trust and required extensive security upgrades across their global properties to prevent future incidents.

3. Attacks via Third-Party Vendors

Example: Caesars Entertainment Breach (2023)

In September 2023, Caesars Entertainment confirmed a major breach where attackers stole the company’s loyalty program database, one of the largest of its kind in the industry. The attackers initially compromised a third-party IT vendor using social engineering techniques before leveraging the vendor’s privileged access to acquire the database containing highly personal information, including driver’s license details and Social Security numbers.

Impact: After initially demanding a $30 million ransom, Caesars reportedly paid $15 million to prevent the publication of the stolen data. They also offered credit monitoring and identity theft protection services to all members of its customer loyalty program

4. Distributed Denial of Service (DDoS)

Example: InterContinental Hotel Group (IHG) Attack (2022)

In September 2022, InterContinental Hotels Group (IHG), which operates brands like Holiday Inn, Crown Plaza, and Regent hotels, suffered a significant DDoS attack that took down its booking systems globally. The attack disrupted the company’s online booking channels, mobile apps, and internal systems.

Impact: The attack caused widespread disruption for travellers who were unable to make or modify reservations. While there is no report on the exact loss of revenue, there are expert comments suggesting it to be more than 100 million. Additionally, the company’s stock price dropped by nearly 3% immediately following news of the attack.

5. Unsecured Wi-Fi Networks

Example: DarkHotel APT Campaign (2007-Present)

Active since 2007, the DarkHotel advanced persistent threat (APT) group has conducted ongoing espionage campaigns specifically targeting business executives and government officials staying at luxury hotels. The attackers compromise hotel Wi-Fi networks and then trick specific high-value targets into downloading and installing malicious software, often disguised as legitimate software updates. The campaign has been active across hotels in Asia, particularly in Japan, South Korea, and China, but has spread to other regions as well.

Impact: Victims of DarkHotel attacks have had their sensitive corporate information and intellectual property stolen. Several major corporations have reported data theft linked to these attacks, with some estimates suggesting intellectual property losses in the billions. The precise targeting of high-profile individuals has made this attack particularly concerning for business travellers and corporate security teams.

The above mentioned attacks are some concerning attacks specific to the hospitality industry. In addition to the incidents highlighted above, other major companies including Hilton, Wyndham, Radisson Hotel Group, MGM Resorts, and many others have suffered devastating cyber attacks over the years.

 

IAM (Identity and Access Management) as a Strategic Solution for Hotel Cybersecurity

IAM represents a comprehensive framework of business processes, policies, and technologies designed to manage digital identities and control user access to critical information and systems. For the hospitality industry, with its unique challenges of high staff turnover, diverse systems, and sensitive guest data, IAM offers powerful security solutions that balance protection with operational efficiency. Following are some key IAM strategies and their real-world impacts to address the above threats.

1. Role-Based Access Control

Assign access rights based on predefined roles rather than individual users. For example, front desk staff access reservation systems but not financial records and housekeeping managers access room status but not payment details.

2. Multi-Factor Authentication (MFA)

Require multiple verification factors for system access, especially for payment processing systems, property management access, and privileged operations. Implement contextual authentication based on location, time, and device.

3. Privileged Access Management (PAM)

Apply additional security layers for high-privilege accounts by recording privileged sessions, automatically rotating credentials, enforcing approval workflows for high-risk activities, and granting elevated privileges only when needed and for limited durations.

4. Zero Trust Architecture

Verify every access request regardless of source, apply micro-segmentation to limit breach impact, implement continuous monitoring and authentication, and utilise behavioural analytics to detect anomalies.

5. Automated Lifecycle Management

Automate user access provisioning and deprovisioning as roles change, integrate physical access with digital credentials, implement coordinated monitoring across physical and digital systems, and create unified security policies across all access types.

The Marriott/Starwood Breach (2014–2018) could have been contained through proper role-based access controls, and zero trust architecture. Had Marriott implemented these controls, the attackers who gained initial network access would have faced limitations in lateral movement, preventing them from accessing the entire guest database. The same controls could have mitigated the IHG Attack (2022) and the Hyatt hotels breach (2015).

The Caesars Entertainment Breach (2023) is a good example where PAM and MFA could have worked together to prevent security incidents. The attackers initially compromised a third-party IT vendor through social engineering, then leveraged the vendor’s privileged access. Proper PAM solutions and MFA controls would have required specific approval for accessing their databases and authenticate the users. Even for victims of the DarkHotel APT Campaign, these controls would have prevented or limited any theft of sensitive information even if their devices connected to a compromised network.

Conclusion

While the benefits of IAM are clear, implementation in the hospitality environment presents unique challenges. Hotels operate heterogeneous systems from different vendors, making integration complex. Security measures must be balanced with guest experience, as cumbersome authentication processes could impact satisfaction. Smaller properties face cost constraints when considering comprehensive IAM solutions. In addition, the rapidly evolving threat landscape, with AI-powered attacks require continually updated defences.

As the hospitality industry’s digital transformation accelerates, robust IAM strategies are no longer optional but essential. Hotels that make this investment now will not only safeguard their operations against current threats but will be better positioned to adapt to the emerging challenges of tomorrow’s increasingly connected hospitality landscape.

Share this post

Ready when you are, for a discussion about how we can help.

Copyright © 2024  •  Contact Us  •  Privacy Policy         

Discover more from Assertiv

Subscribe now to keep reading and get access to the full archive.

Continue reading