⚠ We would appreciate if you would disable your ad blocker when visiting our site! ⚠

Open Sesame! A Thousand and One Nights: The Making of a Security Breach

Order a reprint of this story
Close (X)
ORDER A REPRINT

To reprint an article or any part of an article from Hospitality Upgrade please email geneva@hospitalityupgrade.com. Fee is $250 per reprint. One-time reprint. Fee may be waived under certain circumstances.

SEND EMAIL

October 15, 2015
Data Security
Marion Roger

Editor's Note: Whether you’re a hotelier or a third-party technology partner for the hospitality industry (GDS, OTA, PMS or any of the various types of technology that touches, processes, manages, distributes, shares or houses anything to do with a hotel booking), pay close attention! What you are about to read is your teachable moment.

A teachable moment is that moment when a unique, high interest situation arises that lends itself to serious discussion of a particular topic.

During HITEC, Reneta McCarthy, a senior lecturer at Cornell University’s School of Hotel Administration, told Hospitality Upgrade magazine a story she was directly involved in. When the dust settled, our heads were spinning and HU Publisher Rich Siegel said, “What a genuine teachable moment.” When you hear this true story, you will agree; it is long overdue for thoughtful industry exploration.

Early June 2015, an undergrad student who McCarthy was advising was researching property management systems as part of a summer internship and came across a free, cloud-based property management system (PMS) with all the bells and whistles available to any hotel willing to join a particular brand. This freebie warranted investigation. Following the Web links in press releases, it was easy to download the free .exe software and set up what appeared to be the demo. Once installed, the window prompted for a username and password, so a simple choice was made: “Admin” for username and “Admin” for password. And, as Ali Baba said, “open sesame!” The passwords worked like a charm.
 
Once logged in, the student did a double take. There were multiple tabs containing full credit card numbers related to guest profiles. You read that right! The numbers were displayed in their entirety, unencrypted and including expiration dates, names and address information (personally identifiable information or PII).

The student wondered if this was legitimate and clicked through multiple screens that seemed to allow access to information for past, present and future guests of at least 50 hotels. Were they real hotels or dummy hotels for a demo? Through a series of creative Web searches he confirmed the hotels and guest reservations were real.

Clicking further, incredulously, each hotel had several user accounts designated as owner/administrator. Again, very alarming. Best practice suggests there should only be one person for an entire group with owner or super admin rights since it confers the right to create new user accounts and change passwords. This was not intentional or malicious but the implications were huge; one could change passwords and lock all users out.
 
Anyone with owner privileges at any of the properties could do the same to others. Worse still, all users at some properties were pegged as “owner.” The student had unintentionally discovered a major vulnerability and had logged into a real PMS as the administrator.
 
Shaken by this realization, he logged out immediately and (even though it was almost 1:00 a.m.) emailed McCarthy with a step-by-step narrative of what had just taken place. McCarthy read the email the next morning. She found it unimaginable that her student had penetrated a major system and decided to replicate the experience using the steps outlined in the email before responding. She viewed similar screens, and knowing the card data and PII was unprotected, quickly logged out and picked up the phone to call the CEO of the group. She also sent an email to the hotel group to alert it of the problem.

Although no extraction of data or PII was performed by the student or the educator, one has to ask whether they are the only ones to have ever gotten into this PMS via the supposed demo link. Given how easily it happened, others may have infiltrated this PMS. What if someone with malicious intent gained access to these records?

Let’s look at the incident closely. How could it occur in the first place? What are the implications of this flaw? As part of the investigation we spoke to a variety of industry experts on the matter with three goals: 

Help hoteliers understand shared responsibility and password management.
2 Help technology players understand they are not only endangering their own company’s viability but also that of their clients if they are not taking security responsibilities seriously.
3 Review how to react when someone finds a vulnerability and tells you about it.


Review the Basics
Payment Card Industry Data Security Standard (PCI DSS) comprises a minimum set of requirements for protecting cardholder data and applies to all entities involved in payment card processing. The definition of “entity” includes the merchant of record defined here as the hotel who takes payment for a guest stay via credit card, as well as everyone the hotelier works with either directly or indirectly for that reservation as it is attached to a card that guarantees the room or prepaid the room.
 
Any technology that stores, processes or transmits cardholder data (CHD) such as payment processors, acquirers, issuers, Internet booking engines (IBE), central reservation systems, OTAs, PMSs and GDSs, attaches credit cards to confirmations. The PCI council views all aforementioned parties as subject to the requirements because each system either transmits or stores cardholder information.
 
The latest iteration of the PCI DSS (version 3.1) places heavy focus on shared responsibility and password management.

First let’s examine shared responsibility. In this situation, the member hotels of this brand are using technology (a cloud-based PMS) that stores credit card data of their guests. PCI DSS clearly demands the hotel share responsibility for the security of its guest’s card data with the PMS (provider of the technology) as opposed to the old approach of outsourcing (offloading) it to someone else to manage.

All experts interviewed agreed on this point: It does not matter if the hotel using the cloud-based PMS (or any technology for that matter) is part of a membership group, a soft brand or is part of a chain acting as a franchisee; in fact all of those as well as those owned and/or operated by a brand are in the same basket. Furthermore it does not matter if the hotelier knows about PCI DSS or the concept of shared responsibility. If and when guest data is compromised, they cannot use ignorance as a defense and they will be examined as partially responsible.

Understanding that while PCI is not law, there is law involved. The hotel has a legally binding contract with the various banks/card issuers that they signed and must honor so that they can accept credit cards for payment; these contracts demand the merchant be consciously involved in protecting the card data. If the hotel uses a product or works with a company that is not compliant with PCI standards, the merchant could be viewed as not compliant, putting it at risk of breaching the contract with the card companies.

The concept is even more explicit when using cloud-based services. Why? Because when any payment card data is stored, processed or transmitted in a cloud environment, PCI DSS will apply to that environment, not just the system itself. Translation: PCI DSS now requires validation of both the cloud service provider’s infrastructure and the client’s usage of that environment.

It gets even more complex: the hotel brand in this story has a formal agreement with a cloud-service provider (CSP) to extend this PMS technology to its membership base “at no cost” as a benefit. In reality the PMS is remunerated from a percentage of membership fees collected on each booking by the hotel group. Several lawyers indicated the membership group had selected the PMS vendor, endorsed it and set up its members, therefore clearly sharing responsibility for the security of the system. The system stores guest card data for its members’ reservations and is offered as a value add for membership, and money collected then is used to compensate the PMS for what appears to be a free benefit of membership.

Finally it is not unrealistic to expect a certain amount of hotel reservations take place on the website of the brand itself or via the GDS that the brand’s CRS accepts reservations from, and these bookings pass to the PMS under the brand’s code.

Lesson No.1
Even if the technology is not yours and not under your supervision, you cannot say you are absolved of liability if the entity storing the data about your guests is insecure or noncompliant or worse, is breached. The PCI DSS is absolutely clear about this matter. 

When you buy a briefcase or suitcase with a combination lock, typically it is preset at “000” and you reset it to your preferences. This is what is known as a vendor default password. PCI requirement No. 2 states, “Changing default passwords is required for application/service accounts as well as user accounts.”

Many vendors’ products in several industries come preconfigured with default (and thus well-known) usernames and passwords like “Admin, Admin,” but they should be deleted prior to usage in a production environment. It is a common mistake to forget to remove these default login credentials at launch. 

In the case of McCarthy’s experience, it is a big mistake that either the account manager at the PMS or the hotel group advisor who set up any of the members appears to have made. Several experts have insisted that someone at both companies could have or should have caught it. Both had the means to be alerted. Leaving default passwords in place for more than two years is a major mistake that allowed at least two unauthorized people (that we know of) to view unencrypted cardholder data on the PMS. How many other chains, groups or brands are using the PMS? 

Do not let the focus on PMS be the story here. From a point-of-sale system in a restaurant (e.g., Verifone swipe terminals, Aloha terminals, etc.) to a website e-commerce shopping cart (e.g., CreLoaded, osCommerce, etc.), from a PMS or GDS to a CRS or IBE, all are payment applications. PCI DSS 3.1 takes a clear position on vendor default passwords.

In April of 2008, hackers gained access to Wyndham’s system through a single computer in one of Wyndham’s franchised hotels that an employee at the property had connected to the Internet. This computer was also connected to Wyndham’s property management and reservation system. The hackers worked with administrator passwords and access codes, giving intruders a ready pipeline. When companies have such poor password hygiene, hackers do what hackers do. In that breach, within approximately one month, hackers had been able to compromise the computer systems of 41 different properties, which are fewer hotels than the Cornell student and McCarthy had unknowingly accessed. And it took Wyndham a number of months to recognize that the intrusion had occurred. The hotel membership group management claimed it was not its fault or responsibility as it did not own or operate the properties where the breach took place and the staff there were not employees.

In its original lawsuit, the FTC accused Wyndham of a litany of privacy failures, from storing unencrypted credit card information to lacking firewalls to using easily guessed passwords. The latest developments in FTC v. Wyndham announced in late August mean that the FTC has the teeth to go after and will continue to go after the brand whose PMS was accessed despite the argument that the brand can’t dictate compliance to property owners.
Technology companies and hotels, as you read this it bears repeating.

Lesson No. 2
If you are not stepping up your due diligence and security validation/certification and assessments of technology, you are endangering your own company’s viability as well as that of those with which you work, not to mention the data of millions of hotel guests (past, present and future).

Had this been a malicious incident, all three parties (the hotel, the membership group executives who signed the agreement with the hotel and the PMS and the management of the PMS technology) would be parties to a lawsuit (see sidebar), and while everyone would be pointing fingers at the other the card companies, would take the small independent mom and pop member hotelier directly to the cleaners. Taking the security responsibility concept seriously is no longer a compliance strategy but a survival strategy, aimed in part at reducing liability.

Lesson No. 3
Proactive preparation and education of everyone about contracts that relate to the use of a system that stores and/or transmits guest data and card data is of utmost urgency.

The member hotels on the brand’s PMS have full recourse against the brand for supplying technology that was proven to be insecure and noncompliant; the brand or membership group would have full recourse against the PMS for design flaws and lack of training. All the FTC is interested in is that the guest (whose data was compromised) doesn’t know or care about how the hotel where they stayed is connected to the brand. The two are viewed as the same even though those of us in the industry know that the brand does not own or operate the property, and as such is not able to dictate to them. In this case the PMS is compensated by funds paid to the membership office, which may or may not share in the revenues, and therefore are parties to the incident.

Finally if a system is inappropriately accessed, do you have any way of knowing? In this case the only way The X Hotel Group heard about it was that it was notified by an ethical professor. We found the hotel group’s reaction to the revelation shocking. The professor was treated as though she was going to extort or hold the brand hostage in some way, or even worse, as though the student had not really gotten into the system. This just further proves that this teachable moment cannot go unnoticed or unreported. There were many who referred to the concept of responsible disclosure and thought this matter should stay internal and not be exposed.

There seems to be an ongoing, almost incessant debate about the concept of responsible disclosure and whether it’s helpful or not for white hat hackers and other security researchers to publicly reveal details about the information security vulnerabilities they find. According to Tal Klein, a leading writer about white hat hacking, disclosure is an incredibly valuable tool that ensures infrastructure remains reliable.

He reminds us that we’ve been grappling with the problem of information security for a lot longer than two decades, and to drive his point home, shared a telling excerpt from the book, “Locks and Safes: The Construction of Locks” by A. C. Hobbs, published in 1853.

Where things get really interesting is when you start to think at cloud scale. For example, if we solve for patching by delivering software as a service, what happens when one finds vulnerability? Ostensibly if the vendor doesn’t fix it and the vulnerability is published, is the person who discovered it (or in this case reported about it in a trade magazine) actively harming every single one of that vendor’s customers? The question becomes who is to blame: The person who found the vulnerability or the vendor that failed to patch it?

Why does it always end up being a blame game? Who is to blame here? The X Hotel Group (a membership type of entity) or the mom-and-pop hotelier who wanted to save money and bought membership in part because of the value added benefits of what was sold to them as a secure PMS? The PMS vendor who may not actually be complying with PCI DSS getting a Payment Application certification? The writer of this article or the student?

We can spend a thousand and one nights talking about it. The hackers are already in systems in a thousand and one ways. Let the teachable moment be the story that if an undergraduate got in so easily, Ali Baba’s 40 thieves have been in and done the damage, and that should keep us all up a thousand nights. 

Marion Roger, VP Hospitality eResources, is a specialist in the hospitality supply chain landscape who is currently leading an industry initiative to support guest data security and has developed a hotel-focused training curriculum on PII protection.

©2015 Hospitality Upgrade
This work may not be reprinted, redistributed or repurposed without written consent.
For permission requests, call 678.802.5302 or email
info@hospitalityupgrade.com.

 

Legal Thoughts on Student X's Discovery
By Nicole Joy Leibman, Esq.

While it’s hard to imagine how the hotel group or PMS company referenced in the adjoining column actually allowed security to be so lax, the student’s discovery potentially gives rise to a number of legal actions and raises legal points worth covering.
  
First, it is realistic to imagine an FTC action against the hotel group and/or PMS company for failing protect consumer data, as well as an action between the member hotels who use the PMS against the hotel group for breach of contract and various business torts; a class action by potentially affected card holders against the hotel group and any member hotel who used the PMS; and even a potential declaratory judgment action by PMS company and/or hotel X regarding its cyber insurance coverage (assuming they have any).  

Forensic Investigation. From the perspective of the hotel group, the first step taken should have been to work with the PMS company to conduct a complete forensic investigation and determine whether any breaches occurred, or whether any credit card data or personally identifiable information (PII) was actually extracted or obtained. While there are no facts at this juncture indicating any customers PII was compromised by the student or the professor, given the ease in which an unsophisticated individual was able to access the hotel group’s PMS, there is a strong possibility that more sophisticated hackers accessed and obtained customer PII not only from those hotels using the hotel group’s “free PMS” but from any other hotel groups using the same cloud-based PMS. The only way to determine this is to conduct a complete forensic investigation and there is no indication that there has been an investigation at this point.

The hotel group in conjunction with the PMS company should also by now have patched the system insecurity that allowed the breach to occur, and should have resecured its systems by changing all system passwords. Individual member properties should likewise conduct an internal investigation to determine whether its’ consumer PII was comprised. 

Cyber Insurance and Indemnification. The hotel group should review and ensure it understand its cyber insurance policy and what in fact is covered, assuming it has cyber insurance.  In order to fully understand its exposure the hotel group should conduct a review of all of the operative agreements that would be applicable to a cyber breach, including its agreements with the PMS company and its member agreements with any and all member properties. I would be curious as to what types of indemnification provisions are contained in the agreements between the hotel group and the PMS company. Additionally, member hotels should examine the membership agreement for clauses related to technology available to members not owned or managed or developed by the hotel group. 

Given that most of the members are mom-and-pop type hotels and motels, it is unlikely that they would even know about let alone have cyber insurance. Even so, coverage may have exclusions, and may be denied for a myriad of reasons. Certain fines, such as non-regulatory fines imposed by Visa or MasterCard, can be quite hefty. This is key as the majority of the fees imposed on the hotel group’s members who will then be turning against the hotel group for reimbursement due to its endorsement.  Likely, they would look to the hotel group for indemnification or reimbursement of costs of litigation with respect to a data breach. 

The hotel group and those members using the PMS may look to the PMS company for reimbursement for some of its costs with respect to a cyber breach.  Conversely, the hotel group may be responsible for indemnifying its member properties with its respect to a data breach.
 
Vendor Due Diligence. While the hotel group may be inclined to point its finger at the PMS company as having the responsibility to ensure the PMS platform’s security, the hotel group is charging member properties indirectly for the use of the PMS company’s platform.  In doing so, the hotel group has the responsibility to reasonably ensure that the PMS has controls to properly protect the data of guests staying at any member hotels who are using the system. 

Vendor due diligence is one of the biggest issues companies face, and in fact was the culprit in the Target breach. If the hotel group did not have the internal wherewithal to properly complete its due diligence on the PMS company to ensure the platform’s cyber security, the hotel group should have engaged an external vendor to complete the task before endorsing and offering to members as a benefit of membership.

Review State and Federal Laws.  State notification laws with respect to data breaches should be reviewed to determine what consumers should be notified and how that notification should be disseminated. Failure to notify impacted consumers can result in additional exposure in terms of fines, which in some states are quite significant.

The hotel group should also determine whether it engaged in “unfair” and “deceptive” practices in violation of the FTC Act, 15 U.S.C. §45(a), by failing to properly secure members’ customer data.  Historically, the FTC has pursued those businesses that have exceptionally insecure data security and/or failed to maintain reasonable security for consumer data entrusted to them. In the wake of the Second Circuit’s recent decision in FTC v. Wyndham Worldwide Corp., 2015 U.S. App. LEXIS 14839 (3d Cir. N.J. Aug. 24, 2015), but, the FTC could come down hard given what seems to be a sheer lack of control.

Standing. As we have seen recently in the Ashley Madison hack, these types of cases typically lead to class actions by impacted consumers – i.e., those whose data (PII and credit card data) has been compromised. 

Any class action claims may now have a lower threshold to proceed with respect to damages. Under the ruling in the recent case Remijas v. Neiman Marcus Group, LLC, 2015 U.S. App. LEXIS 12487, *18 (7th Cir. 2015), the Court found that “injuries associated with resolving fraudulent charges and protecting oneself against future identity theft” are sufficient for standing in data breach cases.”

Why this and the 7th circuit’s recent decision about Neiman Marcus dovetail nicely is that actual injury should the data get in the wrong hands no longer has to happen for someone to have been victimized. Here is one great line from the ruling: “The FTC Act expressly contemplates the possibility that conduct can be unfair before actual injury occurs.”  This line is key, as “actual injury” (or harm) is often a basis for many courts to dismiss privacy and data security cases.  The court makes clear here that “substantial injury” for FTC Act unfairness does not require actual injury. The FTC Act protects consumers against reasonably foreseeable harms when a company’s conduct facilitates these harms – even when a company’s conduct might not be “the most proximate cause of an injury.”

Nicole Joy Leibman Attorney with Sills Cummis & Gross P.C., where her practice focuses on advising on various issues including cyber security and data breaches. The views and opinions expressed in this article are those of the author and do not necessarily reflect those of Sills Cummis & Gross.



want to read more articles like this?

want to read more articles like this?

Sign up to receive our twice-a-month Watercooler and Siegel Sez Newsletters and never miss another article or news story.