• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechCyber Saturday

Cyber Saturday—Marriott’s Data Breach Baloney, Quora Hack, Aussie Encryption Law

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
December 8, 2018, 6:30 PM ET

Happy weekend, Cyber Saturday readers.

I’m back stateside after a week-and-a-half stay in China, where I helped host Coins2Day‘s 2018 Global Tech Forum. I hope you understand the absence of last weekend’s dispatch; following the event, I took an impromptu vacation in Hong Kong. Thankfully, I did not stay at a Marriott hotel. Speaking of which.

As you have no doubt heard by now, Marriott disclosed a massive data breach that exposed up to 500 million customer records. Hackers accessed information in the company’s Starwood reservation system, which affected brands such as W Hotels, St. Regis, Sheraton Hotels & Resorts, Westin Hotels & Resorts, and other properties in the Starwood portfolio, the company said. The intrusion apparently began in 2014, two years before Marriott acquired Starwood. This oversight in the M&A process calls to mind another recent, post-acquisition hacker-surprise: Yahoo, whose two mega-breaches remained undetected when the company sold to Verizon last year. Coincidentally, Marriott’s hack is the biggest suffered by a corporation, second only to those at Yahoo.

After news of the Marriott breach came out, Sen. Charles E. Schumer (D-N.Y.) Called on the hotel chain to foot the bill and replace people’s passports which were potentially compromised as part of the breach. Marriott quickly promised to cover the cost for as many as 327 million people whose passport numbers may have been exposed. At a fee of $110 per passport, that would put Marriott on the hook to pay up to $36 billion—a price tag equivalent to the value of the entire company, per its market capitalization. A devastating payout.

Here’s the thing though: While seemingly noble, Marriott’s promise is a bunch of baloney. The company said it will follow through on reimbursement only in instances where it “determine[s] that fraud has taken place.” What this caveat conveniently excludes is that Marriott’s hack likely had little to do with fraud and everything to do with espionage. In other words, if you’re a victim, don’t expect remuneration.

As Reutersreported, investigators believe the perpetrators of this attack were Chinese spies. The breach used tools, tactics, and procedures that matched Beijing’s style. The intrusion is said to have begun shortly after a breach of the government’s Office of Personnel Management, which government officials have attributed to China. The Starwood database represents a massive trove of potential intelligence: information on who is staying where, when—a bonanza for building up profiles of targets and tracking people of interest.

Geng Shuang, China’s Ministry of Foreign Affairs spokesperson, issued a statement saying the country “opposes all forms of cyber attack,” per Reuters. He said the country would investigate the claims, if offered evidence. Meanwhile, Connie Kim, a Marriott spokesperson, said “we’ve got nothing to share” about the Chinese attribution claim.

The Marriott breach—which took place quietly over years, as spies prefer—does not appear to have been a cybercriminal score. The passport payment pledge is probably bunk; nevertheless, if you think you might have been affected, it won’t hurt to follow these steps to refresh your cybersecurity hygiene and better protect yourself.

Have a great weekend.

Robert Hackett

@rhhackett

[email protected]

Welcome to the Cyber Saturday edition of Data Sheet, Coins2Day’s daily tech newsletter. Coins2Day reporter Robert Hackett here. You may reach Robert Hackett via Twitter, Cryptocat, Jabber (see OTR fingerprint on my about.me), PGP encrypted email (see public key on my Keybase.io), Wickr, Signal, or however you (securely) prefer. Feedback welcome.

THREATS

Encryption down under. The Australian government passed into law a piece of legislation that would require tech companies to provide law enforcement access to users' encrypted communications. Cybersecurity pros say the new law will open people's communications up to spies and hackers.

Q: Who got hacked? Answer: Quora, the Q&A website. The company said data for about 100 million user accounts were compromised, including usernames, email addresses, password hashes, and more. Quora said about 300 million people use the website each month.

GOP infiltrator. During this year's midterm elections, the email accounts of four senior aides at the National Republican Congressional Committee were surveilled by an intruder, Politico reported. Officials said they did not disclose the breach "because they were intent on conducting their own investigation and feared that revealing the hack would compromise efforts to find the culprit."

Symantec shakeup. Three top-level executives have recently left the cybersecurity giant: Michael Fey, chief operating officer and president; Michael Williams, chief marketing officer; and Bradon Rogers, head of "go-to-market" teams. In their absence, other executives are taking on expanded duties. Meanwhile, Symantec recently wrapped an investigation that found it had misreported financial earnings, recognizing millions of dollars in revenue in a wrong quarter.

Here are the only 2019 cybersecurity predictions worth reading.

Share today's Cyber Saturday with a friend:

http://coins2day.com/newsletter/cybersaturday/

Looking for previous Data Sheets? Click here

ACCESS GRANTED

Invasion of the privacy snatchers. An essay recently published by the Niskanen Center, a Washington, D.C.-based think tank that promotes a libertarian agenda, argues against "privacy fundamentalism": the ideological rejection of any privacy-intrusive technologies without consideration of their potential value to consumers. In the piece, Alec Stapp, the author and a technology policy fellow at the center, critically examines a trend he calls the "privacy panic cycle," which he says tends to exaggerate the risks of new technologies. (See the backlash over Caller ID in the early '90s.) Here's an excerpt.

Many new technologies go through this “privacy panic cycle” (e.g., RFID tags, cameras, loyalty cards). It often begins with advocacy groups — such as the Electronic Privacy Information Center (EPIC), the Center for Democracy & Technology (CDT), Access Now, and others — feeding the natural tendency of media outlets to exaggerate the risks associated with a new technology because audiences love negative news (“if it bleeds, it leads”). As the frenzy escalates, headlines start to declare that the sky is falling. Then, despite the Chicken Little omens, fears begin to diminish over time as reality sets in. The cycle ends — not with a bang, but a whimper — as consumer appreciation of the new technology or service proves the deciding factor in its ultimate widespread adoption.

My favorite bit, not included above, analyzes the unlikely coalition formed between groups motivated by "both virtuous and venal interests," called "bootleggers and Baptists." That section is well worth a read.

FORTUNE RECON

In the Wake of GDPR, Will the U.S. Embrace Data Privacy? By David Meyer

How the iPhone's Health App Caught a Man Jailed for Murdering Wife by Don Reisinger

FCC Chair Ajit Pai Admits Millions of Russian and Fake Comments Distorted Net Neutrality Repeal by Glenn Fleishman

Speak Up: Pindrop Raises $90 Million to Expand Voice Security by Jeff John Roberts

Google's 'Filter Bubble' Can Manipulate Your Search Results, Study Suggests by Natasha Bach

How Email Scammers Are Using Marketeer Methods to Target CFOs by David Meyer

Khashoggi Friend Sues Israeli Spyware Firm Over the Journalist's Murder by Erik Sherman

ONE MORE THING

Save the children. Big Tech companies are getting their hands on the data of children thanks to over-sharing parents and surveillance-friendly technologies, like home security cameras, smart speakers, Internet-connected toys, and gaming apps. In a report released in November, Anne Longfield, England's children's commissioner, estimated that children on average have 70,000 posts about themselves online by their 18th birthday. "We need to stop and think about what this means for children’s lives now and how it may impact on their future lives as adults," Longfield argues. (HT to Vox for covering the report.)

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.