The Shangri-La Hotel group has said a database of personal information of customers at eight of its Asian properties may be affected after an unauthorized party gained access to a database between May and July. During that time, Shangri-La Singapore hosted a security summit. Some notable figures were in attendance for the event, but it’s unknown if they stayed at the Shangri-La location. The full extent of the attack is not yet known, but information included in the files that were extracted included contact information and encrypted information such as dates of birth, identity and passport numbers, and credit card details. At this time, Shangri-La has not found any misuse of the data, but that could change. Those who may have been affected have been notified.
Hotel customers who may have had their information included should stay extremely vigilant moving forward. If the encrypted data is able to be unencrypted, it opens the door for threat actors to carry out spear-phishing campaigns and identity theft efforts. To protect against these types of attacks, organizations can take defensive measures when creating a security strategy. Some of those measures include:
• Regularly back up data, air gap, and password protect backup copies offline.
• Ensure copies of critical data are not accessible for modification or deletion from the system where the data resides.
• Implement network segmentation.
• Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, secure location (i.e., hard drive, storage device, the cloud).
• Install updates/patch operating systems, software, and firmware as soon as practical after they are released. Implement monitoring of security events on employee workstations and servers, with a 24/7 Security Operations Center to detect threats and respond quickly.
• Use multifactor authentication where possible.
• Use strong passwords and regularly change passwords to network systems and accounts, implementing the shortest acceptable timeframe for password changes.
• Avoid reusing passwords for multiple accounts.
• Focus on cyber security awareness and training.
• Regularly provide users with training on information security principles and techniques as well as overall emerging cybersecurity risks and vulnerabilities.