Feeds

Best Western plays down impact of hack attack

8 million records? Huh, more like 10

Beginner's guide to SSL certificates

Hotel chain Best Western has denied falling victim to a large-scale hacking attack.

A report in the Scotland's Glasgow Sunday Herald claims that the hotel chain has been turned over by a hacker who lifted eight million customer records. It reports that the Indian hacker who carried out the heist sold on the information to Russian cybercriminals. Data allegedly stolen included addresses, telephone numbers and credit card details.

The attack was pulled off using a Trojan horse to infect a PC with access to the hotel's online booking system.

Details of anyone who stayed in any of 1,312 European Best Western since last year were potentially exposed by the hack, the Herald claims. However, Best Western said that only one of its hotels (in Berlin) was hit and that only a handful of customers were affected.

The Herald reported that the breach was discovered on Thursday and shot down, following a tip-off to the hotel by the paper, on Friday afternoon (22 August). This makes for one of the few points of agreement between the paper and hotel.

Best Western said that the impact of the attack had been grossly overestimated. A spokeswoman said that the breach involved just one hotel in Germany and only ten customer records. Best Western added that because the hotel chain purges customer records a week after guests leave, the claims in the Herald report simply don't stack up.

We can confirm that on August 21, 2008, three separate attempts were made via a single log-on ID to access the same data from a single hotel. The hotel in question is the 107-room Best Western Hotel am Schloss Kopenick in Berlin, Germany, where a Trojan horse virus was detected by the hotel’s anti-virus software. The compromised log-in ID permitted access to reservations data for that property only. The log-in ID was immediately terminated, and the computer in question has been removed from use.

We can also confirm that we have been able to narrow down the number of customers affected by this breach to ten. We are currently contacting those customers and offering assistance as needed.

We are working with the FBI and international authorities to investigate further.

Best Western's statement adds that it plans to "reinforce best data protection practices" at our 4000 worldwide hotels. The chain is already compliant with the Payment Card Industry (PCI) Data Security Standards (DSS).

Customers with concerns are encouraged to call Best Western Customer Care in the US on +1 800 528 1238. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.