Skip to main content

Hyatt joins growing list of high-end hotel groups hit by hackers

hyatt joins growing list of high end hotel groups hit by hackers
Another day, another hack on a high-end hotel group.

Hyatt Hotel on Wednesday warned customers to check their credit and debit card bills for suspicious transactions after it discovered malware on computers that operate its payment processing systems.

The hotel group, which runs about 600 properties around the world, said it dealt with the security breach as soon as it was spotted, and reassured customers that they can once again “feel confident using payment cards” at Hyatt-operated locations, including restaurants, cafes, bars, and stores inside its hotels. An investigation into the incident is ongoing.

There were few details about the breach in both the official press release and in a message to customers posted online. However, in cases involving malware on point-of-sale systems, criminals can often grab data such as cardholder names, payment card numbers, security codes, and expiration dates.

It’s not clear when the breach started, or even when it was noticed. We’ve reached out to Hyatt for more information and will update if we hear back.

Hyatt is the latest in a growing list of high-end hotel groups to be targeted by cybercriminals planting malware on payment processing systems. Just last month Hilton revealed it’d been hit by hackers in two attacks that lasted a total of 17 weeks.

The Trump hotel chain also recently confirmed a year-long data hack, while in March the Mandarin Oriental group said it’d discovered malware attacks at a number of its hotels around the world.

Data stolen in point-of-sale raids like this often ends up being traded on illicit hacking forums, with buyers of the stolen data using it to purchase goods online or withdraw money from bank accounts.

As ever, customers are advised to keep an eye on their payment card bills and to contact their bank or card provider immediately if they spot any unusual transactions.

[Update:] Stephanie Sheppard, Hyatt’s manager of corporate communications, contacted DT to say the malware was detected on November 30, but didn’t say why it took so long to inform customers. Sheppard said more details will be released once the investigation is complete, adding that updates on the case will be posted here.

Editors' Recommendations

Trevor Mogg
Contributing Editor
Not so many moons ago, Trevor moved from one tea-loving island nation that drives on the left (Britain) to another (Japan)…
Hackers expose personal details of 10 million MGM hotel guests
russia hotel wi fi hack hacking hacker lifestyle pc keyboard

A major security breach has hit MGM Resorts hotels after the personal details of 10.6 million guests were posted on a hacking forum this week.

The stolen data belongs not only to regular tourists but also to celebrities, tech CEOs, and government officials -- among them Twitter CEO Jack Dorsey and Canadian singer Justin Bieber.

Read more
Hackers taking advantage of coronavirus scare to spread malware
Coronavirus airplane

Security research firms have uncovered despicable acts by hackers taking advantage of the fear over the coronavirus outbreak to spread malware through emails.

According to experts from IBM X-Force Threat Intelligence, hackers have been sending spam emails to potential victims in Japan. The emails claim that the new coronavirus has infiltrated the country, and urge the receiver to open an attached Microsoft Word document to learn more information.

Read more
Hackers can easily watch your every move, control PCs with free NanoCore Trojan

If your laptop or desktop is running Windows, you might want to make sure you're up and running with the latest version of the operating system and your antivirus software. Researchers have discovered a new strain of the "NanoCore" remote access trojan (RAT), which could leave the most amateur hackers in complete control of your PC.

While RAT trojans have been around for some time, the latest trojan, known as NanoCore v1.2.2, is particularly dangerous. It is freely available for hackers to download on the dark web and can also easily be deployed to PCs. The most common method for deployment is via bogus "Urgent" phishing emails that typically contain fake order invoice documents with hidden malicious macro scripts. It is well known to security researchers but also can reach deep into the Windows registry and, even the network.

Read more