InterContinental Hotels Group (IHG) has released data disclosing how malware was used to steal customer payment card details from around 1,200 of its franchised properties.
The group which owns the Holiday Inn and Crowne Plaza hotel brands found that malware had infected the cash registers at a number of its hotels worldwide, and siphoned off information read on the magnetic strips of payment cards as it was routed through the servers of the hotels.
The malware was originally discovered to have affected the front-desks payment systems of the group’s hotels between September and December 2016, but until now IHG has not realised the extent of the attack.
“The investigation identified signs of the operation of malware designed to access payment card data from cards used onsite at front desks at certain IHG-branded franchise hotel locations between September 29, 2016 and December 29, 2016.
Although there is no evidence of unauthorised access to payment card data after December 29, 2016, confirmation that the malware was eradicated did not occur until the properties were investigated in February and March 2017,” the company said.
As such IHG is advising its previous customers to be vigilant of fraud on their cards and accounts.
To tackle the security problem, IHG is offering all its franchises a free security inspection carried out by an external forensics team, however they need to be proactive in taking up IHG’s offer.
The ramifications of the malware infection was mitigated a little with group’s roll out of an encrypted payment acceptance system.
“Before this incident began, many IHG-branded franchise hotel locations had implemented IHG’s Secure Payment Solution (SPS), a point-to-point encryption payment acceptance solution,” the group said.
“Properties that had implemented SPS before September 29, 2016 were not affected. Many more properties implemented SPS after September 29, 2016, and the implementation of SPS ended the ability of the malware to find payment card data and, therefore, cards used at these locations after SPS implementation were not affected.”
IHG has also created a tool for people to look up whether they stayed at an infected hotel during the three month period last year.
Hotels present attractive targets for cyber criminals given the wealth of data that passes through them, in one case resulting in a ransomware attack against a hotels electronic locking system.
Quiz: Are you a security pro?
Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant
No skynet please. After the US, UK and France pledge human only control of nuclear…
Microsoft's AI investments continue in south east Asia, after investments in Japan, Malaysia, Indonesia, as…
New chapter for LastPass as it becomes an independent company to focus on cybersecurity, after…
US FCC seeks to ban Chinese telecom firms at centre of national security concerns from…
Two updates to Anthropic's AI chatbot Claude sees arrival of a new business-focused plan, as…