DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

A.G. Schneiderman Announces Settlement With Trump Hotel Collection After Data Breaches Expose Over 70K Credit Card Numbers

Posted on September 23, 2016 by Dissent

NEW YORK – Attorney General Eric T. Schneiderman today announced a settlement with Trump International Hotels Management LLC, d/b/a Trump Hotel Collection (“THC”), involving data breaches resulting in the exposure of over 70,000 credit card numbers and other personal data. THC has agreed to pay $50,000 in penalties and to shore up its data security practices.

“It is vital in this digital age that companies take all precautions to ensure that consumer information is protected, and that if a data breach occurs, it is reported promptly to our office, in accordance with state law,” said Attorney General Schneiderman. “Consumers personal information are all too often exposed to wrong-doers with ill-intent. We will continue working to help protect hardworking New Yorkers from all forms of identity theft.”

In late May 2015, multiple banks analyzed hundreds of fraudulent credit card transactions and determined that THC was the last merchant where a legitimate transaction took place. This is known as a “common point of purchase” (“CPP”) and suggests that THC was the target of a cyber-attack resulting in a compromise of credit card information. By June 10, 2015, a preliminary forensic investigation confirmed the existence of credit card targeting malware at multiple THC locations, including in the computer networks associated with New York, Las Vegas and Chicago hotels.  Further investigation revealed that on May 19, 2014, an attacker infiltrated THC’s payment processing system by accessing an administrative account in the primary domain controller using legitimate domain administrator credentials.  Using this unauthorized access, the attacker deployed malware designed to steal credit card information across the THC computer network and credit card processing environment.

Despite its knowledge as early as June 2015 that multiple properties had been infiltrated with malware designed to steal credit card numbers, and that banks had analyzed multiple fraudulent transactions and identified THC as a CPP, THC did not provide notice to its customers until close to four (4) months later, on September 25, 2015, when it placed a notice on its website about the data security breach.  This delay violated New York’s General Business Law § 899-aa which requires notice to consumers “in the most expedient time possible and without unreasonable delay.”

The following THC properties were infected with malware designed to steal credit card numbers and related information:

  1. Trump SoHo New York – 246 Spring Street, New York, NY 10013;
  2. Trump National Doral – 4400 N.W. 87th Avenue, Miami, FL 33178;
  3. Trump International New York – One Central Park West, New York, NY 10023;
  4. Trump International Chicago – 401 N. Wabash Avenue, Chicago, IL 60611;
  5. Trump International Waikiki – 223 Saratoga Road, Honolulu, HI 96815;
  6. Trump International Hotel & Tower Las Vegas – 2000 Fashion Show Drive, Las Vegas, NV 89109; and
  7. Trump International Toronto – 325 Bay Street, Toronto, Ontario, Canada M5H 4G3.

On March 30, 2016, THC received additional CPP reports from its payment processors about a second breach.  Another forensic investigation revealed that THC experienced a second breach where an attacker gained unauthorized access on November 10, 2015.  The attacker installed credit card harvesting malware on 39 systems affecting five hotel properties including Trump SoHo New York located at 246 Spring Street, New York, NY 10013.  The forensic investigation also discovered that on March 21, 2016 the attacker also connected to a legacy payment system on the network of the Trump International Hotel & Tower New York which included personal information of THC property owners including the names and social security numbers of approximately 302 people, 44 of whom live in New York.   THC provided consumer notification to these affected individuals on June 10, 2016.

The final forensic investigation report of the first breach recommended that THC adopt additional security precautions including “two-factor authentication” for remote access to the THC network, which is an extra layer of security that requires not only a username/password but additional information that only the user will know, e.g., a random number from a physical token. However, it was not until April 4, 2016 that THC adopted this solution.  If THC had adopted this solution after the first breach, consistent with its forensic investigator’s recommendation, it may have prevented the second breach.

The settlement requires THC to maintain reasonable security policies and procedures designed to protect consumer personal information including:

  1. Designation of an employee or employees to coordinate and supervise THC’s program designed to protect the privacy and security of personal information;
  2. Annual employee training to at a minimum inform employees who are responsible for handling personal information about data security, the importance of consumer privacy and their duty to help maintain its integrity;
  3. Responding to events involving unauthorized acquisition, access, use or disclosure of personal information including training all staff who are responsible for inputting, entering, maintaining, storing or transferring personal information on data breach notification law;
  4. Identifying material risks to the security and confidentiality of personal information that are reasonably likely to result in the unauthorized disclosure of such information, including through the regular review of security industry news sources for newly identified security vulnerabilities;
  5. Designing and implementing reasonable safeguards to control the risks identified through risk assessment, including use of two-factor authentication for remote access to computer systems;
  6. Regular testing of the effectiveness of the safeguard’s key controls, systems, and procedures, including through reasonable and appropriate software security testing; and
  7. Developing and using reasonable steps to select and retain service providers capable of maintaining security practices consistent with the agreement and requiring service providers by contract to implement and maintain appropriate safeguards.

This case was handled by Bureau of Internet and Technology Deputy Bureau Chief Clark Russell and Resident Technologist Marc Kowtko, under the supervision of Bureau Chief Kathleen McGee. The Bureau of Internet and Technology is overseen by Executive Deputy Attorney General for Economic Justice Manisha M. Sheth.

SOURCE: NYS Attorney General Schneiderman

Category: Business SectorHackOf Note

Post navigation

← UC San Diego School of Medicine notifying trainees whose SSNs were exposed on the Internet
CT: Hospital Patients Caught in Identity Theft Ring →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Cyberattacks on Long Island Schools Highlight Growing Threat
  • Dior faces scrutiny, fine in Korea for insufficient data breach reporting; data of wealthy clients in China, South Korea stolen
  • Administrator Of Online Criminal Marketplace Extradited From Kosovo To The United States
  • Twilio denies breach following leak of alleged Steam 2FA codes
  • Personal information exposed by Australian Human Rights Commission data breach
  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.