DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Omni Hotels & Resorts attack claimed by Daixin Team; 3.5 million guests’ data stolen (2)

Posted on April 14, 2024 by Dissent

As many people suspected, Omni Hotels & Resorts was the target of a ransomware attack in March.

Omni first described the incident as a chain-wide “outage” due to IT issues. By April 1, guests were losing patience with the “outage.” Bleeping Computer noted guests complaining online claiming that they had to send text messages to the front desk requesting to be let into their rooms, and it might take 30 minutes for someone to show up. Others complained on social media that they were spending hours or days trying to reach someone to make or change reservations.

On April 3, Omni admitted that the “outage” was a cyberattack.

Omni’s most recent update was on April 8, when they reported that they had restored systems across its portfolio of properties.

Their update page has never stated it was a ransomware attack or that they received any extortion demand.

On the important question of what types of data may have been accessed or acquired, Omni’s status page states:

We are currently working to determine the scope of the event, including impact to any data or information maintained on Omni systems. Our investigation into the incident remains ongoing and we are working with external specialists in this process.

Threat Actors Claim Responsibility

According to threat actors who have now claimed responsibility for the attack, Omni already knows what data has been exfiltrated. A spokesman for Daixin Team informed DataBreaches that the attack was launched on March 27, and a negotiator or representative for Omni entered the threat group’s chat room the next day.

“They know what data we have,” the spokesperson told DataBreaches. “They received proofs and examples of data.”

As some employees had told Bleeping Computer, some servers were restored from scratch. Daixin did not know whether some servers might possibly have been restored from offline backups.

In a listing on their leak site today, Daixin writes:

STOLEN DATA INCLUDES:
Sensitive data. (Including all records of all visitors from 2017 to the present )

==== LEAK ====WILL BE SOON

They have not provided any proof of claims at this point, however.

DataBreaches has reached out to Omni to request their response to Daixin’s claim. DataBreaches has also reached out to Daixin Team to request some proof of claims and additional details. This post will be updated when responses are received.

Daixin Team was the subject of a CISA alert  (.pdf) on October 22.  Previous coverage on DataBreaches of their double extortion attacks on the medical sector and business sectors can be found linked here.


Update 1:  It appears that in response to this site’s email inquiry (and perhaps, others’ inquiries), Omni posted another update today. This one states:

Omni Hotels & Resorts continues to investigate a recent cyberattack on its systems with the assistance of a leading cybersecurity response group. As part of this investigation, we have determined that limited information pertaining to a subset of our customers may have been impacted.

It is important to note that the impacted data does not include sensitive information such as personal payment details, financial information, or social security numbers. It may include customer name, email, and mailing address, as well as Select Guest Loyalty program information. We have reported this matter to law enforcement.

Update 2:  Daixin Team responded with both data and a screenshot of alleged negotiations between them and Omni. One sample was a small spreadsheet sample with fields that included fields with: Guest_name_id, First_name, Last_name, Email, Zipcode, State, Country, Membership_ID, Membership_Level, and other fields about their last stay. DataBreaches has redacted some of the data in the screencap below:

Some customer data from guests who checked out on January 4, 2024. Source: Provided by Daixin Team to DataBreaches.

Daixin Team also provided a second spreadsheet with the same fields, but the data in the second sample was from guests who checked out in 2017. Most of these were “GOLD” level membership guests. This sample contained 10,000 rows or records. Sorting by Guest_name_id and Membership_ID found no duplicates, so these appeared to be 10,000 unique guests.

The negotiation chat snippet provided by Daixin to DataBreaches appears below. They inform DataBreaches that as of the last negotiations, they had dropped their asking price to $2 million. “They are in chat now, but they are silent, and time is up,” their spokesperson wrote to DataBreaches this afternoon. The chat log includes a statement by Daixin to Omni that the main database dump has “3539089 records of hotel visitors.”

Snippet of negotiations in chat between Omni Hotels and Daixin Team on April 11 and April 12. Provided to DataBreaches.net by Daixin Team.

Daixin also provided proof of the 3.5 million guest data. They provided Databreaches with 3 parts of a spreadsheet with the data. Unlike the previous two samples, these data included the guests’ postal addresses:

Last part of a database that appears to contain 3.5 million guests’ records. Provided by Daixin Team to DataBreaches.net.

Related posts:

  • OakBend Medical Center hit by ransomware; Daixin Team claims responsibility
  • Another hospital hit by ransomware: Columbus Regional Healthcare System in North Carolina hit by Daixin
  • Exclusive: Daixin Team claims responsibility for attacks affecting Canadian hospitals, starts leaking data
  • Acadian Ambulance hit by ransomware attack; Daixin claims info on 10 million patients stolen
Category: Business SectorMalwareU.S.

Post navigation

← Small physician groups particularly vulnerable after Change Healthcare cyberattack; some consider bankruptcy
‘Large-scale cyberattack’ hits five French municipalities, impact may last ‘months’ →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.