DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Years later, Marriott admits data were not encrypted before its 2018 data breach. Now what?

Posted on May 4, 2024 by Dissent

What might happen to a company that has been making false claims about its system security for more than five years after experiencing a massive data breach? Will state attorneys general, the SEC, and the FTC investigate and possibly penalize them for a significant misrepresentation to consumers and regulators?

CSO Online has a significant update concerning litigation against Marriott over the 2018 breach that affected hundreds of millions of customers:

For more than five years, Marriott has defended a massive 2018 data breach by arguing that its encryption level (AES-128) was so strong that the case against it should be dismissed. But attorneys for the hotel chain admitted in an April 10 hearing that it had never used AES-128 during the time of the breach.

In fact, it hadn’t been using any encryption at all at the time but rather had been using secure hash algorithm 1 (SHA-1), which is a hashing mechanism and not encryption.

During the hearing of the US District Court for the District of Maryland Southern Division, Judge John Preston Bailey ordered Marriott “to correct any information on its website within seven days.”

The Correction

Read more of Evan Schuman’s report on CSO Online. Schuman notes that in response to the judge’s order, Marriott didn’t even issue a new post on its site or any notice to call attention to the correction. They merely silently edited their original website notice to add two sentences:

Following an investigation with several leading data security experts, Marriott initially determined that the payment card numbers and certain passport numbers in the database tables involved in the Starwood database security incident that Marriott reported on November 30, 2018, were protected using Advanced Encryption Standard 128 encryption (AES-128). Marriott has now determined that the payment card numbers and some of the passport numbers in those tables were instead protected with a different cryptographic method known as Secure Hash Algorithm 1 (SHA-1).

[Note: Marriott’s original statement on their web page had been reported on DataBreaches.]

Now What?

Schuman notes out that the admission of no encryption years later raises a whole host of questions that have yet to be answered.

Did Marriott get reimbursed by their insurance carrier because they claimed the data had been encrypted?

Will the Securities and Exchange Commission have something to say about misleading investors by claiming encryption when it wasn’t used?

How is it that this wasn’t discovered and corrected in 2019 or 2020 at the latest? Why is this first coming out now?

Were there other lawsuits that were dismissed because of Marriott’s claim that data were encrypted? Were there other potential plaintiffs who did not sue because they relied upon Marriott’s claim of encryption?

Was this an innocent mistake on Marriott’s part or not?


Correction: The Marriott page does note an update on it — I missed it because I was looking at the bottom of the page and it was on top. Thanks to Evan Schuman for catching my error. A sentence commenting that there was no note of update has since been removed, although it is still a silent update on a years’ old notice — Dissent.

Related posts:

  • FTC Takes Action Against Marriott and Starwood Over Multiple Data Breaches
Category: Business SectorHack

Post navigation

← CISA’s KEV catalog making a positive difference to defenders
Forensic reports are NOT privileged — Ontario Divisional Court →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.