DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Noble House Hotels and Resorts notifies customers at six luxury hotels of payment card breach

Posted on November 15, 2015 by Dissent

Luxury hotel chain Nobel House Hotels and Resorts is notifying customers of a breach they uncovered in the wake of reports by customers of fraudulent charges on payment cards.

In a letter sent to those potentially affected, Patrick R. Colee, Chairman of Noble House Hotels & Resorts, writes, in part:

Through our investigation, Noble House learned that malware may have been installed on payment processing systems that potentially affected cards swiped at the following properties:

  • The Portofino Hotel and Marina, Redondo Beach, CA, from April 3, 2015 to August 11, 2015;
  • The Edgewater, Seattle, WA, from December 29, 2014 to August 11, 2015;
  • Little Palm Island Resort and Spa, Florida Keys, FL, from December 29, 2014 to May 22, 2015;
  • Mountain Lodge Telluride, Telluride, CO, from December 29, 2014 to May 27, 2015;
  • Ocean Key Resort and Spa, Key West, FL, from December 29, 2014 to August 6, 2015
  • River Terrace Inn, Napa, CA, from December 29, 2014 to August 11, 2015.

The information potentially compromised by the malware involves data found in the magnetic stripe on payment cards, which includes the cardholder name, card number, expiration date, and CVV number.

It’s not clear from their notification whether there was (just) one malware incident that began in December, 2014, or if there was also a second incident in April, 2015.  The metadata submitted with the copy of the notification indicates that they discovered the breach on October 15, 2015.

In response to the discovery, Noble House notified the FBI and also encouraged customers to remain vigilant and report any suspicious charges to their financial institutions. They also offered to reimburse any unreimbursed charges:

If you incurred costs that your financial institution declined to reimburse related to fraudulent charges on a payment card you used at one of the above properties, please contact us at the number below. We will reimburse you for any such reasonable, documented costs that your financial institution declined to pay.
Although Noble House reports only a few known/reported cases of card fraud as of the time of their notification, that number may rise one people realize that it may be the source of any fraudulent charges they may have experienced.
A copy of the notification has also been posted to Nobel House’s web site, linked from their home page.

Related:

  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Authorities released free decryptor for Phobos and 8base ransomware
  • Missouri Adopts New Data Breach Notice Law
  • Qantas obtains injunction to prevent hacked data’s release
Category: Business SectorMalwareU.S.

Post navigation

← In: Class 12 student finds Gauhati University website highly insecure, says can be hacked through phone
Fashion to Figure notifying customers of payment card compromise →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.