September 08, 2023 – Trustwave, a leading cybersecurity and managed security services provider, has released comprehensive research shedding light on the distinctive cybersecurity risks encountered by the hospitality sector. The report, “2023 Hospitality Sector Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies,” explores the specific threats and risks that hospitality organisations face, along with practical insights and mitigations to strengthen their defences.
In its new research, Trustwave SpiderLabs has documented the attack flow utilised by threat groups, exposing their tactics, techniques, and procedures. From brute forcing to exploiting known vulnerabilities to attacking exposed open ports, these persistent threats pose significant risks to the hospitality industry.
Spanning from hotels to restaurants to cruise ships, the hospitality sector has become deeply woven into the everyday routines of millions of people, making its cybersecurity threat landscape especially vast, complex, and critical. Nearly 31 per cent of hospitality organisations have reported a data breach in their company’s history, of which 89 per cent have been affected more than once in a year, according to a report by Cornell University and FreedomPay. While the average cost of a hospitality breach (US$3.4 million) is lower than the cross-industry average (US$4.4 million), the impact on reputation can cause significant harm to the bottom line due to the highly competitive nature of the industry.
Kory Daniels, chief information security officer, Trustwave, said, “With unique considerations, such as the adoption of contactless technology and the steady turnover of customers and employees, the hospitality industry faces a complex security landscape with distinct challenges. In an industry where guest satisfaction and reputation are paramount, staying secure while offering cutting-edge technology is a delicate balancing act. Our latest threat briefing is a valuable resource for security leaders within the hospitality sector, providing a comprehensive view of the threats observed by our SpiderLabs team, along with specific mitigation strategies to bolster defences.”
The Trustwave SpiderLabs report analyses threat groups and their methods throughout the attack cycle, from initial foothold through to exfiltration. A few key findings from the report include:
- MOVEit RCE (CVE-2023-34362) vulnerability is one of the top exploits threat actors use to target hospitality clients. Analysis of 150+ victims within the hospitality sector shows a significant surge in Clop ransomware attacks due to this MOVEit zero-day vulnerability.
- HTML attachments make up 50 per cent of the file types being used for email-borne malware attachments. HTML file attachments are being used in phishing as a redirector to facilitate credential theft and for delivering malware through HTML smuggling.
- Obtaining credential access, primarily by using brute force attacks, was behind 26 per cent of all reported incidents. This tactic has threat actors leveraging valid accounts to compromise systems by simply logging in using weak passwords that are vulnerable to password guessing.
Trustwave SpiderLabs’ research serves as a resource for hospitality organisations to understand and combat the multitude of attack groups, malware variants, and techniques deployed against them. The report explores:
Emerging and prominent trends in the hospitality industry
- Artificial intelligence (AI) and generative AI: Generative AI is a powerful tool that is being increasingly used by the hospitality sector to improve the guest experience with services like chatbots or language translation, opening the industry up to unique implications and risks.
- Contactless technology: Newer features like contactless table payments and smartphone-card reader integrations offer a seamless experience to businesses and customers alike but also introduce new vectors of attack.
- Third-party risk and exposure: An increasing reliance on third-party vendors for services, such as heating, ventilation, and air conditioning (HVAC); vending machines; and point-of-sale (PoS) systems, creates additional risk as more vendors have access to sensitive data or systems.
Cybersecurity challenges unique to the hospitality industry
- Seasonal and less sophisticated workforce: The hospitality sector employs a diverse workforce, with seasonal and less sophisticated staff often engaged during peak periods to meet demand. This presents a distinct risk of insider threat, intentional or not, due to the challenge of providing consistent security training to a continually changing group of employees.
- Constant user turnover: Hospitality establishments encounter a fresh set of users virtually every day. This ongoing cycle demands consistent uptime, addresses bandwidth constraints, and strives to minimise potential exposure to security threats.
- Dirty networks: Given the substantial volume of network users, whether they’re hotel guests or individuals connecting to coffee shop Wi-Fi, organisations within hospitality must operate under the assumption their networks are highly susceptible to attacks due to the sheer number of users. This leads to hesitancies to deploy patches and configuration changes that might have an adverse impact on day-to-day operations.
- Physical security concerns: Unlike conventional office buildings where employee access is typically controlled through access cards, hospitality establishments face cybersecurity risks due to the accessibility of hardware by guests. For instance, the server closet in a hotel could be left unlocked and easily accessible or a thumb drive could easily be inserted into a nearby device.
- Franchise model: The franchise framework leads to disparities in policy consistency and implementation across the industry, including cybersecurity measures. Different franchisers and franchisees adopt varied business models, resulting in divergent cybersecurity practices.
Prevalent threat actors and threat tactics operating across hospitality
- Vice Society
- Qillin, Royal
- email-borne malware (Emotet, Qakbot)
- phishing (IPFS, image based, brand impersonation)
- scams (fake order scams, extortion scams)
- business email compromise (BEC) (e.g., payroll diversion)
- credential access (brute forcing, auctioned accounts)
- vulnerability exploitation.
To access the full Trustwave SpiderLabs threat report, “2023 Hospitality Sector Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies,” please click here.
As a recognised global cyber defender that stops cyber threats all day, every day – we enable our clients to conduct their business securely.
Trustwave detects threats that others can’t see, enabling us to respond quickly and protect our clients from the devastating impact of cyberattacks. We leverage our world-class team of security consultants, threat hunters and researchers, and our market-leading security operations platform to relentlessly identify and isolate threats with the right telemetry at the right time for the right response.
Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security. Our elite Trustwave SpiderLabs team provides award-winning threat research and intelligence, which is infused into Trustwave services and products to fortify cyber resilience in the age of advanced threats.
For more information about Trustwave, please visit our website.