It has been reported that US travel agent Orbitz may have been hacked, potentially exposing the personal information of people that made purchases between Jan. 1, 2016 and Dec. 22, 2017.
The company said Tuesday about 880,000 payment cards were impacted.
Orbitz said data that was likely exposed includes name, payment card information, date of birth, phone number, email address, physical and/or billing address and gender. The company said evidence suggests an attacker may have accessed information stored on this consumer and business partner platform between Oct. 1, 2017 and Dec. 22, 2017. IT security experts commented below.
Mark James, Security Specialist at ESET:
Always be certain before you hand over any private info at all these days, regardless of the fact that the enquiring company may seem legit. If you have not personally initiated the request, then don’t be worried about verifying who they say they are- no legitimate company should penalise you for making sure. Data breaches are becoming a very common occurrence these days- with so much of our data available on the internet, we need to be extra careful about giving over more than we have too.”
Paul Bischoff, Privacy Advocate at Comparitech.com:
“The hack on Orbitz is quite severe, compromising an estimated 880,000 payment cards over a roughly 2-year period. Other personal information breached includes names, addresses, emails, birth dates, phone number, and gender. Passwords are notably absent from the list, so it would seem at this time that a password change will not be required for Orbitz customers. Furthermore, the company emphasizes its website—now owned by Expedia—was not hacked.
Little more information is currently available. Orbitz mentions it believes the hacker got into the “Orbitz consumer and business partner platform”. It’s not entirely clear to me what the company is referring to, but by the sounds of it third parties are able to access Orbitz customer information, which for some reason includes payment card details. Orbitz hasn’t provided any additional details about how the breach occurred, but I suspect one of the partners on this platform was compromised.
At this time, people who have used Orbitz in the past should keep an eye on the story and strongly consider cancelling their credit and debit cards. It would also be wise for customers to place a 90-day fraud alert on their credit report, and take advantage of the free year of credit monitoring that Orbitz is offering those affected.”
Dr. Jamie Graves, CEO & Founder at ZoneFox:
This attack, which targeted a legacy system that was an active part of the Orbitz IT suite prior to Expedia’s acquisition in 2015, highlights the danger of third-party security. The platform has now resulted in a major headache for both companies.
It’s good that Orbitz is now working alongside forensic investigators to identify the weakness exploited, but would perhaps have been better served by identifying such vulnerabilities in 2015, rather than in retrospect. Security rules, technical defences and best practice is important to apply across third-party acquisitions in just the same way as the core business, with a full audit of legacy/unused systems undertaken at the same time. Verizon’s auditing of Yahoo! certainly raised some points last year.
When a company such as Expedia acquires another, they get everything, the whole package including legacy systems no longer in use. For attackers, such systems can be seen as an ideal backdoor into the network; rather than knocking on Orbitz’ front door and dealing with the security in place, the unlocked entry through a legacy system is far easier to target.”
Mike Schuricht, VP Product Management at Bitglass:
Willy Leichter, VP of Marketing at Virsec:
“What’s more unsettling is the idea that sensitive data for close to a million customers was available in a “legacy website.” That makes it sound like it’s OK to neglect security on older systems while you focus on your latest, coolest apps. If it’s a public-facing website with real data, it’s not legacy – it’s live, and a real liability.”
Carl Wright, Chief Revenue Officer at AttackIQ:
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.