Romantik Seehotel Jägerwirt, a luxury lakeside hotel in the Austrian Alps, experienced a ransomware attack last week that was said to have left hotel guests locked in their bedrooms until the ransom was paid.

According to hotel owner Christoph Brandstaetter, “This is totally wrong. It was just a normal cyber-attack and no guests were locked in.” This ‘normal’ cyber-attack is the third the hotel has experienced within the last year, costing the hotel thousands of dollars to bring business back to normal.

Ransomware is a type of cyber-attack where data on an individual’s computer is encrypted and locked until a ransom is paid to the attacker, usually in Bitcoin.

Brandstaetter claims the ransomware attack locked the hotel out of all its computers until the $1,600 fee was paid to the hackers. Hotel owners were able to get in and out of the rooms of the 180 guests at the hotel by using their internal system, which wasn’t networked with the infected computers.

The main problem was that management was not able to issue new key cards to guests who arrived during the 24 hours the hotel’s reservation system was down. The hotel ultimately paid the ransom request.

While the hotel’s systems were up and running after the ransom was paid, Brandstaetter suspected the attacks had left a backdoor into the system and would attempt yet another ransomware attack. However, “nobody, not even the police, found the back door.” Brandstaetter went on further to say that the hotel is planning to change the key system altogether by going back to old, normal keys.

This attack on the Romantik Seehotel is by no means out of the ordinary. Kaspersky Labs recently found that 2016 was a threefold increase in ransomware attacks, with someone falling victim to attack once every 40 seconds. As the threat of a ransomware attack becomes more common each day, organizations need not wait around, and instead, implement solutions that can detect the presence of malware and ensure Device Hardening measures are in place.

 

 

Read this article on Motherboard

 

 

 

 

NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
1175 Peachtree St NE
Atlanta, Georgia, 30361.
Portland
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.