Orbitz, a subsidiary of the online travel agency, Expedia Inc, announced today that hackers have stolen personal information from around 880,000 payment cards.
Orbitz revealed that attackers broke into a “legacy Orbitz travel booking platform” and accessed users’ names, birthdates, phone numbers, email addresses, physical and/or billing addresses, and genders. The intrusion was initially discovered on March 1 while investigating the consumer and business partner platform in question.
The investigation determined attackers had access to details between Oct. 1 and Dec. 22, 2017. The company claims the attackers may have stolen information stored on the systems that were submitted by Orbitz customers between Jan. 1, 2016 and June 22, 2016, and information submitted by “certain partners’ customers’” between Jan 1, 2016, and Dec. 22, 2017.
Upon discovering the incident, the company took swift action to eliminate and prevent unauthorized access to the platform. The company added, “To date, we do not have direct evidence that this personal information was actually taken from the platform and there has been no evidence of access to other types of personal information, including passport and travel itinerary information.”
This breach is the latest in the travel and hospitality industry and follows similar poor security practices like InterContinental Hotels Group and Hyatt Hotels which both suffered from data breaches last year. NNT suggests first and foremost abiding by PCI DSS Compliance requirements. While PCI DSS compliance does not guarantee security, complying with the 12 PCI requirements significantly reduces your risk of exposing customer data or payment information to attackers.
NNT makes achieving, proving and remaining compliant simple. Interested in learning just how NNT can help you achieve PCI DSS V3.2 compliance? See below for more detail on each requirement and how NNT can help
Requirement 1 & 2: Build and Maintain a Secure Network & Systems
PCI DSS 3.2
Requirement
NNT Solution
Requirement 1: 1.1, 1.2, 1.3
Install and maintain a firewall configuration to protect cardholder data
Use NNT Change Tracker to apply a configuration baseline – NNT provide CIS Benchmark Checklists to ensure the most secure and effective configuration settings are used for firewalls.
Apply File Integrity Monitoring to firewall rules and other security configuration settings for tight change management, plus collect logs from firewalls to detect security incidents in advance of any breach
Requirement 2: 2.1, 2.2, 2.3
Do not use vendor-supplied defaults for system passwords and other security parameters
Prebuilt device hardening templates derived from CIS Benchmarks are used to audit for any vulnerabilities present: database systems, servers, and network devices are then continuously monitored for any drift from the desired, hardened state
Note: CIS Benchmarks are the primary recommended source of hardening checklists and NNT Change Tracker is one of only a select few CIS Certified Vendors see http://www.newnettechnologies.com/cis-benchmark.html
File Integrity Monitoring technology ensures access to Cryptographic Keys is restricted, and any attempted unauthorized access is logged and alerted, including changes of accounts, privileges, and permissions
Requirement 4: 4.1
Encrypt transmission of cardholder data across open, public networks
Use Device Vulnerability Reports to pre-audit for the use of non-encrypted console access methods being enabled, thereafter monitor for any configuration change affecting the devices' hardened state
Requirement 5 & 6: Maintain a Vulnerability Management Program
PCI DSS 3.2
Requirement
NNT Solution
Requirement 5: 5.2
Use and regularly update anti-virus software or programs
NNT Change Tracker will check that AV services are activated and running, Log Tracker will alert on all significant AV events
Requirement 6: 6.1, 6.4
Develop and maintain secure systems and applications
Change Tracker will maintain host and application security settings, even for bespoke applications, and record all software and patch updates. Log Tracker will provide a complete audit trail of application and host access attempts.
Track and monitor all access to network resources and cardholder data
Audit trails are constructed automatically using predefined Log Tracker templates for PCI DSS V3.1, including default alerts for security threats
Requirement 11: 11.1, 11.4, 11.5
Regularly test security systems and processes
File Integrity Monitoring across all platforms and devices is an essential defense against malware and any 'inside man' threat to card and customer data - built-in templates for PCI DSS V3.1 are provided and can be customised, leveraging CIS Benchmark checklists to highlight system vulnerabilities. NNT Change Tracker shows 'who made the change' with continuous and real-time detection of any changes
The Most Powerful & Reliable Cybersecurity Products
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.
Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds