Marriott Data Breach: How 500 Million People Might Be Affected

  • By David Lukic
  • Oct 16, 2020

Marriott Hotels were the target of a four-year-long data breach that ultimately affected 500 million guests.The Marriott data breach gave the hackers entry to the Marriott reservation system, thus infiltrating all Marri ott’s Starwood subsidiaries. On the heels of the Yahoo data breach, the Marriott cyber attack is another large-scale loss. Along with personal details stolen, hackers grabbed credit card numbers, phone numbers, passport numbers, dates of birth, and arrival and departure dates. This data breach is particularly sensitive because of the added component of travel records stolen indicating who traveled where, when, and with whom. 

When Was the Marriott Data Breach?

Marriott Data Breach

The Marriott hotel breach occurred sometime during 2014 and continued until 2018 when it was discovered and reported around September 8, 2018. Cybersecurity experts reviewed the hotel chain’s security protocols and found them lacking, thus why perpetrators were able to continue accessing data for four years. High ranking officials fear that this Marriot hack was instituted by a foreign nation looking to monitor travel plans for diplomats and other government officials. No official statement has been made and no arrests to date, but there are hints that China was involved. 

Marriott hotel Data Breach: Am I Affected? 

If you were one of the 500 million guests affected, you should have received a letter from Marriott explaining what to do. You can also contact Marriott directly for additional information. Unfortunately, there is no online method of checking to see if your data was affected by this breach. There are a few class-action lawsuits in the works, but it is doubtful that there will be any type of cash payout for victims. 

What You Should Do After The Marriott Data Breach

If your data was among the 500 million customers affected by the Marriott International data breach, you would want to make some changes quickly.

  • First, change all your online login passwords and use complex combinations of letters, numbers, and symbols.

  • Monitor your banking and credit card information scouring for any suspicious activity.

  • Be on the lookout for phishing emails. Whenever a data breach occurs, one of the ways cybercriminals dig in deeper is to use scam emails to get users to click a link or download a file that infects their computer with a virus or malware.

  • Never click any links in email or download attachments unless you know the sender.

  • If you incurred losses, contact Marriott for additional compensation. 

Marriott Hotel Data Breach Insurance: They are Paying For Passport Fees?

If you can prove identity theft or fraudulent activity as a direct result of the loss of your passport number due to the Marriott Starwood data breach, they are willing to reimburse you for the fee to have a new passport created. You must contact them directly to obtain details. The Starwood Corporation, which purchased Marriott Hotels, has this website to help with any questions and details of the breach: https://info.starwoodhotels.com/

Marriott International hack

Can My Personal Information From Marriott Hack be Used for Identity Theft?

Unfortunately, the vast treasure trove of information stolen by cybercriminals during the Marriott breach is more than enough for identity theft. Personal details like dates of birth, passport numbers, and other sensitive information most likely made its way to the dark web and were sold for the purpose of identity theft, hacking, or perpetrating ransomware. 

Steps to Protect Yourself against Identity Theft

It’s much easier to protect yourself against identity theft than clean it up later. There are a few precautions you can take now and ongoing routines to help keep you safe.

  • Sign up for credit monitoring service. IDStrong.com is an excellent choice for this service) and check for any suspicious activity.

  • Update your antivirus software and run deep scans often.

  • Consider a credit freeze where your identity cannot be used to open new accounts without your authorization. 

Finding and resolving identity theft issues is easier if you stay on top of all your accounts regularly.

About the Author
IDStrong Logo

Related Articles

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach: 2013, 2015, 2021 and 2023 Hacks

T-Mobile has experienced a number of data breaches in the past decade. The first case occurred som ... Read More

Anthem Data Breach Exposed 78 Million Records

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that mu ... Read More

The NSA Hack, How Did it Happen?

The National Security Agency (NSA) was the main attraction in a major data breach involving three ... Read More

Latest Articles

What is an Incident Response?

What is an Incident Response?

What is an Incident Response? After a bank heist, the work begins with specialized teams and plans engaged, allowing for analysis of the event, and from this analysis, the bank can prepare a response to the incident.

What is a Social Engineering Attack? Techniques and Ways to Prevent

What is a Social Engineering Attack? Techniques and Ways to Prevent

Everyone has received a spam text or email at some point. Their hallmarks are widely known; they often include poor or strange grammar, suspicious links, suggested connections with companies or people, or random individuals asking for help in some capacity.

Side Channel Attack: Everything You Need To Know

Side Channel Attack: Everything You Need To Know

Every year, millions of people get victimized by data breaches. Criminals steal their data from the network environments of organizations, vendors, providers, institutions, and governments; with ever-increasing frequency, cybercriminals are making big moves in the cyber wars—and making billions of dollars. 

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close