Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Wednesday August 26 2015, @03:25PM   Printer-friendly
from the we're-shutting-down dept.

Between 2008 and 2009, hotel chain Wyndham Worldwide – which runs hotels under the Days Inn, Howard Johnson, Ramada, Super 8, and Travelodge brands – suffered three computer intrusions. The hackers stole the personal information and credit card numbers of over 619,000 customers, causing at least $10.6m in thefts.

In June 2012, the FTC (Federal Trade Commission) filed suit against Wyndham, claiming that the firm had "unreasonably and unnecessarily" exposed their customers to risk. Wyndham has fought back in the case, claiming unreasonable government oversight.

[...] The suit cites the fact that the company was storing credit card numbers on its servers in plain text, had easily guessable administrator passwords, little or no firewalls, and didn't check what operating systems its subsidiaries were using. In one case, a hotel was using an outdated operating system that hadn't been patched for three years.

The agency also claims that the Wyndham network left ports open and unchecked for third-party suppliers to use, didn't inform its hotel network about the attacks, and didn't follow up on them – allowing the hackers to use the same mechanism to gain access to corporate servers in subsequent attacks.

[...] In April 2008, attackers thought to be from Russia attacked a hotel in Phoenix and brute-forced their way into an administrator's account. In March 2009, they did it again, and Wyndham only became aware of the attacks after customers complained. Even then, attackers managed another breach later that year.

"Today's Third Circuit Court of Appeals decision reaffirms the FTC's authority to hold companies accountable for failing to safeguard consumer data," said FTC Chairwoman Edith Ramirez in a statement.

"It is not only appropriate, but critical, that the FTC has the ability to take action on behalf of consumers when companies fail to take reasonable steps to secure sensitive consumer information."

The ruling [PDF].


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by Bill Dimm on Wednesday August 26 2015, @08:05PM

    by Bill Dimm (940) on Wednesday August 26 2015, @08:05PM (#228244)

    The FTC should target the ad networks that are distributing malware. I'm somewhat surprised that there haven't been class action lawsuits against them, but I guess the potential damage awards aren't significant enough to entice any lawyers, so the FTC should step in and punish the ad networds for being so irresponsible.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Wednesday August 26 2015, @09:05PM

    by Anonymous Coward on Wednesday August 26 2015, @09:05PM (#228267)

    Why stop there? Sue OS vendors for having the exploits in the first place.

    • (Score: 0) by Anonymous Coward on Thursday August 27 2015, @04:24AM

      by Anonymous Coward on Thursday August 27 2015, @04:24AM (#228455)

      While you're at it, sue the NSA for buying exploits for use against US citizens instead of revealing them so they can be patched.