WASHINGTON - Hackers behind a massive breach at the Marriott International hotel group left clues suggesting they were working for a Chinese government intelligence gathering operation, according to sources familiar with the matter.
Marriott said last week that a hack that began four years ago had exposed the records of up to 500 million customers in its Starwood hotels reservation system.
Private investigators looking into the breach have found hacking tools, techniques and procedures previously used in attacks attributed to Chinese hackers, said three sources who were not authorized to discuss the company’s private probe into the attack.
That suggests that Chinese hackers may have been behind a campaign designed to collect information for use in Beijing’s espionage efforts and not for financial gain, two of the sources said.
While China has emerged as the lead suspect in the case, the sources cautioned it was possible somebody else was behind the hack because other parties had access to the same hacking tools, some of which have previously been posted online.
Identifying the culprit is further complicated by the fact that investigators suspect multiple hacking groups may have simultaneously been inside Starwood’s computer networks since 2014, said one of the sources.
The Chinese Embassy in Washington did not return requests for comment.
If investigators confirm that China was behind the attack, that could complicate already tense relations between Washington and Beijing, amid an ongoing tariff dispute and U.S. accusations of Chinese espionage and the theft of trade secrets.
Marriott spokeswoman Connie Kim declined to comment, saying “We’ve got nothing to share,” when asked about involvement of Chinese hackers. Marriott disclosed the hack on Nov. 30, prompting U.S. and U.K. regulators to quickly launch probes into the case.
The compromised customer data included names, passport numbers, addresses, phone numbers, birth dates and email addresses. A small percentage of accounts included scrambled payment card data, said Kim.
The company could face $200 million in fines and litigation expenses, and could spend about $1 per customer notifying victims and providing free data monitoring services, according to a note last week from Morgan Stanley.
The company’s legal liability could be even higher, according to Bloomberg Intelligence analysts Tamlin Bason and Holly Froum, who estimated costs as high as $1 billion, including a potential fine of about $450 million — 2 percent of the company’s 2017 revenue — under Europe’s General Data Protection Regulation.
Marriott is still investigating the extent of the breach and is in the process of notifying customers, according to a spokeswoman. The company said it will pay for a web-monitoring service, and will also cover the cost of replacing passports.
Hospitality was the third-most-targeted industry according to a report this year from Trustwave Holdings, an information security firm. It is common for thieves to target credit card readers in point-of-sale attacks, and campaigns are designed to trick front desk clerks into downloading malicious software.
Hilton Worldwide Holdings Inc., Hyatt Hotels Corp. and InterContinental Hotels Group have all been targeted in past attacks, though the Marriott breach dwarfs those hacks in terms of number of guests affected.
Marriott acquired Starwood in 2016 for $13.6 billion, including the Sheraton, Westin, W Hotels, St. Regis, Aloft, Le Meridien, Tribute, Four Points and Luxury Collection hotel brands, forming the world’s largest hotel operator.
The hack began in 2014, shortly after an attack on the U.S. government’s Office of Personnel Management compromised sensitive data on tens of millions of employees, including application forms for security clearances.
White House national security adviser John Bolton recently told reporters he believed Beijing was behind the OPM hack, a claim first made by the United States in 2015.
Beijing has strongly denied those charges and also denied charges it was behind other hacks.
Former senior FBI official Robert Anderson said the Marriott case looked similar to hacks that the Chinese government was conducting in 2014 as part of its intelligence operations.
“Think of the depth of knowledge they could now have about travel habits or who happened to be in a certain city at the same time as another person,” said Anderson, who served as FBI executive assistant director until 2015.
“It fits with how the Chinese intelligence services think about things. It’s all very long-range,” said Anderson, who was not involved in investigating the Marriott case and is now a principal with Chertoff Group.
Michael Sussmann, a former senior Department of Justice official for its computer crimes section, said that the long duration of the campaign was an indicator that the hackers were seeking data for intelligence and not information to use in cybercrime schemes.
“One clue pointing to a government attacker is the amount of time the intruders were working quietly inside the network,” he said. “Patience is a virtue for spies, but not for criminals trying to steal credit card numbers.”
FBI representatives could not immediately be reached for comment on the evidence linking the attack to China. A spokesperson said on Friday that the agency was looking into the attack, but declined to elaborate.