www.securityweek.com Open in urlscan Pro
2606:4700:20::6818:a103  Public Scan

URL: https://www.securityweek.com/information-of-european-hotel-chains-customers-found-on-unprotected-server/
Submission: On March 03 via api from TR — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://www.securityweek.com/

<form method="get" id="zox-search-form" action="https://www.securityweek.com/" data-hs-cf-bound="true">
  <input type="text" name="s" id="zox-search-input" value="Search" onfocus="if (!window.__cfRLUnblockHandlers) return false; if (this.value == &quot;Search&quot;) { this.value = &quot;&quot;; }"
    onblur="if (!window.__cfRLUnblockHandlers) return false; if (this.value == &quot;Search&quot;) { this.value = &quot;&quot;; }">
  <input type="submit" id="zox-search-submit" value="Search">
</form>

Name: ccoptinPOST https://visitor.constantcontact.com/d.jsp

<form class="sw-newsletter-cc" style="" method="post" target="_blank" action="https://visitor.constantcontact.com/d.jsp" name="ccoptin" data-hs-cf-bound="true">
  <input type="hidden" value="1102592012458" name="m">
  <input type="hidden" value="oi" name="p">
  <div class="form-item">
    <input type="text" class="form-text required" value="" placeholder="Business Email Address..." size="60" name="ea" maxlength="128">
    <input type="submit" class="submit" value="Subscribe" name="go">
  </div>
</form>

Name: ccoptinPOST https://visitor.constantcontact.com/d.jsp

<form class="sw-newsletter-cc" style="" method="post" target="_blank" action="https://visitor.constantcontact.com/d.jsp" name="ccoptin" data-hs-cf-bound="true">
  <input type="hidden" value="1102592012458" name="m">
  <input type="hidden" value="oi" name="p">
  <div class="form-item">
    <input type="text" class="form-text required" value="" placeholder="Business Email Address..." size="60" name="ea" maxlength="128">
    <input type="submit" class="submit" value="Subscribe" name="go">
  </div>
</form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

We won't track your information when you visit our site. But in order to comply
with your preferences, we'll have to use just one tiny cookie so that you're not
asked to make this choice again.

Accept Decline


SECURITYWEEK NETWORK:

 * Cybersecurity News
 * Webcasts
 * Virtual Events


SECURITY EXPERTS:

 * WRITE FOR US

 * Malware & Threats
   * Cyberwarfare
   * Cybercrime
   * Data Breaches
   * Fraud & Identity Theft
   * Nation-State
   * Ransomware
   * Vulnerabilities
 * Security Operations
   * Threat Intelligence
   * Incident Response
   * Tracking & Law Enforcement
 * Security Architecture
   * Application Security
   * Cloud Security
   * Endpoint Security
   * Identity & Access
   * IoT Security
   * Mobile & Wireless
   * Network Security
 * Risk Management
   * Cyber Insurance
   * Data Protection
   * Privacy & Compliance
   * Supply Chain Security
 * CISO Strategy
   * Cyber Insurance
   * CISO Conversations
   * CISO Forum
 * ICS/OT
   * Industrial Cybersecurity
   * ICS Cybersecurity Conference
 * Funding/M&A
   * Cybersecurity Funding
   * M&A Tracker

 * Cybersecurity News
 * Webcasts
 * Virtual Events

 * WRITE FOR US

Connect with us
 * 
 * 
 * 

Hi, what are you looking for?





SECURITYWEEK

 * Malware & Threats
   * Cyberwarfare
   * Cybercrime
   * Data Breaches
   * Fraud & Identity Theft
   * Nation-State
   * Ransomware
   * Vulnerabilities
 * Security Operations
   * Threat Intelligence
   * Incident Response
   * Tracking & Law Enforcement
 * Security Architecture
   * Application Security
   * Cloud Security
   * Endpoint Security
   * Identity & Access
   * IoT Security
   * Mobile & Wireless
   * Network Security
 * Risk Management
   * Cyber Insurance
   * Data Protection
   * Privacy & Compliance
   * Supply Chain Security
 * CISO Strategy
   * Cyber Insurance
   * CISO Conversations
   * CISO Forum
 * ICS/OT
   * Industrial Cybersecurity
   * ICS Cybersecurity Conference
 * Funding/M&A
   * Cybersecurity Funding
   * M&A Tracker




DATA BREACHES


INFORMATION OF EUROPEAN HOTEL CHAIN’S CUSTOMERS FOUND ON UNPROTECTED SERVER

The personal information of many customers of European hotel chain Falkensteiner
was discovered by a researcher on an unprotected server.

By

Eduard Kovacs

March 2, 2023
   
   
 * 
   

 * Flipboard
   
   Reddit
   
   Pinterest
   
   Whatsapp
   
   Whatsapp
   
   Email

A researcher has discovered an unprotected server storing the personal
information of a significant number of customers of European hotel chain
Falkensteiner.

Austria-based Falkensteiner has hotels in Central and Eastern Europe, including
in Austria, Italy, Croatia, Slovakia, Serbia and the Czech Republic.

The exposed Falkensteiner data was discovered by Anurag Sen, a researcher at
cloud security firm CloudDefense.AI. Sen recently also discovered a US
government server that was leaking internal US military emails. 

An analysis conducted by Sen showed that the exposed Falkensteiner customer data
was associated with Gustaffo, a company offering IT solutions for the
hospitality industry. 

The researcher says he notified both Gustaffo and Falkensteiner, but none of
them responded. However, Sen noticed that the server was secured shortly after
he informed the companies.

Sen told SecurityWeek that the vulnerable Elasticsearch server hosted more than
11 Gb of data before it was taken offline. He found more than 102,000 records in
the exposed database, including full names, phone numbers, email addresses, and
booking details. 

The researcher is unhappy with the way the issue has been handled by the
impacted companies — he says they haven’t responded to his emails and haven’t
notified customers about the data breach.

However, Gustaffo says they actually secured the server after learning about the
leak from a different researcher. The Austria-based company, which does have a
responsible disclosure program, told SecurityWeek that its assessment showed
that the incident was limited to one system and the details of only
approximately 13,000 individuals were exposed.

Gustaffo representatives explained that many of the records were likely
duplicates as it does not store the information of more than 13,000 customers in
the database. 

The company said it performed the necessary security updates to its system and
it’s in touch with government authorities handling the incident. 

Falkensteiner has not responded to SecurityWeek’s repeated requests for comment.

Related: R1Soft Server Backup Manager Vulnerability Exploited to Deploy Backdoor

Related: Credential Leakage Fueling Rise in API Breaches

Related: Uber Data Leaked Following Breach at Third-Party Vendor






Written By Eduard Kovacs

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He
worked as a high school IT teacher for two years before starting a career in
journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s
degree in industrial informatics and a master’s degree in computer techniques
applied in electrical engineering.




MORE FROM EDUARD KOVACS

 * Critical Vulnerabilities Allowed Booking.com Account Takeover
 * Information of European Hotel Chain’s Customers Found on Unprotected Server
 * New CISA Tool ‘Decider’ Maps Attacker Behavior to ATT&CK Framework
 * Dish Network Says Outage Caused by Ransomware Attack
 * Critical Vulnerabilities Patched in ThingWorx, Kepware IIoT Products
 * 33 New Adversaries Identified by CrowdStrike in 2022
 * Vulnerability in Popular Real Estate Theme Exploited to Hack WordPress
   Websites
 * US Electric Cooperative Association Launches Commercial OT Security Solution


LATEST NEWS

 * BlackLotus Bootkit Can Target Fully Patched Windows 11 Systems
 * Advancing Women in Cybersecurity – One CMO’s Journey
 * Webinar Today: Entering the Cloud Native Security Era
 * Critical Vulnerabilities Allowed Booking.com Account Takeover
 * Canadian Bookstore Chain Indigo Says Employee Data Stolen in Ransomware
   Attack
 * Information of European Hotel Chain’s Customers Found on Unprotected Server
 * White House Releases National Cybersecurity Strategy
 * Cisco Patches Critical Vulnerability in IP Phones


Click to comment



TRENDING


DISH NETWORK SAYS OUTAGE CAUSED BY RANSOMWARE ATTACK


LASTPASS SAYS DEVOPS ENGINEER HOME COMPUTER HACKED


SECURITY DEFECTS IN TPM 2.0 SPEC RAISE ALARM


US NATIONAL CYBER STRATEGY PUSHES REGULATION, AGGRESSIVE HACK-BACK OPERATIONS


VULNERABILITIES BEING EXPLOITED FASTER THAN EVER: ANALYSIS


WHITE HOUSE RELEASES NATIONAL CYBERSECURITY STRATEGY


RANSOMWARE ATTACK HITS US MARSHALS SERVICE


TOP 10 SECURITY, OPERATIONAL RISKS FROM OPEN SOURCE CODE




DAILY BRIEFING NEWSLETTER

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest
threats, trends, and technology, along with insightful columns from industry
experts.




WEBINAR: BUILDING SUSTAINABLE OT CYBERSECURITY PROGRAMS

Thursday, February 23, 2023

Join this webinar to gain clear advice on the people, process and technology
considerations that must be made at every stage of an OT security program’s
lifecycle.

Register


WEBINAR: ENTERING THE CLOUD NATIVE SECURITY ERA

Thursday, March 02, 2023

This presentation will provide an overview of the security risks associated with
SaaS, best practices for mitigating these risks and protecting data, and discuss
the importance of regularly reviewing and updating SaaS security practices to
ensure ongoing protection of data.

Register

EXPERT INSIGHTS


ADVANCING WOMEN IN CYBERSECURITY – ONE CMO’S JOURNEY

Anna Tutt, CMO of Oort, shares her experiences and perspectives on how we can
accelerate growth of women in cybersecurity. (Marc Solomon)


RANSOMWARE ATTACKS: DON’T LET YOUR GUARD DOWN

History has shown that when it comes to ransomware, organizations cannot let
their guards down. (Torsten George)


ENTERPRISE BLIND SPOTS AND OBSOLETE TOOLS – SECURITY TEAMS MUST EVOLVE

The conventional tools we rely on to defend corporate networks are creating gaps
in network visibility and in our capabilities to secure them. (Matt Wilson)


APPLICATION SECURITY PROTECTION FOR THE MASSES

While there are many routes to application security, bundles that allow security
teams to quickly and easily secure applications and affect security posture in a
self-service manner are becoming increasingly popular. (Joshua Goldfarb)


DEALING WITH THE CARCINIZATION OF SECURITY

Varied viewpoints as related security concepts take on similar traits create
substantial confusion among security teams trying to evaluate and purchase
security technologies. (Marc Solomon)


   
   
 * 
   

 * Flipboard
   
   Reddit
   
   Pinterest
   
   Whatsapp
   
   Whatsapp
   
   Email

RELATED CONTENT


CYBERCRIME


ZENDESK HACKED AFTER EMPLOYEES FALL FOR PHISHING ATTACK

Zendesk is informing customers about a data breach that started with an SMS
phishing campaign targeting the company’s employees.

Eduard KovacsJanuary 24, 2023


DATA BREACHES


GOTO SAYS HACKERS STOLE ENCRYPTED BACKUPS, MFA SETTINGS

GoTo said an unidentified threat actor stole encrypted backups and an encryption
key for a portion of that data during a 2022 breach.

Ryan NaraineJanuary 24, 2023


DATA BREACHES


ATLASSIAN INVESTIGATING SECURITY BREACH AFTER HACKERS LEAK DATA

A group of hackers has leaked Atlassian employee records and floorplans,
information that was obtained from third-party workplace platform Envoy.

Eduard KovacsFebruary 17, 2023


CYBERCRIME


20 MILLION USERS IMPACTED BY DATA BREACH AT INSTANT CHECKMATE, TRUTHFINDER

Instant Checkmate and TruthFinder have disclosed data breaches affecting a total
of more than 20 million users.

Ionut ArghireFebruary 6, 2023


DATA BREACHES


COMPANIES IMPACTED BY RECENT MAILCHIMP BREACH START NOTIFYING CUSTOMERS

Companies affected by the recent Mailchimp data breach have started notifying
customers. The list includes WooCommerce, FanDuel, Yuga Labs and the Solana
Foundation.

Eduard KovacsJanuary 23, 2023


DATA BREACHES


GOOGLE FI DATA BREACH REPORTEDLY LED TO SIM SWAPPING

Google Fi informs customers about a data breach related to the recent T-Mobile
cyberattack and some users claim they were targeted in a SIM...

Eduard KovacsFebruary 1, 2023


DATA BREACHES


LASTPASS SAYS DEVOPS ENGINEER HOME COMPUTER HACKED

LastPass DevOp engineer's home computer hacked and implanted with keylogging
malware as part of a sustained cyberattack that exfiltrated corporate data from
the cloud...

Ryan Naraine3 days ago


DATA BREACHES


820K IMPACTED BY DATA BREACH AT ZACKS INVESTMENT RESEARCH

Zacks Investment Research is informing 820,000 individuals that their personal
data was compromised in a data breach.

Ionut ArghireJanuary 26, 2023
 * 
 * 
 * 


POPULAR TOPICS

 * Cybersecurity News
 * Industrial Cybersecurity


SECURITY COMMUNITY

 * Virtual Cybersecurity Events
 * Webcast Library
 * CISO Forum
 * ICS Cybersecurity Conference
 * Cybersecurity Newsletters


STAY INTOUCH

 * Cyber Weapon Discussion Group
 * RSS Feed
 * Security Intelligence Group


ABOUT SECURITYWEEK

 * Advertising
 * Event Sponsorships
 * Writing Opportunities
 * Feedback/Contact Us


NEWS TIPS

Got a confidential news tip? We want to hear from you.

Submit Tip


ADVERTISING

Reach a large audience of enterprise cybersecurity professionals

Contact Us


DAILY BRIEFING NEWSLETTER

Subscribe to the SecurityWeek Daily Briefing and get the latest content
delivered to your inbox.


 * Privacy Policy

Copyright © 2023 Wired Business Media. All Rights Reserved.