Hotels face increasing risk from cyber pirates

1 April 2017 Entertainment and Hospitality (Industry), Information Security

South African businesses are becoming increasingly vulnerable to the 400% growth in global ransomware extortion attacks. According to audit, tax and business advisory firm Grant Thornton, businesses need to act now to ensure that their digital systems are protected and that critical systems are taken offline.

Simple ransomware attacks are relatively straight forward – victims receive an email with a link that contains software that encrypts files on their computer. These victims are then held to hostage until they pay a ransom.

Recently an upmarket hotel in Austria had its electronic key system compromised by hackers who locked management out of its own computer system. Guests were unable to access or leave their hotel rooms and this led to the hotel being forced to pay a ransom of two Bitcoins – an electronic currency that is difficult to trace – equivalent to about $1 800 (R20 000) to gain access to their system.

Martin Jansen van Vuuren, director: Advisory Services at Grant Thornton says that the Austrian attack indicates just how easily hotels’ systems can be infiltrated from cyberspace.

Jansen van Vuuren says: “Hotels are doubly vulnerable because ransomware attacks may not only impede their systems, but they also could seriously impact on their guests by preventing them from using the hotel’s facilities. Part of hotel management’s risk mitigation should be to work out exactly how these malicious cyberspace attacks can affect their operations and even their customers.

“The security of convenient computer-driven systems is vital because everything from air-conditioning and room management, to sprinkler systems suddenly become vulnerable to external attacks. There is a need to give particular consideration to these risks as we become more reliant on technology in the guest experience.”

Jansen van Vuuren says mobile phones, used as keys in many hotels these days, are also vulnerable as they often do not have the same level of security as a desktop system. Hackers could steal ‘door keys’ via cyberspace or simply disable keys, causing huge inconvenience. Open Wi-Fi systems, that are by their nature made easy to access for hotel guests, are another potential source for hackers if they are linked to systems which can be used to gain entry to devices and then to lock out users or steal data.

“The biggest weakness for hotels is their public interfaces such as booking systems that need to connect the internal systems and users to third-party applications and ultimately customers. The booking system is therefore particularly vulnerable to ransomware attacks and hackers,” said Jansen van Vuuren.

“Many hotels do not have on-site IT support and rely on the hotel chain’s head office or an external service provider to attend to IT issues. This centralised approach places individual properties at additional risk of attack, as a cyber attack may not be picked up quickly enough, leading to a delay in combating the attack.”

Ransomware attacks quadrupled in 2016

Grant Thornton’s director of IT Advisory Services, Michiel Jonker, says that while the hotel industry is in the public eye, following the most recent high profile attack, it has to be borne in mind that every industry is at risk.

According to data from the United States Justice Department, ransomware attacks quadrupled in 2016 to an average of 4000 a day. The FBI said the costs to victims of such attacks rose to $209-million (R2,7bn) in the first three months of 2016, compared with $24-million (R312m) for the whole of 2015.

“Ransomware syndicates are extremely sophisticated, even hosting their own ‘call centres’ which assist you to access your decryption key and undertake not to attack you with the same ransom. They even use algorithms to determine your particular industry, and the ransom price is based on your industry’s perceived wealth,” says Jonker. “You can’t really prevent these attacks; you can only reduce your attack vulnerability to some extent. Preventive controls are not enough. Organisations will have to rely on corrective controls, most notably backups and disaster recovery plans.”

He says corporate executives have to start seriously considering how their companies will respond to malicious attacks and whether their systems – both critical and simple – are designed to minimise risk to the impact of hackers and ransomware.

Grant Thornton’s IT Advisory team advises clients to take, among many other things, the following steps in order to minimise the risk to some extent:

• Remove administrative rights for laptop users to prevent users from inadvertently downloading malicious software;

• Ensure that all systems undergo well-structured backup processes and that they are recoverable;

• Segregate networks so that different network segments are limited to different groups of authorised users;

• Provide database access only to those people who require access;

• Install antivirus software on all devices including laptops, smartphones and other wearable technologies; and finally

• Use low-code programming platforms to develop apps, as we do, where security has already been incorporated into the platform.

Jonker says that while prevention is better than dealing with the effects of a cyber-attack, it is best practice to isolate certain high risk and critical (especially national) infrastructure networks and systems, so that they are off the grid and entirely inaccessible from cyberspace. They only ever link intermittently via a small ‘sterile’ middle system, with neither linked system connected at the same time – a bit like an airlock in a submarine. So an hotel’s external public reservation system might interface hourly via such a sanitised link only.

“At the end of the day you balance security with the need for convenience, availability, functionality and innovation,” says Jonker. “To produce leapfrog new technology most developers are focused on building systems that work, not systems that are secure. We need to change mindsets so that we don’t focus exclusively on functionality, but ensure that we build systems that enhance security and privacy in equal measure.

“We believe that technology advances can be hugely beneficial for hotels in creating great guest experiences, but the systems must always be developed with security considerations fully understood and mitigated,” Jonker concludes.

For more information contact Grant Thornton, +27(0)10 590 7240, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...
ISPA’s take-down process protects from local scams
News & Events Information Security
During the recent school holidays, parents could rest a little easier knowing that ISPA, SA’s official internet industry representative body, is removing an average of three to four problematic websites from the local internet every week.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.