CHINESE GOV'T MAY HAVE LEFT "FINGERPRINTS" THEY WERE BEHIND MASSIVE MARRIOTT HACK

SOURCE: ZEROHEDGE

The Chinese government is apparently sophisticated enough to hack into Marriott's reservation system, yet - just like the Russian "hack" of the DNC - reportedly left behind evidence of "hacking tools, techniques and procedures" pointing to Beijing as the culprit, according to Reutersciting three anonymous sources with knowledge of a private internal investigation.

The hack which began four years ago exposed the records of up to 500 million customers in the Starwood hotels reservation system - now owned by Marriott, and "suggests that Chinese hackers may have been behind a campaign designed to collect information for use in Beijing’s espionage efforts and not for financial gain."

Along with the news that Huawei's CFO was arrested at the behest of the US, the timing of this announcement certainly puts a damper on whatever headway Trump and his administration have been making on trade with Beijing. In fact, as Reuters conveniently points out:

If investigators confirm that China was behind the attack, that could complicate already tense relations between Washington and Beijing, amid an ongoing tariff dispute and U.S. accusations of Chinese espionage and the theft of trade secrets. -Reuters

Wait, it could have been anybody?

Reuters notes in the fourth paragraph that while China is the prime suspect in the case, "the sources cautioned it was possible somebody else was behind the hack" since "other parties had access to the same hacking tools, some of which have previously been posted online."

Further complicating matters is the fact that "investigators suspect multiple hacking groups may have simultaneously been inside Starwood's computer networks since 2014," according to one of the sources.

In short, Reuters' headline reads: "Clues in Marriott hack implicate China" while their article then admits it literally could have been anyone.

We also know from the WikiLeaks "Vault 7" release of CIA hacking tools that the US government, among others, has the ability to misdirect attribution to foreign actors by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

After Marriott disclosed the new development on Friday, US and UK regulators hopped into action, launching probes into the case.

Compromised customer data included names, passport numbers, addresses, phone numbers, birth dates and email addresses. A small percentage of accounts included scrambled payment card data, said Kim.

...

The hack began in 2014, shortly after an attack on the U.S. government’s Office of Personnel Management (OPM) compromised sensitive data on tens of millions of employees, including application forms for security clearances.

White House National Security advisor John Bolton recently told reporters he believed Beijing was behind the OPM hack, a claim first made by the United States in 2015. -Reuters

So for those still following, John Bolton thinks Beijing hacked the US Government's Office of Personnel Management - ergo, per Reuters, China hacked Marriott too. Then again, the Marriott case appeared similar to previous hacks conducted by the Chinese government, according to Robert Anderson - former senior FBI Assistant Director of counterintelligence under Mueller.

"Think of the depth of knowledge they could now have about travel habits or who happened to be in a certain city at the same time as another person," said Anderson - now a principal with the Chertoff Group - founded by Michael Chertoff who co-wrote the PATRIOT act and served as former US Secretary of Homeland Security. "It fits with how the Chinese intelligence services think about things. It’s all very long range," Anderson added.

Michael Sussmann, a former senior Department of Justice official for its computer crimes section, said that the long duration of the campaign was an indicator that the hackers were seeking data for intelligence and not information to use in cyber crime schemes. -Reuters

"One clue pointing to a government attacker is the amount of time the intruders were working quietly inside the network," said Sussman. who added "Patience is a virtue for spies, but not for criminals trying to steal credit card numbers."

Views: 53

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted a blog post

Buying the Last haunted House on the Left (A partial autobiography)

Note to the reader, there are events here that are true and some that are fictional.Chapter IIt was…See More
13 hours ago
Doc Vega posted a blog post

In Memory of Those Who Served

 Bullets flew and ricochetedI was on that hill todayMy Company commander got blown awayI was on…See More
yesterday
Doc Vega posted blog posts
Tuesday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea I was wrong Emperor Penguins are big and powerful but still alive but this,  A size…"
Tuesday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"Cheeki kea here's another that they say there have been modern sightings of!  The name of…"
Tuesday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea, did you ever hear of the giant Imperial Penguins? They were about 6 feet tall and could…"
Tuesday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea I do not think these giant two legged birds would need to have a bad attitude as long as…"
Tuesday
Olivia Brooks updated their profile
Tuesday
John Miller was featured
Tuesday
tjdavis's 2 blog posts were featured
Tuesday
Zfort Group's blog post was featured
Tuesday
Doc Vega's 6 blog posts were featured
Tuesday
Burbia commented on tjdavis's video
Thumbnail

“What’s His Motive?” - Inside The Mind of George Soros

"Trump calls for George Soros and son to face federal…"
Tuesday
Burbia commented on tjdavis's photo
Tuesday
Profile IconSeeta Sathe and Olivia Brooks joined 12160 Social Network
Tuesday
tjdavis posted a video

Mossad, Terrifying CIA Technology, Blackwater & The Most Secret CIA Unit | John Kiriakou

John Kiriakou served 15 years in the CIA as a Case Officer (Spy) and as CIA's Head of Counterterrorism Operations in Pakistan where he lead the raid that cap...
Monday
tjdavis posted a photo
Monday
tjdavis posted a video

A Critique of the Tavistock Institute - The Mother Of All Conspiracy Theories

An examination of the Tavistock Institute, a theory which seeks to explain how Western societies have been brainwashed by a cabal of social scientists and th...
Aug 31
tjdavis posted a video

“What’s His Motive?” - Inside The Mind of George Soros

In this short clip, Patrick Bet-David, Sebastian Gorka Adam Sosnick, and Tom Ellsworth George Soros and what motivates him to do the things he does. FaceTime...
Aug 27
Doc Vega posted blog posts
Aug 27

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted