In the rapidly evolving hospitality sector, vacation rental software, once considered a luxury, has become essential. This software, primarily used for bookings, guest interactions, and property management, stores sensitive data such as credit card details, guest preferences, and communications. This vast reservoir of data has become a prime target for cybercriminals.
Credit card information, responsible for a significant 41% of breaches in the hospitality sector, is especially enticing for hackers. The industry’s high transaction volume combined with integrated payment gateways makes it a lucrative target for cyberattacks.
Cyber attackers possess a deep understanding of the software’s mechanics. They invest heavily in creating tools to exploit system vulnerabilities, aiming for consistent illegal profits. While large hotel chains and travel search engines can invest in robust security measures, they are not immune to breaches. In contrast, smaller hotels and resorts face a more significant challenge. The high costs and time associated with developing custom software lead many to opt for third-party solutions, introducing supply chain vulnerabilities.
A recent breach affected a US resort using the IRM Next Generation online booking engine by Resort Data Processing, Inc. Bitdefender Labs identified multiple vulnerabilities in this software. The attackers used custom malware tailored to the software, highlighting their profound knowledge of its structure and their ability to exploit it. Despite Bitdefender Labs’ attempts to report these vulnerabilities since May 2023, Resort Data Processing hasn’t responded.
The attack, initiated in summer 2022, targeted a specific vulnerability in the booking engine, allowing the attacker to upload and run malicious files within the ASP.NET framework. The use of a discreet backdoor, known as Micro Backdoor, made detection challenging.
In conclusion, this incident underscores the importance of supply chain security, especially for smaller businesses relying on third-party solutions. A defense-in-depth approach, involving multiple security layers, is recommended to counter modern cyber threats.
Source: GBHackers
To mitigate potential threats, it is important to implement additional cybersecurity measures with the help of a trusted partner like INFRA www.infrascan.net or you can try your self using check.website.