Information of European Hotel Chain’s Customers Found on Unprotected Server
A researcher has discovered an unprotected server storing the personal information of a significant number of customers of European hotel chain Falkensteiner.
Austria-based Falkensteiner has hotels in Central and Eastern Europe, including in Austria, Italy, Croatia, Slovakia, Serbia and the Czech Republic.
The exposed Falkensteiner data was discovered by Anurag Sen, a researcher at cloud security firm CloudDefense.AI. Sen recently also discovered a US government server that was leaking internal US military emails.
An analysis conducted by Sen showed that the exposed Falkensteiner customer data was associated with Gustaffo, a company offering IT solutions for the hospitality industry.
The researcher says he notified both Gustaffo and Falkensteiner, but none of them responded. However, Sen noticed that the server was secured shortly after he informed the companies.
Sen told SecurityWeek that the vulnerable Elasticsearch server hosted more than 11 Gb of data before it was taken offline. He found more than 102,000 records in the exposed database, including full names, phone numbers, email addresses, and booking details.
The researcher is unhappy with the way the issue has been handled by the impacted companies — he says they haven’t responded to his emails and haven’t notified customers about the data breach.
However, Gustaffo says they actually secured the server after learning about the leak from a different researcher. The Austria-based company, which does have a responsible disclosure program, told SecurityWeek that its assessment showed that the incident was limited to one system and the details of only approximately 13,000 individuals were exposed.
Gustaffo representatives explained that many of the records were likely duplicates as it does not store the information of more than 13,000 customers in the database.
The company said it performed the necessary security updates to its system and it’s in touch with government authorities handling the incident.
Falkensteiner has not responded to SecurityWeek’s repeated requests for comment.
Related: R1Soft Server Backup Manager Vulnerability Exploited to Deploy Backdoor
Related: Credential Leakage Fueling Rise in API Breaches
Related: Uber Data Leaked Following Breach at Third-Party Vendor