Marriott Data Breach: How 500 Million People Might Be Affected

  • By David Lukic
  • Published: Oct 16, 2020
  • Last Updated: Nov 23, 2023

Marriott Hotels were the target of a four-year-long data breach that ultimately affected 500 million guests.The Marriott data breach gave the hackers entry to the Marriott reservation system, thus infiltrating all Marri ott’s Starwood subsidiaries. On the heels of the Yahoo data breach, the Marriott cyber attack is another large-scale loss. Along with personal details stolen, hackers grabbed credit card numbers, phone numbers, passport numbers, dates of birth, and arrival and departure dates. This data breach is particularly sensitive because of the added component of travel records stolen indicating who traveled where, when, and with whom. 

When Was the Marriott Data Breach?

Marriott Data Breach

The Marriott hotel breach occurred sometime during 2014 and continued until 2018 when it was discovered and reported around September 8, 2018. Cybersecurity experts reviewed the hotel chain’s security protocols and found them lacking, thus why perpetrators were able to continue accessing data for four years. High ranking officials fear that this Marriot hack was instituted by a foreign nation looking to monitor travel plans for diplomats and other government officials. No official statement has been made and no arrests to date, but there are hints that China was involved. 

Marriott hotel Data Breach: Am I Affected? 

If you were one of the 500 million guests affected, you should have received a letter from Marriott explaining what to do. You can also contact Marriott directly for additional information. Unfortunately, there is no online method of checking to see if your data was affected by this breach. There are a few class-action lawsuits in the works, but it is doubtful that there will be any type of cash payout for victims. 

What You Should Do After The Marriott Data Breach

If your data was among the 500 million customers affected by the Marriott International data breach, you would want to make some changes quickly.

  • First, change all your online login passwords and use complex combinations of letters, numbers, and symbols.

  • Monitor your banking and credit card information scouring for any suspicious activity.

  • Be on the lookout for phishing emails. Whenever a data breach occurs, one of the ways cybercriminals dig in deeper is to use scam emails to get users to click a link or download a file that infects their computer with a virus or malware.

  • Never click any links in email or download attachments unless you know the sender.

  • If you incurred losses, contact Marriott for additional compensation. 

Marriott Hotel Data Breach Insurance: They are Paying For Passport Fees?

If you can prove identity theft or fraudulent activity as a direct result of the loss of your passport number due to the Marriott Starwood data breach, they are willing to reimburse you for the fee to have a new passport created. You must contact them directly to obtain details. The Starwood Corporation, which purchased Marriott Hotels, has this website to help with any questions and details of the breach: https://info.starwoodhotels.com/

Marriott International hack

Can My Personal Information From Marriott Hack be Used for Identity Theft?

Unfortunately, the vast treasure trove of information stolen by cybercriminals during the Marriott breach is more than enough for identity theft. Personal details like dates of birth, passport numbers, and other sensitive information most likely made its way to the dark web and were sold for the purpose of identity theft, hacking, or perpetrating ransomware. 

Steps to Protect Yourself against Identity Theft

It’s much easier to protect yourself against identity theft than clean it up later. There are a few precautions you can take now and ongoing routines to help keep you safe.

  • Sign up for credit monitoring service. IDStrong.com is an excellent choice for this service) and check for any suspicious activity.

  • Update your antivirus software and run deep scans often.

  • Consider a credit freeze where your identity cannot be used to open new accounts without your authorization. 

Finding and resolving identity theft issues is easier if you stay on top of all your accounts regularly.

About the Author
IDStrong Logo

Related Articles

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach: 2013, 2015, 2021 and 2023 Hacks

T-Mobile has experienced a number of data breaches in the past decade. The first case occurred som ... Read More

Anthem Data Breach Exposed 78 Million Records

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that much a ... Read More

The NSA Hack, How Did it Happen?

The National Security Agency (NSA) was the main attraction in a major data breach involving three ... Read More

Latest Articles

What You Need to Know about the Delta Dental Data Breach

What You Need to Know about the Delta Dental Data Breach

Delta Dental is a dental insurance provider serving over 90 million Americans. It offers coverage in all 50 states, Puerto Rico, and Washington, D.C. The company was established in 1966 in California as part of the Delta Dental Plans Association.

What You Need to Know about the Hot Topic Data Breach

What You Need to Know about the Hot Topic Data Breach

Hot Topic plays in the fashion, apparel, and shoe industry as a retailer of music-influenced apparel and accessories, such as jeans, tops, belts, dresses, pajamas, sunglasses, jewelry, and tees.

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close