Back to Blog

Marriott-Starwood: 500 Million Guest Records and 4 Years of Undetected Access

Prateek SinghFebruary 6, 20269 min read
Marriott-Starwood: 500 Million Guest Records and 4 Years of Undetected Access

Attackers lurked inside Starwood's network for 4 years — through an entire corporate acquisition — exfiltrating 500 million guest records. KAVI's continuous authentication catches intruders in real-time.

The Breach

In November 2018, Marriott International disclosed that the Starwood guest reservation database had been compromised since 2014 — a full four years of undetected access. The breach exposed records of approximately 500 million guests, including:

  • Names, addresses, phone numbers, email addresses
  • Passport numbers (5.25 million unencrypted)
  • Travel dates and destinations
  • Credit card numbers (encrypted, but encryption keys may have been compromised)

Marriott acquired Starwood in 2016 — the attackers were already inside. The breach migrated along with the data during the corporate merger.

Why Traditional Security Failed

  • 4-year dwell time: The longest high-profile breach dwell time on record
  • No behavioral detection: Anomalous database access patterns were never flagged
  • Persistent credentials: Once inside, the attackers maintained access through stolen credentials that were never rotated
  • M&A blind spot: Security due diligence during the acquisition failed to detect an active compromise

How KAVI Protocol Prevents This

Continuous Authentication Eliminates Dwell Time

Four years. KAVI's continuous behavioral verification would have detected the anomaly within the first session. The behavioral model continuously validates that the person accessing the system matches the established Surprise Signature. An attacker maintaining long-term access would face continuous scrutiny — not one-time gate-keeping.

Per-Session Ghost Keys

Under KAVI, each session generates fresh Ghost Keys from live behavior. Maintaining persistent access requires continuously proving behavioral identity. An attacker cannot establish a foothold and coast for four years — every session demands fresh proof.

M&A Security

During the Marriott-Starwood merger, the active compromise went undetected. Under KAVI's continuous model, the anomalous access patterns would surface during system integration — the attacker's behavioral profile wouldn't match any legitimate Starwood employee.

Conclusion

The Marriott-Starwood breach is a cautionary tale about the difference between perimeter security and continuous verification. A four-year dwell time is possible only when authentication is a one-time event. KAVI makes authentication continuous, reducing potential dwell time from years to seconds.

References & Citations

  • Marriott International (2018). "Starwood Guest Reservation Database Security Incident." Press Release.
  • UK ICO (2020). Marriott International Inc. Penalty Notice: £18.4 million.
  • U.S. Senate Homeland Security Committee (2019). Marriott Breach Hearing.
Share this article

Related Posts