Hackers behind a massive breach at hotel group Marriott International left clues suggesting they were working for a Chinese government intelligence gathering operation, according to sources familiar with the matter.
Marriott said last week that a hack that began four years ago had exposed the records of up to 500 million customers in its Starwood hotels reservation system.
Private investigators looking into the breach have found hacking tools, techniques and procedures previously used in attacks attributed to Chinese hackers, said three sources who were not authorised to discuss the company's private probe into the attack.
That suggests that Chinese hackers may have been behind a campaign designed to collect information for use in Beijing's espionage efforts and not for financial gain, two of the sources said.
While China has emerged as the lead suspect in the case, the sources cautioned it was possible somebody else was behind the hack because other parties had access to the same hacking tools, some of which have previously been posted online.
Identifying the culprit is further complicated by the fact that investigators suspect multiple hacking groups may have simultaneously been inside Starwood's computer networks since 2014, said one of the sources.
If investigators confirm that China was behind the attack, that could complicate already tense relations between Washington and Beijing, amid an ongoing tariff dispute and U.S. accusations of Chinese espionage and the theft of trade secrets.
"China firmly opposes all forms of cyber attack and cracks down on them in accordance with law," Chinese Ministry of Foreign Affairs spokesman Geng Shuang told Reuters."If offered evidence, the relevant Chinese departments will carry out investigations according to law."
Marriott spokeswoman Connie Kim declined to comment, saying "We've got nothing to share," when asked about involvement of Chinese hackers.
Marriott disclosed the hack on Friday, prompting U.S. and UK regulators to quickly launch probes into the case.
Compromised customer data included names, passport numbers, addresses, phone numbers, birth dates and email addresses. A small percentage of accounts included scrambled payment card data, said Kim.
Marriott acquired Starwood in 2016 for US$13.6 billion, including the Sheraton, Westin, W Hotels, St. Regis, Aloft, Le Meridien, Tribute, Four Points and Luxury Collection hotel brands, forming the world's largest hotel operator.
The hack began in 2014, shortly after an attack on the U.S. government's Office of Personnel Management (OPM) compromised sensitive data on tens of millions of employees, including application forms for security clearances.
White House National Security advisor John Bolton recently told reporters he believed Beijing was behind the OPM hack, a claim first made by the United States in 2015.
Beijing has strongly denied those charges and also refuted charges that it was behind other hacks.
Former senior FBI official Robert Anderson told Reuters that the Marriott case looked similar to hacks that the Chinese government was conducting in 2014 as part of its intelligence operations.
"Think of the depth of knowledge they could now have about travel habits or who happened to be in a certain city at the same time as another person," said Anderson, who served as FBI executive assistant director until 2015.
"It fits with how the Chinese intelligence services think about things. It's all very long range," said Anderson, who was not involved in investigating the Marriott case and is now a principal with Chertoff Group.
Michael Sussmann, a former senior Department of Justice official for its computer crimes section, said that the long duration of the campaign was an indicator that the hackers were seeking data for intelligence and not information to use in cyber crime schemes.
"One clue pointing to a government attacker is the amount of time the intruders were working quietly inside the network," he said. "Patience is a virtue for spies, but not for criminals trying to steal credit card numbers."
FBI representatives could not immediately be reached for comment on the evidence linking the attack to China. A spokesperson said on Friday that the agency was looking into the attack, but declined to elaborate.
(Reporting by Christopher Bing in Washington; Editing by Jim Finkle, Rosalba O'Brien and Susan Thomas)
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.