DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Hyatt Gold Passport notifies a small number of loyalty program members of possible breach (update2)

Posted on April 22, 2015 by Dissent

Hyatt is sending some customers enrolled in their loyalty points program, Gold Passport, notification of a possible breach of their information. As with some other loyalty card breach reports we’ve seen recently, Hyatt’s notification indicates that there is no evidence that their system was breached and that the miscreants may have obtained customers’ login credentials from other sources or by other means.

Hyatt is requiring a password reset for affected accounts.

Here’s a screencap of the notification, courtesy of Suzanne Widup and VERISDB:

c56f9d1c-e90f-11e4-8ed4-6cb54b7485b3

“As part of Hyatt Gold Passport’s routine monitoring of member account activity, we found a small number of accounts were accessed by an unauthorized individual utilizing member usernames and passwords. We have no reason to believe, at this time, the login information was obtained through Hyatt Gold Passport, and we continue to analyze and monitor our systems. We have reached out to members we know have been affected to resolve any concerns.

To enhance your account security, we are resetting all passwords connected to a username. The next time you sign in to your Hyatt Gold Passport account, you will need to change your password by following the directions below. We strongly recommend that you reset your username and password to a unique combination not used elsewhere. You will not be able to access your account online until you change your password.

To change your Hyatt Gold Passport password:
1) Visit goldpassport.com
2) Click “Forgot Password” in the sign-in section and follow the directions
3) Look for a temporary password sent to your email and follow the directions

We apologize for any inconvenience. If you have any questions, please call us anytime at 800.228.3360 in the US and Canada or contact Hyatt in your region. ”

The notification does not say how or if the information was misused in any way, nor how many members, total, are being notified.

UPDATE: See the comment below from “JJ,”. In separate communication, JJ also informs DataBreaches.net:

And when I reset my password, it had this wonderful note:

“To access all of the exclusive features inside goldpassport.com, follow the steps to create your new password. Your new password should be 6 to 35 letters and/or numbers. Special characters such as @#$%^&*:;/ are not permitted.”

Jeez. Why would they prohibit special characters? How much time have they now saved hackers by doing that?

UPDATE 2: Steve Ragan has the numbers on CSO Online:

On Tuesday, Hyatt alerted some 200 customers that their Gold Passport account had been flagged for suspicious activity, while the other 18 million members have had their account passwords reset out of an abundance of caution.


Related:

  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Data BreachesProsper Data Breach Impacts 17.6 Million Accounts
  • Heritage Provider Network $49.99M Class Action Settlement
Category: Business SectorOtherU.S.

Post navigation

← Costa Coffee Club warns of possible database intrusion
NC: Wake County Public Schools take servers offline after DDoS attack →

1 thought on “Hyatt Gold Passport notifies a small number of loyalty program members of possible breach (update2)”

  1. JJ says:
    April 22, 2015 at 10:10 pm

    “To enhance your account security, we are resetting all passwords connected to a username.”

    Ummm, aren’t all passwords connected to a username? I’m pretty sure a single username could not have multiple passwords associated with it. With all of the PR and legal review that email had to undergo, that is really strange wording.

    My account was setup five months ago and only accessed between the end of November and early January for a vacation. The username and password were not used on any other site and was only used from my home laptop. I’m glad I did not have a credit card on file with them. I think there will be a Paul Harvey moment in the future.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.