Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

The Omni La Mansion del Rio is ideally nestled along the historic Riverwalk among the banks of the Paseo del Rio in downtown San Antonio. It is within easy walking distance of the famous Alamo, El Mercado, La Villita District, Spanish governor’s Palace, San Antonio Convention Center and other well-known landmarks. Omni La Mansion del Rio’s associates enjoy a dynamic and exciting work environment, comprehensive training and mentoring, along with the pride that comes from working for a company with a reputation for exceptional service. We embody a culture of respect, gratitude and empowerment day in and day out. If you are a friendly, motivated person, with a passion to serve others, the Omni La Mansion del Rio may be your perfect match.

Omni La Mansión del Rio A.I CyberSecurity Scoring

AI scoreOLMDR Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/omni-la-mansion-del-rio.jpeg
OLMDR Hospitality
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreOLMDR Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/omni-la-mansion-del-rio.jpeg
OLMDR Hospitality
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

OLMDR Company CyberSecurity News & History

Past Incidents
4
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Omni Hotels & ResortsBreach8542/2025foh&bohfoh&boh
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Hiring Platform Foh&Boh Exposes 5.4 Million Job Seekers’ Resumes in Unsecured AWS Bucket A major data exposure incident has left the personal details of millions of job seekers vulnerable after U.S.-based hiring platform Foh&Boh accidentally left an AWS S3 bucket unsecured, containing 5.4 million files, primarily CVs and resumes. The breach, discovered by the Cybernews research team, exposed sensitive applicant information including work history, contact details, and personal identifiers making individuals susceptible to targeted phishing, identity theft, and financial fraud. Foh&Boh, which serves high-profile clients such as Taco Bell, KFC, Nordstrom, Omni Hotels & Resorts, and Hyatt Grand, failed to restrict public access to the storage bucket. While the dataset was later secured following multiple contact attempts by researchers, the exposure raises concerns about unauthorized access by malicious actors. Attackers could exploit the leaked data to craft highly personalized phishing emails, impersonate past employers, or launch scams targeting financially vulnerable individuals. The breach also heightens risks of identity theft, with cybercriminals potentially using the stolen details to open fraudulent bank accounts or apply for credit under victims’ names. Researchers warned that the incident could lead to synthetic identity fraud, where attackers combine real and fabricated information to create new, fraudulent identities. This follows another recent breach involving Luxshare, a key Apple supplier, where a ransomware cartel allegedly stole confidential data from Apple, Nvidia, and LG, threatening to leak it unless demands were met. The Foh&Boh incident underscores the persistent risks of misconfigured cloud storage, a common yet preventable security failure. No official statement from Foh&Boh has been released at this time.

Omni Hotels & ResortsBreach8542/2025foh&bohfoh&boh
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Millions of Job Seekers’ Resumes Exposed in Foh&Boh Data Breach A major data exposure incident involving Foh&Boh, a U.S.-based hiring and onboarding platform for restaurants, hotels, and retailers, has left 5.4 million files primarily CVs and resumes publicly accessible via an unsecured AWS bucket. The breach, discovered by the Cybernews research team, exposed sensitive personal details that job applicants typically share with employers, including work history, contact information, and professional references. The platform serves high-profile clients such as Taco Bell, KFC, Omni Hotels & Resorts, Nordstrom, and Hyatt Grand, raising concerns about the potential misuse of the leaked data. While the dataset was secured after multiple attempts to contact Foh&Boh, the exposure could have enabled targeted phishing attacks, identity theft, and financial fraud. Researchers warned that cybercriminals could exploit the stolen information to craft highly personalized phishing emails, referencing specific job details or career interests to deceive victims. The data could also be weaponized for synthetic identity fraud, allowing attackers to open fraudulent bank accounts or apply for credit under victims’ names. Additionally, scammers might target financially vulnerable individuals with "get-rich-quick" schemes or impersonate past employers to extract further sensitive information. The incident underscores the risks of misconfigured cloud storage, with experts recommending stricter access controls, encryption, and retrospective log reviews to prevent unauthorized access. While the bucket is no longer publicly accessible, the long-term impact on affected job seekers remains unclear.

Omni La Mansión del RioCyber Attack10056/2024NA
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: In 2024, Omni Hotels fell victim to a targeted cyberattack that severely disrupted its core operations. The breach compromised the hotel chain’s reservation and check-in systems, rendering room key card functionality inoperable and crippling payment processing across multiple locations. Guests experienced prolonged delays, denied access to rooms, and financial transaction failures, leading to widespread frustration and reputational damage. The attack exploited vulnerabilities in the hotel’s interconnected building management systems (BMS), which govern critical infrastructure like HVAC, security, and access control. Investigations suggested the intruders leveraged outdated software or weak authentication protocols common in legacy BMS environments to gain unauthorized access. While no immediate physical harm was reported, the operational paralysis threatened guest safety protocols (e.g., fire alarms, emergency exits) and exposed sensitive customer data during the payment outage. The incident forced Omni to implement emergency manual overrides, incur significant recovery costs, and face potential legal liabilities from affected guests. Insurers scrutinized the hotel’s cybersecurity posture, complicating claims for business interruption losses. The attack underscored the risks of unpatched smart building technologies, where operational convenience intersects with high-stakes cyber threats.

Omni La Mansión del RioCyber Attack60212/2015NA
Rankiteo Explanation :
Attack limited on finance or reputation

Description: The California Office of the Attorney General reported on July 8, 2016, a data breach involving Omni Hotels & Resorts that began on December 23, 2015. The incident involved a malware intrusion affecting point of sale systems, potentially compromising payment card information, including cardholder name, credit/debit card number, security code, and expiration date.

Foh&Boh, Nordstrom, Hyatt Grand and Omni Hotels & Resorts: Hiring platform serves users raw with 5.4 million CVs exposed
Breach
Severity: 85
Impact: 4
Seen: 2/2025
Blog:
Supply Chain Source: foh&bohfoh&boh
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Hiring Platform Foh&Boh Exposes 5.4 Million Job Seekers’ Resumes in Unsecured AWS Bucket A major data exposure incident has left the personal details of millions of job seekers vulnerable after U.S.-based hiring platform Foh&Boh accidentally left an AWS S3 bucket unsecured, containing 5.4 million files, primarily CVs and resumes. The breach, discovered by the Cybernews research team, exposed sensitive applicant information including work history, contact details, and personal identifiers making individuals susceptible to targeted phishing, identity theft, and financial fraud. Foh&Boh, which serves high-profile clients such as Taco Bell, KFC, Nordstrom, Omni Hotels & Resorts, and Hyatt Grand, failed to restrict public access to the storage bucket. While the dataset was later secured following multiple contact attempts by researchers, the exposure raises concerns about unauthorized access by malicious actors. Attackers could exploit the leaked data to craft highly personalized phishing emails, impersonate past employers, or launch scams targeting financially vulnerable individuals. The breach also heightens risks of identity theft, with cybercriminals potentially using the stolen details to open fraudulent bank accounts or apply for credit under victims’ names. Researchers warned that the incident could lead to synthetic identity fraud, where attackers combine real and fabricated information to create new, fraudulent identities. This follows another recent breach involving Luxshare, a key Apple supplier, where a ransomware cartel allegedly stole confidential data from Apple, Nvidia, and LG, threatening to leak it unless demands were met. The Foh&Boh incident underscores the persistent risks of misconfigured cloud storage, a common yet preventable security failure. No official statement from Foh&Boh has been released at this time.

Foh&Boh, KFC, Nordstrom, Hyatt Grand and Omni Hotels & Resorts: Hiring platform serves users raw with 5.4 million CVs exposed
Breach
Severity: 85
Impact: 4
Seen: 2/2025
Blog:
Supply Chain Source: foh&bohfoh&boh
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Millions of Job Seekers’ Resumes Exposed in Foh&Boh Data Breach A major data exposure incident involving Foh&Boh, a U.S.-based hiring and onboarding platform for restaurants, hotels, and retailers, has left 5.4 million files primarily CVs and resumes publicly accessible via an unsecured AWS bucket. The breach, discovered by the Cybernews research team, exposed sensitive personal details that job applicants typically share with employers, including work history, contact information, and professional references. The platform serves high-profile clients such as Taco Bell, KFC, Omni Hotels & Resorts, Nordstrom, and Hyatt Grand, raising concerns about the potential misuse of the leaked data. While the dataset was secured after multiple attempts to contact Foh&Boh, the exposure could have enabled targeted phishing attacks, identity theft, and financial fraud. Researchers warned that cybercriminals could exploit the stolen information to craft highly personalized phishing emails, referencing specific job details or career interests to deceive victims. The data could also be weaponized for synthetic identity fraud, allowing attackers to open fraudulent bank accounts or apply for credit under victims’ names. Additionally, scammers might target financially vulnerable individuals with "get-rich-quick" schemes or impersonate past employers to extract further sensitive information. The incident underscores the risks of misconfigured cloud storage, with experts recommending stricter access controls, encryption, and retrospective log reviews to prevent unauthorized access. While the bucket is no longer publicly accessible, the long-term impact on affected job seekers remains unclear.

Omni Hotels
Cyber Attack
Severity: 100
Impact: 5
Seen: 6/2024
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization’s existence

Description: In 2024, Omni Hotels fell victim to a targeted cyberattack that severely disrupted its core operations. The breach compromised the hotel chain’s reservation and check-in systems, rendering room key card functionality inoperable and crippling payment processing across multiple locations. Guests experienced prolonged delays, denied access to rooms, and financial transaction failures, leading to widespread frustration and reputational damage. The attack exploited vulnerabilities in the hotel’s interconnected building management systems (BMS), which govern critical infrastructure like HVAC, security, and access control. Investigations suggested the intruders leveraged outdated software or weak authentication protocols common in legacy BMS environments to gain unauthorized access. While no immediate physical harm was reported, the operational paralysis threatened guest safety protocols (e.g., fire alarms, emergency exits) and exposed sensitive customer data during the payment outage. The incident forced Omni to implement emergency manual overrides, incur significant recovery costs, and face potential legal liabilities from affected guests. Insurers scrutinized the hotel’s cybersecurity posture, complicating claims for business interruption losses. The attack underscored the risks of unpatched smart building technologies, where operational convenience intersects with high-stakes cyber threats.

Omni Hotels & Resorts
Cyber Attack
Severity: 60
Impact: 2
Seen: 12/2015
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack limited on finance or reputation

Description: The California Office of the Attorney General reported on July 8, 2016, a data breach involving Omni Hotels & Resorts that began on December 23, 2015. The incident involved a malware intrusion affecting point of sale systems, potentially compromising payment card information, including cardholder name, credit/debit card number, security code, and expiration date.

Ailogo

OLMDR Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for OLMDR

Incidents vs Hospitality Industry Average (This Year)

No incidents recorded for Omni La Mansión del Rio in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Omni La Mansión del Rio in 2026.

Incident Types OLMDR vs Hospitality Industry Avg (This Year)

No incidents recorded for Omni La Mansión del Rio in 2026.

Incident History — OLMDR (X = Date, Y = Severity)

OLMDR cyber incidents detection timeline including parent company and subsidiaries

OLMDR Company Subsidiaries

SubsidiaryImage

The Omni La Mansion del Rio is ideally nestled along the historic Riverwalk among the banks of the Paseo del Rio in downtown San Antonio. It is within easy walking distance of the famous Alamo, El Mercado, La Villita District, Spanish governor’s Palace, San Antonio Convention Center and other well-known landmarks. Omni La Mansion del Rio’s associates enjoy a dynamic and exciting work environment, comprehensive training and mentoring, along with the pride that comes from working for a company with a reputation for exceptional service. We embody a culture of respect, gratitude and empowerment day in and day out. If you are a friendly, motivated person, with a passion to serve others, the Omni La Mansion del Rio may be your perfect match.

Loading...
similarCompanies

OLMDR Similar Companies

Meliá Hotels International

Welcome to Meliá Hotels International! From Mallorca to the world, our story is an exciting journey that began more than six decades ago and has led us to become one of the largest hotel chains on the planet and the most sustainable in Europe (S&P Global). With more than 400 hotels across the worl

Holiday Inn Express

An IHG hotel. IHG Hotels & Resorts [LON:IHG, NYSE:IHG (ADRs)] is a global hospitality company, with a purpose to provide True Hospitality for Good. At Holiday Inn Express, we strive to make every interaction you have with us simple, smart and refreshingly engaging. With over 3,000 hotels in 75 di

Hampton

The Hampton brand, including Hampton Inn, Hampton Inn & Suites and Hampton by Hilton, is an award-winning leader in the upper-midscale hotel segment. With more than 2,700 properties in 32 countries globally, Hampton is part of Hilton Worldwide, the leading global hospitality company. All Hampton Hot

Fairmont Hotels & Resorts

Located in the heart of each destination we call home, a stay at any Fairmont hotel is truly unforgettable. Known for grand and awe-inspiring properties and thoughtful and engaging colleagues who aim to make each and every stay a cherished and memorable experience, we have been the stage for some of

Landry's is a multinational, diversified restaurant, hospitality, gaming, and entertainment leader based in Houston, Texas. The company operates more than 600 establishments around the world, including well-known concepts, such as Landry’s Seafood House, Bubba Gump Shrimp Co., Rainforest Cafe, Mo

Delaware North

Delaware North is a global leader in the hospitality and entertainment industry. The company annually serves more than a half-billion guests across three continents, including at high-profile sports venues, airports, national and state parks, restaurants, resorts, hotels and casinos. Building on mor

Mandarin Oriental

Mandarin Oriental Hotel Group is the award-winning owner and operator of some of the world’s most luxurious hotels, resorts and residences. Having grown from its Asian roots into a global brand, the Group now operates 43 hotels, 12 residences and 23 exclusive homes in 26 countries and territories, w

DoubleTree by Hilton

DoubleTree by Hilton hotels are distinctively designed properties that provide true comfort to today’s business and leisure travelers. From the millions of delighted hotel guests who are welcomed with the brand’s legendary, warm chocolate chip cookies at check-in to the advantages of the award-winni

ITC Hotels Limited

Established in 1975, ITC Hotels Limited has grown to encompass over 140+ hotels across 90+ destinations, solidifying its presence in the Indian subcontinent ITC Hotels seamlessly blends India’s rich tradition of hospitality with globally benchmarked services, offering a collection of hotels and res

newsone

OLMDR CyberSecurity News

April 04, 2026 03:10 PM
Galaxy Digital Balances Cybersecurity Test With Tokenization And Staking Push

Galaxy Digital (NasdaqGS:GLXY) disclosed a cybersecurity incident in an isolated R&D environment and reported that client assets were not...

April 04, 2026 02:15 PM
StreamSecurity Leans on AI Triage and Supply Chain Research to Bolster Cybersecurity Positioning

StreamSecurity featured prominently this week with new customer evidence and expanding threat research in cloud and software supply chain...

April 04, 2026 01:46 PM
Nancy Guthrie Update: FBI’s ‘Best Lead,’ According to a Cybersecurity Expert

'Today' co-anchor Savannah Guthrie's mom, 84, remains missing more than two months after her Tucson, Arizona, kidnapping.

April 04, 2026 01:30 PM
Nancy Guthrie Update: FBI’s ‘Best Lead,’ According to a Cybersecurity Expert

'Today' co-anchor Savannah Guthrie's mom, 84, remains missing more than two months after her Tucson, Arizona, kidnapping.

April 04, 2026 01:00 PM
The unholy trinity powering the scam economy

Learn how cybercrime, fraud, and scams are interconnected and the need for a coordinated response to combat the scam economy and protect...

April 04, 2026 01:00 PM
After fighting malware for decades, this cybersecurity veteran is now hacking drones

Mikko Hyppönen is one of the most recognizable faces of the cybersecurity industry. After fighting computer viruses, worms, and malware,...

April 04, 2026 12:24 PM
Gritman systems coming back online after cybersecurity incident, no data compromised

MOSCOW, ID — Operations across Gritman Medical Center are being restored following a cybersecurity incident and systems outage earlier this...

April 04, 2026 12:22 PM
Nancy Guthrie Update: FBI’s ‘Best Lead,’ According to a Cybersecurity Expert

'Today' co-anchor Savannah Guthrie's mom, 84, remains missing more than two months after her Tucson, Arizona, kidnapping.

April 04, 2026 08:21 AM
SPARK & SAD: New Deep Learning IDS for SCADA Cybersecurity in 2026 - News and Statistics

Researchers have developed two new deep learning-based intrusion detection systems designed to improve cybersecurity for SCADA networks,...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

OLMDR CyberSecurity History Information

Official Website of Omni La Mansión del Rio

The official website of Omni La Mansión del Rio is https://www.omnihotels.com/hotels/san-antonio-la-mansion-del-rio.

Omni La Mansión del Rio’s AI-Generated Cybersecurity Score

According to Rankiteo, Omni La Mansión del Rio’s AI-generated cybersecurity score is 772, reflecting their Fair security posture.

How many security badges does Omni La Mansión del Rio’ have ?

According to Rankiteo, Omni La Mansión del Rio currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Omni La Mansión del Rio been affected by any supply chain cyber incidents ?

According to Rankiteo, Omni La Mansión del Rio has been affected by multiple supply chain cyber incidents. The affected supply chain sources and their corresponding incident IDs are:

  • foh&boh (Incident ID: FOHNORHYAOMN1769001286)
  • foh&boh (Incident ID: FOHKFCNORHYAOMN1769001235)
Does Omni La Mansión del Rio have SOC 2 Type 1 certification ?

According to Rankiteo, Omni La Mansión del Rio is not certified under SOC 2 Type 1.

Does Omni La Mansión del Rio have SOC 2 Type 2 certification ?

According to Rankiteo, Omni La Mansión del Rio does not hold a SOC 2 Type 2 certification.

Does Omni La Mansión del Rio comply with GDPR ?

According to Rankiteo, Omni La Mansión del Rio is not listed as GDPR compliant.

Does Omni La Mansión del Rio have PCI DSS certification ?

According to Rankiteo, Omni La Mansión del Rio does not currently maintain PCI DSS compliance.

Does Omni La Mansión del Rio comply with HIPAA ?

According to Rankiteo, Omni La Mansión del Rio is not compliant with HIPAA regulations.

Does Omni La Mansión del Rio have ISO 27001 certification ?

According to Rankiteo,Omni La Mansión del Rio is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Omni La Mansión del Rio

Omni La Mansión del Rio operates primarily in the Hospitality industry.

Number of Employees at Omni La Mansión del Rio

Omni La Mansión del Rio employs approximately 50 people worldwide.

Subsidiaries Owned by Omni La Mansión del Rio

Omni La Mansión del Rio presently has no subsidiaries across any sectors.

Omni La Mansión del Rio’s LinkedIn Followers

Omni La Mansión del Rio’s official LinkedIn profile has approximately 1,224 followers.

NAICS Classification of Omni La Mansión del Rio

Omni La Mansión del Rio is classified under the NAICS code 7211, which corresponds to Traveler Accommodation.

Omni La Mansión del Rio’s Presence on Crunchbase

No, Omni La Mansión del Rio does not have a profile on Crunchbase.

Omni La Mansión del Rio’s Presence on LinkedIn

Yes, Omni La Mansión del Rio maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/omni-la-mansion-del-rio.

Cybersecurity Incidents Involving Omni La Mansión del Rio

As of April 04, 2026, Rankiteo reports that Omni La Mansión del Rio has experienced 4 cybersecurity incidents.

Number of Peer and Competitor Companies

Omni La Mansión del Rio has an estimated 14,065 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Omni La Mansión del Rio ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach and Cyber Attack.

How does Omni La Mansión del Rio detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with likely for omni hotels (2024), incident response plan activated with unknown for most organizations, and third party assistance with vendor patching (e.g., tridium), third party assistance with cybersecurity firms (e.g., claroty, nozomi networks), and containment measures with isolation of affected bms components, containment measures with disabling remote access for vendors (temporary), and remediation measures with patch management for niagara framework, remediation measures with replacement of eol systems (e.g., windows 7), remediation measures with credential rotation (default/hardcoded), and recovery measures with restoration of reservation/payment systems (omni hotels), recovery measures with manual overrides for critical systems (e.g., fire alarms), and communication strategy with limited public disclosure (omni hotels), communication strategy with internal stakeholder briefings, and network segmentation with recommended but not universally implemented, and enhanced monitoring with log centralization (currently lacking in most cases), and third party assistance with cybernews research team, and containment measures with aws bucket secured after multiple contact attempts, and third party assistance with cybernews research team, and containment measures with aws s3 bucket secured after discovery..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Data Breach at Omni Hotels & Resorts

Description: A malware intrusion affected point of sale systems, potentially compromising payment card information, including cardholder name, credit/debit card number, security code, and expiration date.

Date Detected: 2016-07-08

Date Publicly Disclosed: 2016-07-08

Type: Data Breach

Attack Vector: Malware

Incident : Cybersecurity Vulnerability Exposure

Title: Smart Building Cybersecurity Vulnerabilities and Risks (2024)

Description: The global smart building market, valued at $126.6 billion in 2024 and projected to reach $571.3 billion by 2030, faces significant cybersecurity risks due to outdated systems, legacy protocols (e.g., BACnet, Modbus), unpatched vulnerabilities, and weak access controls. Building Management Systems (BMS) linking HVAC, lighting, elevators, and fire safety are prime targets. Recent incidents, such as the 2024 Omni Hotels cyberattack, highlight disruptions to reservation systems, room key cards, and payment processing. Vulnerabilities in platforms like Tridium’s Niagara Framework (13 flaws identified by Nozomi Networks) and widespread use of unsupported OS (e.g., Windows 7) exacerbate risks. Attacks often go unnoticed, with physical malfunctions (e.g., AC failures, elevator outages) misattributed to maintenance issues. Reputational damage, insurance gaps, and operational disruptions (e.g., disabled fire alarms) pose critical threats. Mitigation requires patch management, MFA for vendor access, staff training, and layered defenses combining IT and facilities teams.

Date Publicly Disclosed: 2024-01-01

Type: Cybersecurity Vulnerability Exposure

Attack Vector: Exploitation of Legacy Protocols (BACnet, Modbus)Unpatched Known Vulnerabilities (75% of orgs affected per Claroty)Default/Hardcoded CredentialsOpen Ports/Exposed Systems (via Shodan)Third-Party Remote Access Tools (Lack of MFA)Outdated Operating Systems (e.g., Windows 7)Weak Network Segmentation (Lateral Movement to Corporate Networks)

Vulnerability Exploited: CVE in Tridium’s Niagara Framework (13 vulnerabilities, Nozomi Networks)BACnet/Modbus Protocol Flaws (No Encryption/Authentication)Unsupported Firmware/OS (EOL Systems)Improper Access Controls (Shared Credentials)

Motivation: Financial Gain (Ransomware)Operational DisruptionData TheftEspionage (State-Backed Potential)

Incident : Data Breach

Title: Millions of Job Seekers’ Resumes Exposed in Foh&Boh Data Breach

Description: A major data exposure incident involving Foh&Boh, a U.S.-based hiring and onboarding platform for restaurants, hotels, and retailers, has left 5.4 million files (primarily CVs and resumes) publicly accessible via an unsecured AWS bucket. The breach exposed sensitive personal details such as work history, contact information, and professional references. The dataset was secured after multiple attempts to contact Foh&Boh, but the exposure could enable targeted phishing attacks, identity theft, and financial fraud.

Type: Data Breach

Attack Vector: Misconfigured Cloud Storage

Vulnerability Exploited: Unsecured AWS bucket

Incident : Data Exposure

Title: Hiring Platform Foh&Boh Exposes 5.4 Million Job Seekers’ Resumes in Unsecured AWS Bucket

Description: A major data exposure incident has left the personal details of millions of job seekers vulnerable after U.S.-based hiring platform Foh&Boh accidentally left an AWS S3 bucket unsecured, containing 5.4 million files, primarily CVs and resumes. The breach exposed sensitive applicant information including work history, contact details, and personal identifiers, making individuals susceptible to targeted phishing, identity theft, and financial fraud.

Type: Data Exposure

Attack Vector: Misconfigured AWS S3 bucket

Vulnerability Exploited: Unsecured cloud storage

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Exposed BMS via ShodanVendor Remote Access ToolsOpen Ports in Legacy Systems.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach OMN854080425

Data Compromised: Cardholder name, Credit/debit card number, Security code, Expiration date

Systems Affected: point of sale systems

Payment Information Risk: True

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Systems Affected: Building Management Systems (BMS)HVAC ControlsLighting SystemsElevatorsFire Safety SystemsSecurity CamerasAccess Control (Door/Keycard Systems)Reservation/Payment Systems (e.g., Omni Hotels)

Downtime: ['Undisclosed (Potential Prolonged Due to Unnoticed Intrusions)', 'Omni Hotels: Reservation/Check-in/Payment Disruptions (2024)']

Operational Impact: Physical Safety Risks (e.g., Disabled Fire Alarms)Maintenance Misattribution (AC/Elevator Failures)Tenant Trust ErosionProperty Value Decline

Customer Complaints: ['Potential Increase Due to Service Disruptions (e.g., Omni Hotels)']

Brand Reputation Impact: High (Loss of Tenant/Customer Trust)Deterrent for New Occupants

Legal Liabilities: Potential Lawsuits from Safety Incidents (e.g., Fire Alarm Failures)Regulatory Non-Compliance (Data Breaches)

Payment Information Risk: ['Exposed in Omni Hotels Incident (2024)']

Incident : Data Breach FOHKFCNORHYAOMN1769001235

Data Compromised: 5.4 million files (CVs and resumes)

Systems Affected: AWS bucket

Brand Reputation Impact: Potential reputational damage to Foh&Boh and its clients

Identity Theft Risk: High (synthetic identity fraud, financial fraud)

Incident : Data Exposure FOHNORHYAOMN1769001286

Data Compromised: 5.4 million files (CVs and resumes)

Systems Affected: AWS S3 bucket

Brand Reputation Impact: Yes

Identity Theft Risk: Yes

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Payment Card Information, , Potential: Building Occupancy Patterns, Payment Data (Omni Hotels), Pii (If Facial Recognition Used), , Cvs, Resumes, , Cvs, Resumes, Work History, Contact Details, Personal Identifiers and .

Which entities were affected by each incident ?

Incident : Data Breach OMN854080425

Entity Name: Omni Hotels & Resorts

Entity Type: Hospitality

Industry: Hospitality

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Entity Name: Omni Hotels & Resorts

Entity Type: Hospitality

Industry: Hotel Management

Location: Global (Primary: North America)

Size: Large Enterprise

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Entity Name: Organizations Using Tridium’s Niagara Framework

Entity Type: Commercial Real Estate, Industrial Facilities, Critical Infrastructure

Industry: Building Automation

Location: Global

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Entity Name: Buildings with Legacy BMS (BACnet/Modbus)

Entity Type: Office Buildings, Hospitals, Educational Institutions, Retail Spaces

Industry: Real Estate

Location: Global

Incident : Data Breach FOHKFCNORHYAOMN1769001235

Entity Name: Foh&Boh

Entity Type: Hiring and Onboarding Platform

Industry: Human Resources, Hospitality, Retail

Location: U.S.

Customers Affected: Job seekers (number unspecified)

Incident : Data Breach FOHKFCNORHYAOMN1769001235

Entity Name: Taco Bell

Entity Type: Restaurant Chain

Industry: Food Service

Location: U.S.

Incident : Data Breach FOHKFCNORHYAOMN1769001235

Entity Name: KFC

Entity Type: Restaurant Chain

Industry: Food Service

Location: U.S.

Incident : Data Breach FOHKFCNORHYAOMN1769001235

Entity Name: Omni Hotels & Resorts

Entity Type: Hotel Chain

Industry: Hospitality

Location: U.S.

Incident : Data Breach FOHKFCNORHYAOMN1769001235

Entity Name: Nordstrom

Entity Type: Retailer

Industry: Retail

Location: U.S.

Incident : Data Breach FOHKFCNORHYAOMN1769001235

Entity Name: Hyatt Grand

Entity Type: Hotel Chain

Industry: Hospitality

Location: U.S.

Incident : Data Exposure FOHNORHYAOMN1769001286

Entity Name: Foh&Boh

Entity Type: Hiring Platform

Industry: Recruitment/Human Resources

Location: U.S.

Customers Affected: 5.4 million job seekers

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Incident Response Plan Activated: ['Likely for Omni Hotels (2024)', 'Unknown for Most Organizations']

Third Party Assistance: Vendor Patching (E.G., Tridium), Cybersecurity Firms (E.G., Claroty, Nozomi Networks).

Containment Measures: Isolation of Affected BMS ComponentsDisabling Remote Access for Vendors (Temporary)

Remediation Measures: Patch Management for Niagara FrameworkReplacement of EOL Systems (e.g., Windows 7)Credential Rotation (Default/Hardcoded)

Recovery Measures: Restoration of Reservation/Payment Systems (Omni Hotels)Manual Overrides for Critical Systems (e.g., Fire Alarms)

Communication Strategy: Limited Public Disclosure (Omni Hotels)Internal Stakeholder Briefings

Network Segmentation: ['Recommended but Not Universally Implemented']

Enhanced Monitoring: Log Centralization (Currently Lacking in Most Cases)

Incident : Data Breach FOHKFCNORHYAOMN1769001235

Third Party Assistance: Cybernews research team

Containment Measures: AWS bucket secured after multiple contact attempts

Incident : Data Exposure FOHNORHYAOMN1769001286

Third Party Assistance: Cybernews research team

Containment Measures: AWS S3 bucket secured after discovery

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Likely for Omni Hotels (2024), Unknown for Most Organizations, .

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Vendor Patching (e.g., Tridium), Cybersecurity Firms (e.g., Claroty, Nozomi Networks), , Cybernews research team, Cybernews research team.

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach OMN854080425

Type of Data Compromised: Payment card information

Sensitivity of Data: High

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Type of Data Compromised: Potential: building occupancy patterns, Payment data (omni hotels), Pii (if facial recognition used)

Sensitivity of Data: Medium to High (Operational + Potential PII)

Data Exfiltration: Possible in Unnoticed Intrusions

Data Encryption: ['Likely Absent in Legacy Protocols (BACnet/Modbus)']

Personally Identifiable Information: Potential (If Biometric/Facial Recognition Deployed)

Incident : Data Breach FOHKFCNORHYAOMN1769001235

Type of Data Compromised: Cvs, Resumes

Number of Records Exposed: 5.4 million files

Sensitivity of Data: High (work history, contact information, professional references)

Personally Identifiable Information: Yes (contact information, work history, professional references)

Incident : Data Exposure FOHNORHYAOMN1769001286

Type of Data Compromised: Cvs, Resumes, Work history, Contact details, Personal identifiers

Number of Records Exposed: 5.4 million files

Sensitivity of Data: High

File Types Exposed: PDFDOCDOCX

Personally Identifiable Information: Yes

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Patch Management for Niagara Framework, Replacement of EOL Systems (e.g., Windows 7), Credential Rotation (Default/Hardcoded), .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by isolation of affected bms components, disabling remote access for vendors (temporary), , aws bucket secured after multiple contact attempts and aws s3 bucket secured after discovery.

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Data Encryption: ['Possible in Future Attacks']

Data Exfiltration: ['Double Extortion Risk']

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Restoration of Reservation/Payment Systems (Omni Hotels), Manual Overrides for Critical Systems (e.g., Fire Alarms), .

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Regulations Violated: Potential: GDPR (If PII Compromised), Industry-Specific OT Security Standards,

Regulatory Notifications: Unknown (Likely Required for Data Breaches)

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Lessons Learned: Legacy BMS Protocols (BACnet/Modbus) Are Critical Attack Vectors, Unpatched Systems Enable Prolonged, Unnoticed Intrusions, Physical Malfunctions May Indicate Cyber Incidents, Vendor Remote Access Requires MFA and Monitoring, Insurance Gaps Exist for OT-Centric Cyberattacks, Cross-Team Collaboration (IT + Facilities) Is Essential

Incident : Data Breach FOHKFCNORHYAOMN1769001235

Lessons Learned: Risks of misconfigured cloud storage; need for stricter access controls, encryption, and retrospective log reviews.

Incident : Data Exposure FOHNORHYAOMN1769001286

Lessons Learned: Persistent risks of misconfigured cloud storage and preventable security failures.

What recommendations were made to prevent future incidents ?

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Recommendations: Immediate Patch Management for Known Vulnerabilities (e.g., Niagara Framework), Replace/Upgrade EOL Systems (e.g., Windows 7, Unsupported Firmware), Implement Network Segmentation Between BMS and Corporate IT, Enforce MFA for All Remote Access (Vendors/Staff), Centralize and Monitor BMS Logs for Anomalies, Train Facilities Staff to Recognize Cyber-Physical Warning Signs, Conduct Regular OT Security Audits (e.g., Shodan Exposure Checks), Review Insurance Policies for Cyber-OT Coverage Gaps, Adopt Zero Trust Principles for Building Automation Systems, Develop Joint IT-Facilities Incident Response PlaybooksImmediate Patch Management for Known Vulnerabilities (e.g., Niagara Framework), Replace/Upgrade EOL Systems (e.g., Windows 7, Unsupported Firmware), Implement Network Segmentation Between BMS and Corporate IT, Enforce MFA for All Remote Access (Vendors/Staff), Centralize and Monitor BMS Logs for Anomalies, Train Facilities Staff to Recognize Cyber-Physical Warning Signs, Conduct Regular OT Security Audits (e.g., Shodan Exposure Checks), Review Insurance Policies for Cyber-OT Coverage Gaps, Adopt Zero Trust Principles for Building Automation Systems, Develop Joint IT-Facilities Incident Response PlaybooksImmediate Patch Management for Known Vulnerabilities (e.g., Niagara Framework), Replace/Upgrade EOL Systems (e.g., Windows 7, Unsupported Firmware), Implement Network Segmentation Between BMS and Corporate IT, Enforce MFA for All Remote Access (Vendors/Staff), Centralize and Monitor BMS Logs for Anomalies, Train Facilities Staff to Recognize Cyber-Physical Warning Signs, Conduct Regular OT Security Audits (e.g., Shodan Exposure Checks), Review Insurance Policies for Cyber-OT Coverage Gaps, Adopt Zero Trust Principles for Building Automation Systems, Develop Joint IT-Facilities Incident Response PlaybooksImmediate Patch Management for Known Vulnerabilities (e.g., Niagara Framework), Replace/Upgrade EOL Systems (e.g., Windows 7, Unsupported Firmware), Implement Network Segmentation Between BMS and Corporate IT, Enforce MFA for All Remote Access (Vendors/Staff), Centralize and Monitor BMS Logs for Anomalies, Train Facilities Staff to Recognize Cyber-Physical Warning Signs, Conduct Regular OT Security Audits (e.g., Shodan Exposure Checks), Review Insurance Policies for Cyber-OT Coverage Gaps, Adopt Zero Trust Principles for Building Automation Systems, Develop Joint IT-Facilities Incident Response PlaybooksImmediate Patch Management for Known Vulnerabilities (e.g., Niagara Framework), Replace/Upgrade EOL Systems (e.g., Windows 7, Unsupported Firmware), Implement Network Segmentation Between BMS and Corporate IT, Enforce MFA for All Remote Access (Vendors/Staff), Centralize and Monitor BMS Logs for Anomalies, Train Facilities Staff to Recognize Cyber-Physical Warning Signs, Conduct Regular OT Security Audits (e.g., Shodan Exposure Checks), Review Insurance Policies for Cyber-OT Coverage Gaps, Adopt Zero Trust Principles for Building Automation Systems, Develop Joint IT-Facilities Incident Response PlaybooksImmediate Patch Management for Known Vulnerabilities (e.g., Niagara Framework), Replace/Upgrade EOL Systems (e.g., Windows 7, Unsupported Firmware), Implement Network Segmentation Between BMS and Corporate IT, Enforce MFA for All Remote Access (Vendors/Staff), Centralize and Monitor BMS Logs for Anomalies, Train Facilities Staff to Recognize Cyber-Physical Warning Signs, Conduct Regular OT Security Audits (e.g., Shodan Exposure Checks), Review Insurance Policies for Cyber-OT Coverage Gaps, Adopt Zero Trust Principles for Building Automation Systems, Develop Joint IT-Facilities Incident Response PlaybooksImmediate Patch Management for Known Vulnerabilities (e.g., Niagara Framework), Replace/Upgrade EOL Systems (e.g., Windows 7, Unsupported Firmware), Implement Network Segmentation Between BMS and Corporate IT, Enforce MFA for All Remote Access (Vendors/Staff), Centralize and Monitor BMS Logs for Anomalies, Train Facilities Staff to Recognize Cyber-Physical Warning Signs, Conduct Regular OT Security Audits (e.g., Shodan Exposure Checks), Review Insurance Policies for Cyber-OT Coverage Gaps, Adopt Zero Trust Principles for Building Automation Systems, Develop Joint IT-Facilities Incident Response PlaybooksImmediate Patch Management for Known Vulnerabilities (e.g., Niagara Framework), Replace/Upgrade EOL Systems (e.g., Windows 7, Unsupported Firmware), Implement Network Segmentation Between BMS and Corporate IT, Enforce MFA for All Remote Access (Vendors/Staff), Centralize and Monitor BMS Logs for Anomalies, Train Facilities Staff to Recognize Cyber-Physical Warning Signs, Conduct Regular OT Security Audits (e.g., Shodan Exposure Checks), Review Insurance Policies for Cyber-OT Coverage Gaps, Adopt Zero Trust Principles for Building Automation Systems, Develop Joint IT-Facilities Incident Response PlaybooksImmediate Patch Management for Known Vulnerabilities (e.g., Niagara Framework), Replace/Upgrade EOL Systems (e.g., Windows 7, Unsupported Firmware), Implement Network Segmentation Between BMS and Corporate IT, Enforce MFA for All Remote Access (Vendors/Staff), Centralize and Monitor BMS Logs for Anomalies, Train Facilities Staff to Recognize Cyber-Physical Warning Signs, Conduct Regular OT Security Audits (e.g., Shodan Exposure Checks), Review Insurance Policies for Cyber-OT Coverage Gaps, Adopt Zero Trust Principles for Building Automation Systems, Develop Joint IT-Facilities Incident Response PlaybooksImmediate Patch Management for Known Vulnerabilities (e.g., Niagara Framework), Replace/Upgrade EOL Systems (e.g., Windows 7, Unsupported Firmware), Implement Network Segmentation Between BMS and Corporate IT, Enforce MFA for All Remote Access (Vendors/Staff), Centralize and Monitor BMS Logs for Anomalies, Train Facilities Staff to Recognize Cyber-Physical Warning Signs, Conduct Regular OT Security Audits (e.g., Shodan Exposure Checks), Review Insurance Policies for Cyber-OT Coverage Gaps, Adopt Zero Trust Principles for Building Automation Systems, Develop Joint IT-Facilities Incident Response Playbooks

Incident : Data Breach FOHKFCNORHYAOMN1769001235

Recommendations: Stricter access controls, Encryption, Retrospective log reviewsStricter access controls, Encryption, Retrospective log reviewsStricter access controls, Encryption, Retrospective log reviews

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Legacy BMS Protocols (BACnet/Modbus) Are Critical Attack Vectors,Unpatched Systems Enable Prolonged, Unnoticed Intrusions,Physical Malfunctions May Indicate Cyber Incidents,Vendor Remote Access Requires MFA and Monitoring,Insurance Gaps Exist for OT-Centric Cyberattacks,Cross-Team Collaboration (IT + Facilities) Is EssentialRisks of misconfigured cloud storage; need for stricter access controls, encryption, and retrospective log reviews.Persistent risks of misconfigured cloud storage and preventable security failures.

References

Where can I find more information about each incident ?

Incident : Data Breach OMN854080425

Source: California Office of the Attorney General

Date Accessed: 2016-07-08

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Source: Claroty Research Report

URL: https://www.claroty.com

Date Accessed: 2024-01-01

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Source: Nozomi Networks: Tridium Niagara Vulnerabilities

URL: https://www.nozominetworks.com

Date Accessed: 2024-01-01

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Source: Royal Institution of Chartered Surveyors (RICS) Warning

URL: https://www.rics.org

Date Accessed: 2024-01-01

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Source: Omni Hotels Cyberattack (2024) News Coverage

URL: https://www.omnihotels.com/press

Date Accessed: 2024-01-01

Incident : Data Breach FOHKFCNORHYAOMN1769001235

Source: Cybernews

Incident : Data Exposure FOHNORHYAOMN1769001286

Source: Cybernews

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2016-07-08, and Source: Claroty Research ReportUrl: https://www.claroty.comDate Accessed: 2024-01-01, and Source: Nozomi Networks: Tridium Niagara VulnerabilitiesUrl: https://www.nozominetworks.comDate Accessed: 2024-01-01, and Source: Royal Institution of Chartered Surveyors (RICS) WarningUrl: https://www.rics.orgDate Accessed: 2024-01-01, and Source: Omni Hotels Cyberattack (2024) News CoverageUrl: https://www.omnihotels.com/pressDate Accessed: 2024-01-01, and Source: Cybernews, and Source: Cybernews.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Investigation Status: ['Ongoing for Industry-Wide Risks', 'Resolved for Omni Hotels (Assumed)']

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Limited Public Disclosure (Omni Hotels) and Internal Stakeholder Briefings.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Stakeholder Advisories: Urgent: Building Owners/Operators, Moderate: Tenants/Insurance Providers.

Customer Advisories: Omni Hotels: Limited Public Notification (2024)

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Urgent: Building Owners/Operators, Moderate: Tenants/Insurance Providers, Omni Hotels: Limited Public Notification (2024) and .

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Entry Point: Exposed Bms Via Shodan, Vendor Remote Access Tools, Open Ports In Legacy Systems,

Reconnaissance Period: ['Potentially Months/Years (Unnoticed Intrusions)']

Backdoors Established: ['Likely in Unpatched Systems']

High Value Targets: Hvac (Disruption Potential), Fire Safety (Life Risk), Payment Systems (Financial Gain),

Data Sold on Dark Web: Hvac (Disruption Potential), Fire Safety (Life Risk), Payment Systems (Financial Gain),

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Cybersecurity Vulnerability Exposure OMN3332533102125

Root Causes: Neglected Patch Management For Ot Systems, Over-Reliance On Legacy Protocols (Bacnet/Modbus), Lack Of Ot-Specific Monitoring, Weak Vendor Access Controls, Silos Between It And Facilities Teams,

Corrective Actions: Mandatory Ot Security Training For Facilities Staff, Automated Patch Deployment For Bms Components, Ot-Focused Soc Integration, Dark Web Monitoring For Stolen Building Data, Cybersecurity Clauses In Vendor Contracts,

Incident : Data Breach FOHKFCNORHYAOMN1769001235

Root Causes: Misconfigured AWS bucket

Incident : Data Exposure FOHNORHYAOMN1769001286

Root Causes: Misconfigured AWS S3 bucket

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Vendor Patching (E.G., Tridium), Cybersecurity Firms (E.G., Claroty, Nozomi Networks), , Log Centralization (Currently Lacking In Most Cases), , Cybernews research team, Cybernews research team.

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Mandatory Ot Security Training For Facilities Staff, Automated Patch Deployment For Bms Components, Ot-Focused Soc Integration, Dark Web Monitoring For Stolen Building Data, Cybersecurity Clauses In Vendor Contracts, .

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2016-07-08.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-01-01.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were cardholder name, credit/debit card number, security code, expiration date, , 5.4 million files (CVs and resumes) and 5.4 million files (CVs and resumes).

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident were point of sale systems and Building Management Systems (BMS)HVAC ControlsLighting SystemsElevatorsFire Safety SystemsSecurity CamerasAccess Control (Door/Keycard Systems)Reservation/Payment Systems (e.g., Omni Hotels) and and .

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was vendor patching (e.g., tridium), cybersecurity firms (e.g., claroty, nozomi networks), , Cybernews research team, Cybernews research team.

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Isolation of Affected BMS ComponentsDisabling Remote Access for Vendors (Temporary), AWS bucket secured after multiple contact attempts and AWS S3 bucket secured after discovery.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 5.4 million files (CVs and resumes), expiration date, credit/debit card number, security code and cardholder name.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 10.8M.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Cross-Team Collaboration (IT + Facilities) Is Essential, Risks of misconfigured cloud storage; need for stricter access controls, encryption, and retrospective log reviews., Persistent risks of misconfigured cloud storage and preventable security failures.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Implement Network Segmentation Between BMS and Corporate IT, Retrospective log reviews, Stricter access controls, Replace/Upgrade EOL Systems (e.g., Windows 7, Unsupported Firmware), Develop Joint IT-Facilities Incident Response Playbooks, Immediate Patch Management for Known Vulnerabilities (e.g., Niagara Framework), Centralize and Monitor BMS Logs for Anomalies, Encryption, Enforce MFA for All Remote Access (Vendors/Staff), Train Facilities Staff to Recognize Cyber-Physical Warning Signs, Adopt Zero Trust Principles for Building Automation Systems, Conduct Regular OT Security Audits (e.g., Shodan Exposure Checks) and Review Insurance Policies for Cyber-OT Coverage Gaps.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Cybernews, California Office of the Attorney General, Claroty Research Report, Nozomi Networks: Tridium Niagara Vulnerabilities, Omni Hotels Cyberattack (2024) News Coverage and Royal Institution of Chartered Surveyors (RICS) Warning.

What is the most recent URL for additional resources on cybersecurity best practices ?

Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.claroty.com, https://www.nozominetworks.com, https://www.rics.org, https://www.omnihotels.com/press .

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is ['Ongoing for Industry-Wide Risks', 'Resolved for Omni Hotels (Assumed)'].

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Urgent: Building Owners/Operators, Moderate: Tenants/Insurance Providers, .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Omni Hotels: Limited Public Notification (2024).

Initial Access Broker

What was the most recent reconnaissance period for an incident ?

Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was Potentially Months/Years (Unnoticed Intrusions).

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Neglected Patch Management for OT SystemsOver-Reliance on Legacy Protocols (BACnet/Modbus)Lack of OT-Specific MonitoringWeak Vendor Access ControlsSilos Between IT and Facilities Teams, Misconfigured AWS bucket, Misconfigured AWS S3 bucket.

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Mandatory OT Security Training for Facilities StaffAutomated Patch Deployment for BMS ComponentsOT-Focused SOC IntegrationDark Web Monitoring for Stolen Building DataCybersecurity Clauses in Vendor Contracts.

cve

Latest Global CVEs (Not Company-Specific)

Description

nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, two peer-facing consensus request handlers assume that the history index is always available and call blockchain.history_store.history_index().unwrap() directly. That assumption is false by construction. HistoryStoreProxy::history_index() explicitly returns None for the valid HistoryStoreProxy::WithoutIndex state. when a full node is syncing or otherwise running without the history index, a remote peer can send RequestTransactionsProof or RequestTransactionReceiptsByAddress and trigger an Option::unwrap() panic on the request path. This issue has been patched in version 1.3.0.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redirects=True. An attacker who controls the URL can reach any host accessible from the server including cloud metadata services and internal network services. This issue has been patched in version 1.5.95.

Risk Information
cvss3
Base: 8.6
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Description

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered agents, and send arbitrary messages to agents and their tool sets. This issue has been patched in version 4.5.97.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.search_tools() compiles a caller-supplied string directly as a Python regular expression with no validation, sanitization, or timeout. A crafted regex causes catastrophic backtracking in the re engine, blocking the Python thread for hundreds of seconds and causing a complete service outage. This issue has been patched in version 4.5.90.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=omni-la-mansion-del-rio' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge