Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Cyberattack cripples InterContinental Hotels
1 min Security

Cyberattack cripples InterContinental Hotels

Geert van der KlugtSeptember 7, 2022 12:42 pmSeptember 8, 2022
Cyberattack cripples InterContinental Hotels

International hotel chain InterContinental Hotels Group (IHG) was hit by a cyberattack that has taken down its entire booking system.

In a statement to the London Stock Exchange, IHG reveals it’s dealing with a major global outage. The hotel chain’s mobile apps are currently offline. The outage was caused by “unauthorized activity”, more commonly known as a cyberattack.

Cause unclear

The cause of the attack was not disclosed. IHG says it’s busy restoring affected systems, which indicates the possibility of ransomware. Last month, ransomware group LockBit claimed a successful attack on a Holiday Inn division of IHG in Istanbul.

IHG-2

Recovery efforts

The hotel chain says that it’s cooperating with third-party experts and technology providers to recover the systems. Furthermore, the relevant authorities were notified of the attack.

IHG-3

Research by security firm Hudson Rock indicates the attack leaked the login data of 15 employees. Furthermore, the login details of 4,042 IHG users were reportedly breached. Hudson Rock says the number of compromised URLs totals 807.

Tags:

ihg / intercontinental hotels / lockbit 3.0 / Login / ransomware

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

LockBit’s claim of large-scale attack on Federal Reserve turns out to be false

Return of LockBit 3.0 causes spike in ransomware attacks in May

LockBit falters under pressure from competitors and copycats

LockBit 3.0 steals financial data from Subway

Editor picks

Red Hat makes Ansible the execution layer for agentic AI systems

Ansible plays pivotal role in Cisco's full-stack approach

Play Store revamp for developers: lower fees, more choice

Google has announced a thorough overhaul of the Play Store business m...

OpenAI launches GPT-5.4: reasoning, coding, and computer use in one

OpenAI's latest model sounds like a jack of all trades. GPT-5.4 follo...

Microsoft is mulling an E7 tier for AI agents

Microsoft is reportedly working on a new Microsoft 365 subscription, ...

Techzine.tv

Workday Rising EMEA: platform transformation: Pipedream, AI agents and sovereignty

Workday Rising EMEA: platform transformation: Pipedream, AI agents and sovereignty

Cisco's 102.4 terabit chip supercharges AI data centers

Cisco's 102.4 terabit chip supercharges AI data centers

Inside Cisco's AI-powered customer experience strategy

Inside Cisco's AI-powered customer experience strategy

Why Salesforce built three levels of AI commerce agents

Why Salesforce built three levels of AI commerce agents

Read more on Security

Wiz sees big impact of AI on runtime security, but also stresses old threats
Top story

Wiz sees big impact of AI on runtime security, but also stresses old threats

Cloud security has evolved beyond a specialized domain to encompass virtually all aspects of modern cybersecu...

Sander Almekinders March 2, 2026
Fake installation pages Claude Code spreads infostealer

Fake installation pages Claude Code spreads infostealer

Security researchers at Push Security have discovered a new technique they call InstallFix. Attackers clone i...

Berry Zwets March 6, 2026
Claude can now scan for complex vulnerabilities, but who will find them?
Top story

Claude can now scan for complex vulnerabilities, but who will find them?

Anthropic has launched Claude Code Security, albeit in limited preview mode. The tool enables security teams ...

Erik van Klinken February 23, 2026
Mass attack by Russian hackers on Dutch military personnel and civil servants

Mass attack by Russian hackers on Dutch military personnel and civil servants

The MIVD and AIVD warn of an active Russian hacking campaign targeting Signal and WhatsApp accounts of Dutch ...

Berry Zwets 17 hours ago

Expert Talks

Sovereign: the new normal for AI and cloud native (and how to make it work)

Sovereign: the new normal for AI and cloud native (and how to make it work)

As we head into KubeCon 2026 in Amsterdam, the word we keep hearing i...

A decade of Cloud Native at ING: Lessons learned, and what comes next

A decade of Cloud Native at ING: Lessons learned, and what comes next

ING’s private cloud has been around for over a decade, and its clou...

Advancing Europe’s public agenda through Open Source Software Foundations

Digital products & services shape almost every sector of modern l...

4 steps to create a future-proof data infrastructure

A future-proof IT infrastructure is often positioned as a universal s...

Tech calendar

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

De IT Afdeling van de toekomst

March 31, 2026 Naaldwijk

GITEX ASIA 2026

April 8, 2026 Singapore

GITEX ASIA 2026

April 9, 2026 Singapore

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement