Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Cyberattack cripples InterContinental Hotels
1 min Security

Cyberattack cripples InterContinental Hotels

Geert van der KlugtSeptember 7, 2022 12:42 pmSeptember 8, 2022
Cyberattack cripples InterContinental Hotels

International hotel chain InterContinental Hotels Group (IHG) was hit by a cyberattack that has taken down its entire booking system.

In a statement to the London Stock Exchange, IHG reveals it’s dealing with a major global outage. The hotel chain’s mobile apps are currently offline. The outage was caused by “unauthorized activity”, more commonly known as a cyberattack.

Cause unclear

The cause of the attack was not disclosed. IHG says it’s busy restoring affected systems, which indicates the possibility of ransomware. Last month, ransomware group LockBit claimed a successful attack on a Holiday Inn division of IHG in Istanbul.

IHG-2

Recovery efforts

The hotel chain says that it’s cooperating with third-party experts and technology providers to recover the systems. Furthermore, the relevant authorities were notified of the attack.

IHG-3

Research by security firm Hudson Rock indicates the attack leaked the login data of 15 employees. Furthermore, the login details of 4,042 IHG users were reportedly breached. Hudson Rock says the number of compromised URLs totals 807.

Tags:

ihg / intercontinental hotels / lockbit 3.0 / Login / ransomware

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

LockBit’s claim of large-scale attack on Federal Reserve turns out to be false

Return of LockBit 3.0 causes spike in ransomware attacks in May

LockBit falters under pressure from competitors and copycats

LockBit 3.0 steals financial data from Subway

Editor picks

Basware: SAP migrations fail due to Accounts Payable issues

Many companies forget to include their invoice processing in their SA...

Claude can now scan for complex vulnerabilities, but who will find them?

Anthropic has launched Claude Code Security, albeit in limited previe...

Metadata, cloud sovereignty’s weak spot

US authorities could access the metadata of public cloud users, even ...

ASML achieves EUV breakthrough: 50 percent more chips in the foreseeable future

ASML has achieved a technological breakthrough that could increase ch...

Techzine.tv

Sophos CEO sees "cybersecurity poverty line": what to do about it?

Sophos CEO sees "cybersecurity poverty line": what to do about it?

From MSP to MIP: Pax8's vision for Managed Intelligence Providers

From MSP to MIP: Pax8's vision for Managed Intelligence Providers

MuleSoft agent fabric: governing AI agents across platforms

MuleSoft agent fabric: governing AI agents across platforms

How Cisco's AI Canvas is revolutionizing network troubleshooting

How Cisco's AI Canvas is revolutionizing network troubleshooting

Read more on Security

Tonic Security mobilizes agents to fix vulnerabilities

Tonic Security mobilizes agents to fix vulnerabilities

Tonic Security has launched what it calls the industry's first Agentic Mobilization Coordinator. The AI-drive...

Erik van Klinken 9 hours ago
Claude can now scan for complex vulnerabilities, but who will find them?
Top story

Claude can now scan for complex vulnerabilities, but who will find them?

Anthropic has launched Claude Code Security, albeit in limited preview mode. The tool enables security teams ...

Erik van Klinken 2 days ago
ISO 27001 inspires confidence, but it is only the beginning
Top story

ISO 27001 inspires confidence, but it is only the beginning

ISO 27001 certification is anything but easy. Nevertheless, security standards create a false sense of securi...

Erik van Klinken February 9, 2026
Arctic Wolf strengthens exposure management with Sevco

Arctic Wolf strengthens exposure management with Sevco

Arctic Wolf has acquired US-based Sevco Security. With this acquisition, the security operations provider aim...

Mels Dees 13 hours ago

Expert Talks

4 steps to create a future-proof data infrastructure

4 steps to create a future-proof data infrastructure

A future-proof IT infrastructure is often positioned as a universal s...

Secure networking: the foundation for the AI era

Secure networking: the foundation for the AI era

As organizations get ready to roll out AI to change their business pr...

Why AI adoption requires a dedicated approach to cyber governance

AI tools are spreading through the enterprise ecosystem at an astonis...

Professional print materials for European tech events, why booth design still makes the difference

When you participate in a major tech event, you naturally want to sta...

Tech calendar

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

De IT Afdeling van de toekomst

March 31, 2026 Naaldwijk

GITEX ASIA 2026

April 8, 2026 Singapore

Southeast Asia AI Application Summit 2026

April 23, 2026 Bangkok

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement