Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Cyberattack cripples InterContinental Hotels
1 min Security

Cyberattack cripples InterContinental Hotels

Geert van der KlugtSeptember 7, 2022 12:42 pmSeptember 8, 2022
Cyberattack cripples InterContinental Hotels

International hotel chain InterContinental Hotels Group (IHG) was hit by a cyberattack that has taken down its entire booking system.

In a statement to the London Stock Exchange, IHG reveals it’s dealing with a major global outage. The hotel chain’s mobile apps are currently offline. The outage was caused by “unauthorized activity”, more commonly known as a cyberattack.

Cause unclear

The cause of the attack was not disclosed. IHG says it’s busy restoring affected systems, which indicates the possibility of ransomware. Last month, ransomware group LockBit claimed a successful attack on a Holiday Inn division of IHG in Istanbul.

IHG-2

Recovery efforts

The hotel chain says that it’s cooperating with third-party experts and technology providers to recover the systems. Furthermore, the relevant authorities were notified of the attack.

IHG-3

Research by security firm Hudson Rock indicates the attack leaked the login data of 15 employees. Furthermore, the login details of 4,042 IHG users were reportedly breached. Hudson Rock says the number of compromised URLs totals 807.

Tags:

ihg / intercontinental hotels / lockbit 3.0 / Login / ransomware

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

LockBit’s claim of large-scale attack on Federal Reserve turns out to be false

Return of LockBit 3.0 causes spike in ransomware attacks in May

LockBit falters under pressure from competitors and copycats

LockBit 3.0 steals financial data from Subway

Editor picks

Nvidia pays Groq $20B without technically acquiring it

What's going on?

MongoBleed threatens databases, but detection tool is available

An open-source detection tool should help organizations detect exploi...

Nvidia finalizes Intel share purchase, gains billions already

Nvidia has purchased $7.58 billion worth of Intel shares at a low pri...

Techzine.tv

Why your SOC needs a ROC, according to Qualys

Why your SOC needs a ROC, according to Qualys

MuleSoft agent fabric: governing AI agents across platforms

MuleSoft agent fabric: governing AI agents across platforms

AFX is NetApp's data platform of the future with integrated AI data prep

AFX is NetApp's data platform of the future with integrated AI data prep

Salesforce reveals its own Agentic IT Service Platform

Salesforce reveals its own Agentic IT Service Platform

Read more on Security

Sophos CEO sees “cybersecurity poverty line”: what to do about it?
Top story

Sophos CEO sees “cybersecurity poverty line”: what to do about it?

We sit down with Sophos CEO Joe Levy during Pax8 Beyond to discuss, among other things, the progress of the S...

Sander Almekinders December 11, 2025
MongoBleed threatens databases, but detection tool is available

MongoBleed threatens databases, but detection tool is available

An open-source detection tool should help organizations detect exploitation of MongoBleed (CVE-2025-14847). T...

Erik van Klinken 22 hours ago
Attackers exploit five-year-old Fortinet vulnerability

Attackers exploit five-year-old Fortinet vulnerability

Fortinet warns of active attacks on a five-year-old vulnerability in FortiOS. The vulnerability makes it poss...

Erik van Klinken 19 hours ago
Why did so many security vendors abandon MITRE’s stresstest?
Top story

Why did so many security vendors abandon MITRE’s stresstest?

This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...

Erik van Klinken December 12, 2025

Expert Talks

Digital sovereignty: from buzzword to business imperative

Digital sovereignty: from buzzword to business imperative

Digital sovereignty has outgrown its niche as an IT concern and is no...

Why specialized LLMs are the future of generativeAI

Why specialized LLMs are the future of generativeAI

ChatGPT and the other GenAI chatbots that have taken the tech world b...

The year of the AI agents: why 2026 is about value, not technology

Microsoft has declared 2026 to be the year of the agent. This is not ...

ARTPEC-9 and Axis Edge Vault: a unified hardware-rooted framework for cybersecure surveillance

As cyber threats grow in scale and complexity, protecting network-con...

Tech calendar

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

GITEX ASIA 2026

April 8, 2026 Singapore

SAS Innovate 2026

April 27, 2026 Grapevine

Team '26

May 5, 2026 Anaheim

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement