Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Cyberattack cripples InterContinental Hotels
1 min Security

Cyberattack cripples InterContinental Hotels

Geert van der KlugtSeptember 7, 2022 12:42 pmSeptember 8, 2022
Cyberattack cripples InterContinental Hotels

International hotel chain InterContinental Hotels Group (IHG) was hit by a cyberattack that has taken down its entire booking system.

In a statement to the London Stock Exchange, IHG reveals it’s dealing with a major global outage. The hotel chain’s mobile apps are currently offline. The outage was caused by “unauthorized activity”, more commonly known as a cyberattack.

Cause unclear

The cause of the attack was not disclosed. IHG says it’s busy restoring affected systems, which indicates the possibility of ransomware. Last month, ransomware group LockBit claimed a successful attack on a Holiday Inn division of IHG in Istanbul.

IHG-2

Recovery efforts

The hotel chain says that it’s cooperating with third-party experts and technology providers to recover the systems. Furthermore, the relevant authorities were notified of the attack.

IHG-3

Research by security firm Hudson Rock indicates the attack leaked the login data of 15 employees. Furthermore, the login details of 4,042 IHG users were reportedly breached. Hudson Rock says the number of compromised URLs totals 807.

Tags:

ihg / intercontinental hotels / lockbit 3.0 / Login / ransomware

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

LockBit’s claim of large-scale attack on Federal Reserve turns out to be false

Return of LockBit 3.0 causes spike in ransomware attacks in May

LockBit falters under pressure from competitors and copycats

LockBit 3.0 steals financial data from Subway

Editor picks

Intel nears SambaNova deal, where CEO Lip-Bu Tan is already chairman

Through a non-binding agreement, Intel is about to acquire SambaNova ...

NetSuite Next brings AI-first transformation to the ERP platform

"The next generation of computer software applications you will talk to"

Is React2Shell the new Log4Shell?

A vulnerability in the ubiquitous logging software Log4j caused immed...

NorthC acquired by investor Antin

Antin Infrastructure Partners is acquiring Dutch company NorthC Datac...

Techzine.tv

Nutanix CTO explains their VMware alternative and multi-cloud strategy

Nutanix CTO explains their VMware alternative and multi-cloud strategy

Why your SOC needs a ROC, according to Qualys

Why your SOC needs a ROC, according to Qualys

Slack is evolving into a work operating system

Slack is evolving into a work operating system

Why 90% of Salesforce Agentforce deployments start with service

Why 90% of Salesforce Agentforce deployments start with service

Read more on Security

OpenAI warns of cyber risks posed by new AI models

OpenAI warns of cyber risks posed by new AI models

OpenAI announced Wednesday that it is establishing a new advisory board, the Frontier Risk Council, as part o...

Mels Dees 2 hours ago
Is React2Shell the new Log4Shell?
Top story

Is React2Shell the new Log4Shell?

A vulnerability in the ubiquitous logging software Log4j caused immediate turmoil when it was revealed at the...

Erik van Klinken December 8, 2025
Microsoft gives guidance on Shai-Hulud 2.0 supply chain attack

Microsoft gives guidance on Shai-Hulud 2.0 supply chain attack

The return of the Shai-Hulud supply chain attack was dubbed 'The Second Coming' shortly after the first warni...

Erik van Klinken 1 day ago
Wiz builds ‘horizontal security model’ based on Security Graph
Top story

Wiz builds ‘horizontal security model’ based on Security Graph

"Maniacal" focus on underlying graph database takes Wiz far

Sander Almekinders November 27, 2025

Expert Talks

How our team optimizes infrastructure for minimal AI video processing latency 

How our team optimizes infrastructure for minimal AI video processing latency 

Over the past year, AI-generated video diffusion models have enabled ...

Redefining the Software Development Lifecycle in the Age of AI

Redefining the Software Development Lifecycle in the Age of AI

For developers, the best coding happens when they’re in a state of ...

AI Integrity: The Invisible Threat Organizations Can’t Ignore

AI systems are increasingly making decisions that impact people, proc...

Three Ways Secure Modern Networks Unlock the True Power of AI

AI is rapidly becoming the main driver of innovation for businesses, ...

Tech calendar

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

GITEX ASIA 2026

April 8, 2026 Singapore

SAS Innovate 2026

April 27, 2026 Grapevine

Team '26

May 5, 2026 Anaheim

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement