Company Details
accor
100,192
2,444,544
7211
accor.com
1053
ACC_6397921
Completed

Accor Company CyberSecurity Posture
accor.comWe are Accor We are more than 290,000 hospitality experts placing people at the heart of what we do, creating emotion for our guests, and nurturing passion for service and achievement beyond limits. Building on the strength of our teams and of our fully integrated ecosystem of leading brands, personalized services & expert solutions, we break new ground to reimagine hospitality and inspire new ways to experience the world. We are dedicated to suit all desires and needs, and reinvent the guest experience every day with our 45 hotel brands across all segments- 5,600 properties around the world from luxury five-star palaces to smart economy hotels, exquisite residences to full-service resorts. Because we take care of millions of guests and each of our hotels is a world in itself, where every action counts. We strive to make positive impact both locally and globally, to ensure hospitality benefits not only the few, but all.
Company Details
accor
100,192
2,444,544
7211
accor.com
1053
ACC_6397921
Completed
Between 800 and 849

Accor Global Score (TPRM)XXXX

Description: A security compromise gained by FastBooking, a provider of hotel booking software, has impacted 100 hotels across the globe. Experts estimate that over 1000 hotels globally may be affected, with over 380 of those being in Japan alone. The number of impacted users was not disclosed by the company. The company swiftly emailed each affected hotel with information on the event, including the number of guests who were impacted. The attackers gained access to the FastBooking system by taking advantage of a flaw in the online application. Employees of the organisation found the breach when they saw the malware on the server. The malware functions as a backdoor, giving the attacker access to take over the server and take private information.


No incidents recorded for Accor in 2025.
No incidents recorded for Accor in 2025.
No incidents recorded for Accor in 2025.
Accor cyber incidents detection timeline including parent company and subsidiaries

We are Accor We are more than 290,000 hospitality experts placing people at the heart of what we do, creating emotion for our guests, and nurturing passion for service and achievement beyond limits. Building on the strength of our teams and of our fully integrated ecosystem of leading brands, personalized services & expert solutions, we break new ground to reimagine hospitality and inspire new ways to experience the world. We are dedicated to suit all desires and needs, and reinvent the guest experience every day with our 45 hotel brands across all segments- 5,600 properties around the world from luxury five-star palaces to smart economy hotels, exquisite residences to full-service resorts. Because we take care of millions of guests and each of our hotels is a world in itself, where every action counts. We strive to make positive impact both locally and globally, to ensure hospitality benefits not only the few, but all.


CCIL - Country Club India Ltd is one of the fastest growing entertainment and leisure conglomerate in India. A Multi-Million dollar entity and a listed company on BSE (Bombay Stock Exchange), CCIL is a pioneer in the concept of family clubbing in the country. CCIL has established 205 properties of w

Mandarin Oriental Hotel Group is the award-winning owner and operator of some of the world’s most luxurious hotels, resorts and residences. Having grown from its Asian roots into a global brand, the Group now operates 43 hotels, 12 residences and 23 exclusive homes in 26 countries and territories, w

No loud pretense. No excess formalities. Just understated elegance you’ll feel the moment you walk into one of over 80 worldwide destinations. JW Marriott is part of Marriott International’s luxury portfolio and consists of beautiful properties in gateway cities and distinctive resort locations in

Welcome to Meliá Hotels International! From Mallorca to the world, our story is an exciting journey that began more than six decades ago and has led us to become one of the largest hotel chains on the planet and the most sustainable in Europe (S&P Global). With more than 400 hotels across the worl

Kerzner International has built a diverse collection of iconic brands and luxury properties, earning international acclaim for pioneering destination-defining hospitality, delivering unrivalled service, and curating transformative guest experiences. We are renowned for creating hospitality brands

Jumeirah, a global leader in luxury hospitality and a member of Dubai Holding, operates an exceptional portfolio of 31 properties, including 33 signature F&B restaurants, across the Middle East, Europe, Asia and Africa. In 1999, Jumeirah changed the face of luxury hospitality with the opening of t

DoubleTree by Hilton hotels are distinctively designed properties that provide true comfort to today’s business and leisure travelers. From the millions of delighted hotel guests who are welcomed with the brand’s legendary, warm chocolate chip cookies at check-in to the advantages of the award-winni

Caesars Entertainment, Inc. is the largest casino-entertainment Company in the U.S. and one of the world's most diversified casino-entertainment providers. Since its beginning in Reno, NV, in 1937, Caesars Entertainment, Inc. has grown through development of new resorts, expansions and acquisitions.
Since it was founded in 1950 and it created the all-inclusive vacation concept, Club Med has been the world leader on its market, and has developed a resolutely upscale, friendly and multicultural spirit. Club Med boasts 70 resorts located in the most beautiful sites in the world, a cruise ship and
.png)
China's cybersecurity agency accused the American government of orchestrating the theft of about $13 billion worth of Bitcoin,...
MMA News: Nassourdine Imavov will face Caio Borralho in the UFC Paris main event on September 6, 2025, at the Accor Arena.
A recent lawsuit against Accor Management, via the Fairmont Hotels & Resorts brand, has raised significant questions about online privacy in the hotel industry.
An online privacy lawsuit filed against Accor Management through the Fairmont Hotels & Resorts brand should have hoteliers reviewing their...
IndiGo parent company InterGlobe and French hospitality major Accor have tied up to create what they term will be “India's fastest growing hospitality...
Trend Micro has announced the winners of its 2024 Customer Awards, acknowledging organisations that have embraced cybersecurity innovation.
Trend Micro has awarded Foodstuffs South Island the Customer Innovator Award for its integration of cybersecurity within its digital strategies.
IntelBroker alleges Accor data breach with 642K records leaked. Technical analysis reveals compromised data including names, emails,...
Ibis Budget guests were left vulnerable after a security flaw in self-check-in kiosks exposed room access codes.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Accor is https://www.group.accor.com.
According to Rankiteo, Accor’s AI-generated cybersecurity score is 806, reflecting their Good security posture.
According to Rankiteo, Accor currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Accor is not certified under SOC 2 Type 1.
According to Rankiteo, Accor does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Accor is not listed as GDPR compliant.
According to Rankiteo, Accor does not currently maintain PCI DSS compliance.
According to Rankiteo, Accor is not compliant with HIPAA regulations.
According to Rankiteo,Accor is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Accor operates primarily in the Hospitality industry.
Accor employs approximately 100,192 people worldwide.
Accor presently has no subsidiaries across any sectors.
Accor’s official LinkedIn profile has approximately 2,444,544 followers.
Accor is classified under the NAICS code 7211, which corresponds to Traveler Accommodation.
Yes, Accor has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/accor-0e63.
Yes, Accor maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/accor.
As of December 11, 2025, Rankiteo reports that Accor has experienced 1 cybersecurity incidents.
Accor has an estimated 13,820 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with emailed each affected hotel with information on the event..
Title: FastBooking Data Breach
Description: A security compromise gained by FastBooking, a provider of hotel booking software, has impacted 100 hotels across the globe. Experts estimate that over 1000 hotels globally may be affected, with over 380 of those being in Japan alone. The number of impacted users was not disclosed by the company. The company swiftly emailed each affected hotel with information on the event, including the number of guests who were impacted. The attackers gained access to the FastBooking system by taking advantage of a flaw in the online application. Employees of the organisation found the breach when they saw the malware on the server. The malware functions as a backdoor, giving the attacker access to take over the server and take private information.
Type: Data Breach
Attack Vector: Malware
Vulnerability Exploited: Flaw in the online application
Motivation: Data Theft
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Flaw in the online application.

Data Compromised: Private information
Systems Affected: FastBooking system
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Private information.

Entity Name: FastBooking
Entity Type: Hotel Booking Software Provider
Industry: Hospitality
Location: Global
Customers Affected: 100 hotels (potentially over 1000 hotels globally)

Communication Strategy: Emailed each affected hotel with information on the event

Type of Data Compromised: Private information
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Emailed each affected hotel with information on the event.

Entry Point: Flaw in the online application
Backdoors Established: Malware functioning as a backdoor

Root Causes: Flaw in the online application
Most Significant Data Compromised: The most significant data compromised in an incident was Private information.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Private information.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Flaw in the online application.
.png)
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Versions 3.5.4 and below contain a Stored Cross-Site Scripting (XSS) vulnerability in the /WeGIA/html/geral/configurar_senhas.php endpoint. The application does not sanitize user-controlled data before rendering it inside the employee selection dropdown. The application retrieves employee names from the database and injects them directly into HTML <option> elements without proper escaping. This issue is fixed in version 3.5.5.
ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0 are vulnerable to DOM-Based XSS through the Zitadel V2 logout endpoint. The /logout endpoint insecurely routes to a value that is supplied in the post_logout_redirect GET parameter. As a result, unauthenticated remote attacker can execute malicious JS code on Zitadel users’ browsers. To carry out an attack, multiple user sessions need to be active in the same browser, however, account takeover is mitigated when using Multi-Factor Authentication (MFA) or Passwordless authentication. This issue is fixed in version 4.7.1.
ZITADEL is an open-source identity infrastructure tool. Versions 4.7.0 and below are vulnerable to an unauthenticated, full-read SSRF vulnerability. The ZITADEL Login UI (V2) treats the x-zitadel-forward-host header as a trusted fallback for all deployments, including self-hosted instances. This allows an unauthenticated attacker to force the server to make HTTP requests to arbitrary domains, such as internal addresses, and read the responses, enabling data exfiltration and bypassing network-segmentation controls. This issue is fixed in version 4.7.1.
NiceGUI is a Python-based UI framework. Versions 3.3.1 and below are vulnerable to directory traversal through the App.add_media_files() function, which allows a remote attacker to read arbitrary files on the server filesystem. This issue is fixed in version 3.4.0.
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.