Company Details
holiday-inn-hotels
12,325
44,054
7211
holidayinn.com
0
HOL_2975596
In-progress


Holiday Inn Company CyberSecurity Posture
holidayinn.comMore than an iconic place to stay, Holiday Inn Hotels are a place to be in the moment–gathered to celebrate with family, laughing with friends, sharing a meal with the team, or just for some well-deserved me-time. No matter the reason you travel, when you’re here, you’re right where you’re meant to be. Book with us and become an IHG One Rewards member.
Company Details
holiday-inn-hotels
12,325
44,054
7211
holidayinn.com
0
HOL_2975596
In-progress
Between 750 and 799

Holiday Inn Global Score (TPRM)XXXX

Description: InterContinental Hotels Group PLC was targeted in a cyberattack that knocked its booking systems offline. An unauthorized activity created technical issues and resulted in its booking channels and other applications being significantly disrupted. IHG immediately implemented response plans, notified regulatory authorities and engaged external specialists to investigate the incident.
Description: The California Office of the Attorney General reported a data breach involving InterContinental Hotels Group on April 14, 2017. The breach occurred between September 29, 2016, and December 29, 2016, due to malware accessing payment card data at certain franchise locations in the Americas. The number of affected individuals is currently unknown, and specific types of information compromised might include cardholder names, card numbers, expiration dates, and security codes.
Description: Thieves gained access to the payment card systems of over 1,000 hotels owned by the InterContinental Hotels Group. The InterContinental San Francisco, Holiday Inn Resort – Aruba, and InterContinental Chicago Magnificent Mile are among the properties that are impacted. The inquiry found evidence of malware activity between September 29, 2016, and December 29, 2016, that was intended to obtain payment card information from cards used on-site at front desks at specific IHG-branded franchise hotel sites. The business emphasised that although some payment systems have been infiltrated by malware, there is no proof that credit card data was accessed thereafter.
Description: On February 3, 2017, the California Office of the Attorney General reported that Six Continents Hotels, Inc. (doing business as InterContinental Hotels Group - IHG) experienced a data breach affecting guests' payment card data at 12 properties. The breach involved malware installed on servers processing payment cards used at restaurants and bars from August 1, 2016, to December 20, 2016, but left front-desk card transactions unaffected; specific numbers of affected individuals are currently unknown.


No incidents recorded for Holiday Inn in 2026.
No incidents recorded for Holiday Inn in 2026.
No incidents recorded for Holiday Inn in 2026.
Holiday Inn cyber incidents detection timeline including parent company and subsidiaries

More than an iconic place to stay, Holiday Inn Hotels are a place to be in the moment–gathered to celebrate with family, laughing with friends, sharing a meal with the team, or just for some well-deserved me-time. No matter the reason you travel, when you’re here, you’re right where you’re meant to be. Book with us and become an IHG One Rewards member.


Established in 1975, ITC Hotels Limited has grown to encompass over 140+ hotels across 90+ destinations, solidifying its presence in the Indian subcontinent ITC Hotels seamlessly blends India’s rich tradition of hospitality with globally benchmarked services, offering a collection of hotels and res

Established in 1903, Taj is The Indian Hotels Company Limited’s (IHCL) iconic brand for the world’s most discerning travellers seeking luxury and authentic experiences. Taj has been rated as India’s Strongest Brand across all sectors for an unprecedented fourth time and also as the World’s Strongest

Radisson Hotel Group is an international hotel group, operating in EMEA and APAC with over 1,320 hotels in operation and under development in +95 countries. The international hotel group is rapidly expanding with a plan to significantly grow the portfolio. The Group’s overarching brand promise is Ev

Welcome to Meliá Hotels International! From Mallorca to the world, our story is an exciting journey that began more than six decades ago and has led us to become one of the largest hotel chains on the planet and the most sustainable in Europe (S&P Global). With more than 400 hotels across the worl

Landry's is a multinational, diversified restaurant, hospitality, gaming, and entertainment leader based in Houston, Texas. The company operates more than 600 establishments around the world, including well-known concepts, such as Landry’s Seafood House, Bubba Gump Shrimp Co., Rainforest Cafe, Mo

Mandarin Oriental Hotel Group is the award-winning owner and operator of some of the world’s most luxurious hotels, resorts and residences. Having grown from its Asian roots into a global brand, the Group now operates 43 hotels, 12 residences and 23 exclusive homes in 26 countries and territories, w

Jumeirah, a global leader in luxury hospitality and a member of Dubai Holding, operates an exceptional portfolio of 31 properties, including 33 signature F&B restaurants, across the Middle East, Europe, Asia and Africa. In 1999, Jumeirah changed the face of luxury hospitality with the opening of t
Travel + Leisure Co., the world's leading vacation ownership and membership travel company, provides more than six million vacations to travelers every year. The company’s extensive Vacation Ownership portfolio includes trusted and iconic vacation club brands with a combined 270+ resorts worldwide,
Hilton (NYSE: HLT) is a leading global hospitality company with a portfolio of 24 world-class brands comprising more than 8,400 properties and over 1.25 million rooms, in 140 countries and territories. Dedicated to fulfilling its founding vision to fill the earth with the light and warmth of hospita
.png)
A new four-part professional development series aimed at helping small businesses better understand and manage technology will launch in...
Underscoring its commitment to fostering a secure and reliable digital financial environment, CFI sponsored the Conference and Exhibition on...
Tuesday, June 24, 2025 7:11PM IST (1:41PM GMT). Mumbai, Maharashtra, India -- The 2nd Edition of the CyberSec Innovation Summit & Awards 2025,...
Friday, May 16, 2025 6:20PM IST (12:50PM GMT). thumb_71A1551_94863.JPG. Opening Ceremony of the 3rd Edition NBFC & Fintech Leadership Awards 2025.
Hotel, motel, Holiday Inn—if AI starts acting up, then you call IT in. As the hospitality industry integrates automation and generative AI...
Exabeam, a global cybersecurity leader that delivers AI-driven security operations, today announced the appointment of Mike Byron as Chief Financial Officer (...
The US Department of Justice is offering a $10 million reward for Mikhail Pavlovich Matveev.
A global technology outage caused by a faulty software update that grounded flights, disrupted hospitals and knocked banks and media outlets...
Hotel ownership and management group to design, procure, certify, manage, monitor, and maintain its hotels' network infrastructure including...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Holiday Inn is http://www.holidayinn.com/.
According to Rankiteo, Holiday Inn’s AI-generated cybersecurity score is 790, reflecting their Fair security posture.
According to Rankiteo, Holiday Inn currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Holiday Inn has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Holiday Inn is not certified under SOC 2 Type 1.
According to Rankiteo, Holiday Inn does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Holiday Inn is not listed as GDPR compliant.
According to Rankiteo, Holiday Inn does not currently maintain PCI DSS compliance.
According to Rankiteo, Holiday Inn is not compliant with HIPAA regulations.
According to Rankiteo,Holiday Inn is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Holiday Inn operates primarily in the Hospitality industry.
Holiday Inn employs approximately 12,325 people worldwide.
Holiday Inn presently has no subsidiaries across any sectors.
Holiday Inn’s official LinkedIn profile has approximately 44,054 followers.
Holiday Inn is classified under the NAICS code 7211, which corresponds to Traveler Accommodation.
No, Holiday Inn does not have a profile on Crunchbase.
Yes, Holiday Inn maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/holiday-inn-hotels.
As of January 22, 2026, Rankiteo reports that Holiday Inn has experienced 4 cybersecurity incidents.
Holiday Inn has an estimated 13,887 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach and Cyber Attack.
Title: Cyberattack on InterContinental Hotels Group PLC
Description: InterContinental Hotels Group PLC was targeted in a cyberattack that knocked its booking systems offline. An unauthorized activity created technical issues and resulted in its booking channels and other applications being significantly disrupted.
Type: Cyberattack
Title: Data Breach at InterContinental Hotels Group
Description: Thieves gained access to the payment card systems of over 1,000 hotels owned by the InterContinental Hotels Group. The breach affected properties including the InterContinental San Francisco, Holiday Inn Resort – Aruba, and InterContinental Chicago Magnificent Mile. The inquiry found evidence of malware activity between September 29, 2016, and December 29, 2016, that was intended to obtain payment card information from cards used on-site at front desks at specific IHG-branded franchise hotel sites. The business emphasised that although some payment systems have been infiltrated by malware, there is no proof that credit card data was accessed thereafter.
Date Detected: 2016-12-29
Type: Data Breach
Attack Vector: Malware
Threat Actor: Unknown
Motivation: Financial Gain
Title: InterContinental Hotels Group Data Breach
Description: A data breach affecting guests' payment card data at 12 properties of InterContinental Hotels Group (IHG). Malware was installed on servers processing payment cards used at restaurants and bars from August 1, 2016, to December 20, 2016, but front-desk card transactions were unaffected.
Date Detected: 2017-02-03
Date Publicly Disclosed: 2017-02-03
Type: Data Breach
Attack Vector: Malware
Title: Data Breach at Six Continents Hotels, Inc.
Description: The California Office of the Attorney General reported a data breach involving Six Continents Hotels, Inc. (d/b/a InterContinental Hotels Group) on April 14, 2017. The breach occurred between September 29, 2016, and December 29, 2016, due to malware accessing payment card data at certain franchise locations in the Americas. The number of affected individuals is currently unknown, and specific types of information compromised might include cardholder names, card numbers, expiration dates, and security codes.
Date Detected: 2017-04-14
Date Publicly Disclosed: 2017-04-14
Type: Data Breach
Attack Vector: Malware
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Systems Affected: booking systemsbooking channelsother applications
Operational Impact: Significant disruption

Data Compromised: Payment card information
Systems Affected: Payment card systems
Payment Information Risk: ['High']

Data Compromised: Payment card data
Systems Affected: Servers processing payment cards
Payment Information Risk: High

Data Compromised: Cardholder names, Card numbers, Expiration dates, Security codes
Payment Information Risk: True
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Payment Card Information, , Payment card data, Cardholder Names, Card Numbers, Expiration Dates, Security Codes and .

Entity Name: InterContinental Hotels Group PLC
Entity Type: Corporation
Industry: Hospitality

Entity Name: InterContinental Hotels Group
Entity Type: Corporation
Industry: Hospitality
Location: Global

Entity Name: InterContinental Hotels Group (IHG)
Entity Type: Hospitality
Industry: Hotel
Location: Multiple locations

Entity Name: Six Continents Hotels, Inc. (d/b/a InterContinental Hotels Group)
Entity Type: Hospitality
Industry: Hotel
Location: Americas

Incident Response Plan Activated: True

Type of Data Compromised: Payment card information
Sensitivity of Data: High

Type of Data Compromised: Payment card data
Sensitivity of Data: High

Type of Data Compromised: Cardholder names, Card numbers, Expiration dates, Security codes
Sensitivity of Data: High


Source: California Office of the Attorney General
Date Accessed: 2017-02-03

Source: California Office of the Attorney General
Date Accessed: 2017-04-14
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2017-02-03, and Source: California Office of the Attorney GeneralDate Accessed: 2017-04-14.

Investigation Status: Investigation in progress
Last Attacking Group: The attacking group in the last incident was an Unknown.
Most Recent Incident Detected: The most recent incident detected was on 2016-12-29.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2017-04-14.
Most Significant Data Compromised: The most significant data compromised in an incident were Payment card information, , Payment card data, cardholder names, card numbers, expiration dates, security codes and .
Most Significant System Affected: The most significant system affected in an incident was booking systemsbooking channelsother applications and Payment card systems and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were expiration dates, card numbers, Payment card information, cardholder names, Payment card data and security codes.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Investigation in progress.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.