Company Details
ihghotels&resorts
18,629
1,465,212
7211
ihgplc.com
3
IHG_3304044
Completed


IHG Hotels & Resorts Company CyberSecurity Posture
ihgplc.comIHG Hotels & Resorts [LON:IHG, NYSE:IHG (ADRs)] is a global hospitality company, with a purpose to provide True Hospitality for Good. With a family of 19 hotel brands and IHG One Rewards, one of the world's largest hotel loyalty programmes, IHG has over 6,300 open hotels in more than 100 countries, and a development pipeline of over 2,000 properties. Luxury & Lifestyle: Six Senses Hotels Resorts Spas, Regent Hotels & Resorts, InterContinental Hotels & Resorts, Vignette Collection, Kimpton Hotels & Restaurants, Hotel Indigo Premium: voco hotels, HUALUXE Hotels & Resorts, Crowne Plaza Hotels & Resorts, EVEN Hotels Essentials: Holiday Inn Express, Holiday Inn Hotels & Resorts, Garner hotels, avid hotels Suites: Atwell Suites, Staybridge Suites, Holiday Inn Club Vacations, Candlewood Suites Exclusive Partners: Iberostar Beachfront Resorts InterContinental Hotels Group PLC is the Group's holding company and is incorporated and registered in England and Wales. Approximately 345,000 people work across IHG's hotels and corporate offices globally. Visit us online for more about our hotels and reservations and IHG One Rewards. To download the IHG One Rewards app, visit the Apple App or Google Play stores.
Company Details
ihghotels&resorts
18,629
1,465,212
7211
ihgplc.com
3
IHG_3304044
Completed
Between 750 and 799

IHR Global Score (TPRM)XXXX

Description: InterContinental Hotels Group PLC was targeted in a cyberattack that knocked its booking systems offline. An unauthorized activity created technical issues and resulted in its booking channels and other applications being significantly disrupted. IHG immediately implemented response plans, notified regulatory authorities and engaged external specialists to investigate the incident.
Description: The California Office of the Attorney General reported a data breach involving InterContinental Hotels Group on April 14, 2017. The breach occurred between September 29, 2016, and December 29, 2016, due to malware accessing payment card data at certain franchise locations in the Americas. The number of affected individuals is currently unknown, and specific types of information compromised might include cardholder names, card numbers, expiration dates, and security codes.
Description: On February 3, 2017, the California Office of the Attorney General reported that Six Continents Hotels, Inc. (doing business as InterContinental Hotels Group - IHG) experienced a data breach affecting guests' payment card data at 12 properties. The breach involved malware installed on servers processing payment cards used at restaurants and bars from August 1, 2016, to December 20, 2016, but left front-desk card transactions unaffected; specific numbers of affected individuals are currently unknown.


No incidents recorded for IHG Hotels & Resorts in 2026.
No incidents recorded for IHG Hotels & Resorts in 2026.
No incidents recorded for IHG Hotels & Resorts in 2026.
IHR cyber incidents detection timeline including parent company and subsidiaries

IHG Hotels & Resorts [LON:IHG, NYSE:IHG (ADRs)] is a global hospitality company, with a purpose to provide True Hospitality for Good. With a family of 19 hotel brands and IHG One Rewards, one of the world's largest hotel loyalty programmes, IHG has over 6,300 open hotels in more than 100 countries, and a development pipeline of over 2,000 properties. Luxury & Lifestyle: Six Senses Hotels Resorts Spas, Regent Hotels & Resorts, InterContinental Hotels & Resorts, Vignette Collection, Kimpton Hotels & Restaurants, Hotel Indigo Premium: voco hotels, HUALUXE Hotels & Resorts, Crowne Plaza Hotels & Resorts, EVEN Hotels Essentials: Holiday Inn Express, Holiday Inn Hotels & Resorts, Garner hotels, avid hotels Suites: Atwell Suites, Staybridge Suites, Holiday Inn Club Vacations, Candlewood Suites Exclusive Partners: Iberostar Beachfront Resorts InterContinental Hotels Group PLC is the Group's holding company and is incorporated and registered in England and Wales. Approximately 345,000 people work across IHG's hotels and corporate offices globally. Visit us online for more about our hotels and reservations and IHG One Rewards. To download the IHG One Rewards app, visit the Apple App or Google Play stores.


No loud pretense. No excess formalities. Just understated elegance you’ll feel the moment you walk into one of over 80 worldwide destinations. JW Marriott is part of Marriott International’s luxury portfolio and consists of beautiful properties in gateway cities and distinctive resort locations in

Kerzner International has built a diverse collection of iconic brands and luxury properties, earning international acclaim for pioneering destination-defining hospitality, delivering unrivalled service, and curating transformative guest experiences. We are renowned for creating hospitality brands

The Hampton brand, including Hampton Inn, Hampton Inn & Suites and Hampton by Hilton, is an award-winning leader in the upper-midscale hotel segment. With more than 2,700 properties in 32 countries globally, Hampton is part of Hilton Worldwide, the leading global hospitality company. All Hampton Hot

Established in 1975, ITC Hotels Limited has grown to encompass over 140+ hotels across 90+ destinations, solidifying its presence in the Indian subcontinent ITC Hotels seamlessly blends India’s rich tradition of hospitality with globally benchmarked services, offering a collection of hotels and res

Minor Hotels is a global hospitality leader with over 560 hotels and resorts across six continents, a diverse portfolio of F&B businesses and a selection of luxury transportation services. With over four decades of experience, we build stronger brands, foster lasting partnerships, and drive business
Aramark (NYSE: ARMK) proudly serves the world’s leading educational institutions, Fortune 500 companies, world champion sports teams, prominent healthcare providers, iconic destinations and cultural attractions, and numerous municipalities in 16 countries around the world with food and facilities ma

Best Western Hotels & Resorts headquartered in Phoenix, Arizona, is a privately held hotel company within the BWH℠ Hotels global enterprise. With 19 brands and approximately 4,300 hotels in over 100 countries and territories worldwide*, BWH Hotels suits the needs of developers and guests in every ma
Since it was founded in 1950 and it created the all-inclusive vacation concept, Club Med has been the world leader on its market, and has developed a resolutely upscale, friendly and multicultural spirit. Club Med boasts 70 resorts located in the most beautiful sites in the world, a cruise ship and

We are Accor We are more than 290,000 hospitality experts placing people at the heart of what we do, creating emotion for our guests, and nurturing passion for service and achievement beyond limits. Building on the strength of our teams and of our fully integrated ecosystem of leading brands, perso
.png)
Hotel Indigo Turks & Caicos Grace Bay is set to open later this month, with Mark Illingworth appointed as Executive General Manager.
Kimpton, part of IHG Hotels and Resorts' luxury and lifestyle portfolio, makes its Malaysian debut with the opening of Kimpton Naluria Kuala...
IHG Hotels & Resorts announces the opening of voco Bangkok Surawong, marking the debut of IHG's fastest growing premium brand, voco hotels,...
Hotel Indigo Turks & Caicos Grace Bay, part of IHG Hotels & Resorts, developed by owners Molo Hotel Group and managed by Lighthouse Hotel...
Kimpton has opened its first hotel in Malaysia, the Kimpton Naluria Kuala Lumpur, located in the Tun Razak Exchange district.
Kabani Hotel Group announced the successful sale of voco St. Augustine — Historic Area by IHG, a 50-room boutique hotel.
IHG Hotels & Resorts has announced the opening of voco Bangkok Surawong, the first voco hotel in Thailand. The property is located on...
IHG Hotels & Resorts and Proud Real Estate Public Company Limited have partnered to develop The Residences at InterContinental Phuket Resort...
InterContinental Hotels Group has just seen a meaningful reset in its valuation anchor, with the fair value estimate moving from £95.54 to...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of IHG Hotels & Resorts is http://www.ihgplc.com.
According to Rankiteo, IHG Hotels & Resorts’s AI-generated cybersecurity score is 794, reflecting their Fair security posture.
According to Rankiteo, IHG Hotels & Resorts currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, IHG Hotels & Resorts has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, IHG Hotels & Resorts is not certified under SOC 2 Type 1.
According to Rankiteo, IHG Hotels & Resorts does not hold a SOC 2 Type 2 certification.
According to Rankiteo, IHG Hotels & Resorts is not listed as GDPR compliant.
According to Rankiteo, IHG Hotels & Resorts does not currently maintain PCI DSS compliance.
According to Rankiteo, IHG Hotels & Resorts is not compliant with HIPAA regulations.
According to Rankiteo,IHG Hotels & Resorts is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
IHG Hotels & Resorts operates primarily in the Hospitality industry.
IHG Hotels & Resorts employs approximately 18,629 people worldwide.
IHG Hotels & Resorts presently has no subsidiaries across any sectors.
IHG Hotels & Resorts’s official LinkedIn profile has approximately 1,465,212 followers.
IHG Hotels & Resorts is classified under the NAICS code 7211, which corresponds to Traveler Accommodation.
No, IHG Hotels & Resorts does not have a profile on Crunchbase.
Yes, IHG Hotels & Resorts maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ihghotels&resorts.
As of January 21, 2026, Rankiteo reports that IHG Hotels & Resorts has experienced 3 cybersecurity incidents.
IHG Hotels & Resorts has an estimated 13,887 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.
Title: Cyberattack on InterContinental Hotels Group PLC
Description: InterContinental Hotels Group PLC was targeted in a cyberattack that knocked its booking systems offline. An unauthorized activity created technical issues and resulted in its booking channels and other applications being significantly disrupted.
Type: Cyberattack
Title: InterContinental Hotels Group Data Breach
Description: A data breach affecting guests' payment card data at 12 properties of InterContinental Hotels Group (IHG). Malware was installed on servers processing payment cards used at restaurants and bars from August 1, 2016, to December 20, 2016, but front-desk card transactions were unaffected.
Date Detected: 2017-02-03
Date Publicly Disclosed: 2017-02-03
Type: Data Breach
Attack Vector: Malware
Title: Data Breach at Six Continents Hotels, Inc.
Description: The California Office of the Attorney General reported a data breach involving Six Continents Hotels, Inc. (d/b/a InterContinental Hotels Group) on April 14, 2017. The breach occurred between September 29, 2016, and December 29, 2016, due to malware accessing payment card data at certain franchise locations in the Americas. The number of affected individuals is currently unknown, and specific types of information compromised might include cardholder names, card numbers, expiration dates, and security codes.
Date Detected: 2017-04-14
Date Publicly Disclosed: 2017-04-14
Type: Data Breach
Attack Vector: Malware
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Systems Affected: booking systemsbooking channelsother applications
Operational Impact: Significant disruption

Data Compromised: Payment card data
Systems Affected: Servers processing payment cards
Payment Information Risk: High

Data Compromised: Cardholder names, Card numbers, Expiration dates, Security codes
Payment Information Risk: True
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Payment card data, Cardholder Names, Card Numbers, Expiration Dates, Security Codes and .

Entity Name: InterContinental Hotels Group PLC
Entity Type: Corporation
Industry: Hospitality

Entity Name: InterContinental Hotels Group (IHG)
Entity Type: Hospitality
Industry: Hotel
Location: Multiple locations

Entity Name: Six Continents Hotels, Inc. (d/b/a InterContinental Hotels Group)
Entity Type: Hospitality
Industry: Hotel
Location: Americas

Incident Response Plan Activated: True

Type of Data Compromised: Payment card data
Sensitivity of Data: High

Type of Data Compromised: Cardholder names, Card numbers, Expiration dates, Security codes
Sensitivity of Data: High


Source: California Office of the Attorney General
Date Accessed: 2017-02-03

Source: California Office of the Attorney General
Date Accessed: 2017-04-14
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2017-02-03, and Source: California Office of the Attorney GeneralDate Accessed: 2017-04-14.

Investigation Status: Investigation in progress
Most Recent Incident Detected: The most recent incident detected was on 2017-02-03.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2017-04-14.
Most Significant Data Compromised: The most significant data compromised in an incident were Payment card data, cardholder names, card numbers, expiration dates, security codes and .
Most Significant System Affected: The most significant system affected in an incident was booking systemsbooking channelsother applications and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were security codes, expiration dates, cardholder names, Payment card data and card numbers.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Investigation in progress.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.