InterContinental Hotels Group confirms cyber attack, experts suggest ransomware
Customers had been reporting issues with reservations for days and security experts have sparked discussions of a more serious incident
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
InterContinental Hotels Group (IHG) has confirmed that it has sustained a cyber attack which experts are suggesting could be ransomware in nature.
IHG owns hotel brands such as Holiday Inn, Holiday Express, Regent, Crowne Plaza, Kimpton, and Six Senses. It confirmed the attack with a filing to the London Stock Exchange (LSE) on Tuesday.
Part of the disclosure to the LSE mentioned how “IHG is working to fully restore all systems as soon as possible” - wording often used when a cyber security incident involves ransomware.
Cyber security experts have suggested the incident could be ransomware too, adding to the growing speculation which has not yet been confirmed by IHG.
Other researchers pointed out that the LockBit ransomware operation also claimed an attack on an Istanbul-based branch of IHG-owned Holiday Inn last month.
IHG said in the filing that its booking channels and “other applications” have been “significantly” disrupted since Monday.
IHG customers have been complaining on social media about reservation issues and users appearing to be IHG employees claim their shifts “have been hell all day”.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
“IHG has implemented its response plans, is notifying relevant regulatory authorities and is working closely with its technology suppliers. External specialists have also been engaged to investigate the incident,” the company said in its filing.
RELATED RESOURCE
Escape the ransomware maze
Conventional endpoint protection tools just aren’t the best defence anymore
“IHG is working to fully restore all systems as soon as possible and to assess the nature, extent and impact of the incident. We will be supporting hotel owners and operators as part of our response to the ongoing service disruption. IHG's hotels are still able to operate and take reservations directly.
“A further update will be provided as and when appropriate.”
In 2016, IHG fell victim to several cyber attacks that caused widespread disruption. During two instances in the space of just a few months, IHG customers’ payment details were put at risk.
One instance involved 20 of the company’s hotels being hit with malware targeting its point-of-sale systems, potentially exposing payment details to hackers.
A month later, it was also targeted by a three-month attack on its systems during which time malware was used to access customers’ stored payment details.

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
Microsoft Copilot bug saw AI snoop on confidential emails — after it was told not toNews The Copilot bug meant an AI summarizing tool accessed messages in the Sent and Draft folders, dodging policy rules
-
Cyber experts issue warning over new phishing kit that proxies real login pagesNews The Starkiller package offers monthly framework updates and documentation, meaning no technical ability is needed
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks