A few came out” the case of the password Qwerty1234 used by IHG to secure its digital safe, a password widely distributed within the chain.
The attack was carried out in early September by a couple of Vietnamese hackers called TeaPea. Having failed to install ransomware, they decided to distribute a few screenshots which were also authenticated by IHG or by deleting d other data.
It is essential to remember that the bad guys are those hackers who have behaved like kindergarten children by taking revenge for not having been able to rob their victim.
It is nevertheless important to look at the conditions that allowed these hackers to penetrate the IHG computer network: a corrupt email sent to an employee who was obviously inattentive or simply poorly trained and presto, the hackers were there.
What the hackers revealed to the BBC (they’re not lacking in nerve), it’s because they accessed the group’s digital safe, whose password is widely used. What is shocking is the simplicity of the password: “ Qwerty1234 », Qwerty corresponding to the first letters of an English keyboard.
IHG’s official response to TH
Asked yesterday about this, the IHG press service answered us
We prioritized the recovery of our booking channels and revenue generating systems and were able to get those back up and running in a short period of time. Our security measures following the unauthorized activity in our technology systems are continuing. We are working closely with our technology suppliers and external specialists have also been engaged to investigate the incident. At this time, we have not identified any evidence of unauthorized access to guest data. We remain focused on supporting our hotels and owners. which can be translated into
We prioritized recovering our booking channels and revenue generating systems which we were able to get back up and running in a short period of time. Our security measures against unauthorized activity in our technology systems continue. We are working closely with our technology providers and external specialists have also been engaged to investigate the incident. At this time, we have not identified any evidence of unauthorized access to customer data. We remain focused on supporting our hotels and owners.
No comments on password Qwerty1234…
This affair, which ultimately did not cause much damage and did not a priori affect any personal customer data, demonstrates once again that no one is safe from an attack (on TH, there are permanently between 4 and 6 thousand blocked IP addresses corresponding to robot attacks, not counting other protection tools, while TH does not hold any personal information on its own servers).
This case illustrates the childishness of certain hackers.
Finally, it requires taking basic precautions: individual password, complexity of passwords, alert system in the event of abnormal behavior (in this case the massive deletion of data or databases)… and this concerns all businesses, including the small 8-bedroom hotel in the countryside.
We would love to thank the writer of this article for this remarkable material
The recent computer attack by the IHG group recalls the basics – TendanceHotellerie
Explore our social media profiles and also other pages related to themhttps://yaroos.com/related-pages/