
Accor Company Cyber Security Posture
accor.comWe are Accor We are more than 290,000 hospitality experts placing people at the heart of what we do, creating emotion for our guests, and nurturing passion for service and achievement beyond limits. Building on the strength of our teams and of our fully integrated ecosystem of leading brands, personalized services & expert solutions, we break new ground to reimagine hospitality and inspire new ways to experience the world. We are dedicated to suit all desires and needs, and reinvent the guest experience every day with our 45 hotel brands across all segments- 5,600 properties around the world from luxury five-star palaces to smart economy hotels, exquisite residences to full-service resorts. Because we take care of millions of guests and each of our hotels is a world in itself, where every action counts. We strive to make positive impact both locally and globally, to ensure hospitality benefits not only the few, but all.
Accor Company Details
accor
95661 employees
2185455.0
721
Hospitality
accor.com
1053
ACC_6397921
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Accor Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Accor Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
D-EDGE Hospitality Solutions | Breach | 60 | 3 | 06/2018 | DED456251223 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: A security compromise gained by FastBooking, a provider of hotel booking software, has impacted 100 hotels across the globe. Experts estimate that over 1000 hotels globally may be affected, with over 380 of those being in Japan alone. The number of impacted users was not disclosed by the company. The company swiftly emailed each affected hotel with information on the event, including the number of guests who were impacted. The attackers gained access to the FastBooking system by taking advantage of a flaw in the online application. Employees of the organisation found the breach when they saw the malware on the server. The malware functions as a backdoor, giving the attacker access to take over the server and take private information. |
Accor Company Subsidiaries

We are Accor We are more than 290,000 hospitality experts placing people at the heart of what we do, creating emotion for our guests, and nurturing passion for service and achievement beyond limits. Building on the strength of our teams and of our fully integrated ecosystem of leading brands, personalized services & expert solutions, we break new ground to reimagine hospitality and inspire new ways to experience the world. We are dedicated to suit all desires and needs, and reinvent the guest experience every day with our 45 hotel brands across all segments- 5,600 properties around the world from luxury five-star palaces to smart economy hotels, exquisite residences to full-service resorts. Because we take care of millions of guests and each of our hotels is a world in itself, where every action counts. We strive to make positive impact both locally and globally, to ensure hospitality benefits not only the few, but all.
Access Data Using Our API

Get company history
.png)
Accor Cyber Security News
Accorโs Privacy Lawsuit: A Wake-Up Call for Hoteliers' Online Booking Policies
Article - Accor's Privacy Lawsuit: A Wake-Up Call for Hoteliers' Online Booking Policies - A lawsuit against Accor Management,ย ...
News | Breaking down the hotel guest online invasion of privacy lawsuit in California
In a podcast interview, Braun said the lawsuit filed under the California Invasion of Privacy Act alleges Accor's booking process allowedย ...
Why Nassourdine Imavov vs Caio Borralho headlines Paris return after title backup twist
Imavov withdrew from being a title fight alternate to pursue his middleweight aspirations. Borralho, with a perfect 7-0 UFC record, seeks toย ...
Hires & Promotions: Accor, Global Pay, Dentsu Creative Isobar, MakeMyTrip
This appointment is a testament to Dentsu Creative Isobar's commitment to delivering new-age, platform-agnostic creative solutions that areย ...
Accor Data Breach: IntelBroker Claims 642K Records For Sale
IntelBroker has asserted responsibility for the Accor data breach and purportedly offers the data, containing 642,000 user records,ย ...
Foodstuffs South Island wins top customer innovator award
Foodstuffs South Island, part of New Zealand's leading grocery group, was recognised at Trend Micro's 2024 Customer Awards, an event thatย ...
How Accor manages global data privacy compliance
Marie-Christine Vittet, vice president of compliance at hospitality chain Accor, shares with Compliance Week the company's journey toward aย ...
CHIC Implements Accor digital solutions across owned portfolio in DRC
Compagnie Hoteliere Et Immobiliere Du Congo (CHIC) is a hotel development company founded by a group of DRC-based businessmen with diverseย ...
European Hotel Group Suffers Data Breach Impacting 600,000 Hotels Worldwide
Gekko Group, a subsidiary of Accor Hotels, has suffered a major data breach that may have affected a customer base of 600000 hotelsย ...

Accor Similar Companies

Hilton Hotels & Resorts
As the most recognized hospitality brand in the industry, guests around the globe rely on us as a trusted place for their stay. With 600+ hotels located in the worldโs mostย exciting destinations, we are the place where people gather to experience exceptional hospitality,ย inspiring design, and energi

Delaware North
Delaware North is a global leader in the hospitality and entertainment industry. The company annually serves more than a half-billion guests across three continents, including at high-profile sports venues, airports, national and state parks, restaurants, resorts, hotels and casinos. Building on mor

Abu Dhabi National Hotels
Abu Dhabi National Hotels (ADNH) was founded in 1976 as a hotel owner and asset manager. Over the years, it has evolved into a comprehensive hospitality group, offering a wide range of services including hotels, restaurants, destination management, catering, and transportation. Under its Hotels Div

Holiday Inn Express
An IHG hotel. IHG Hotels & Resorts [LON:IHG, NYSE:IHG (ADRs)] is a global hospitality company, with a purpose to provide True Hospitality for Good. At Holiday Inn Express, we strive to make every interaction you have with us simple, smart and refreshingly engaging. With over 3,000 hotels in 75 di

Hilton Garden Inn
Hilton Garden Innยฎ is an award-winning brand that provides business and leisure guests upscale, affordable accommodations and modern amenities for an experience that is simply on another level. The Hilton Garden Inn Promise affirms the brandโs goal to make each guestโs stay better and brighter. Guar

Resorts World Sentosa
ABOUT RESORTS WORLD SENTOSA Resorts World Sentosa (RWS), Asiaโรรดs premium lifestyle destination resort, is located on Singaporeโรรดs resort island of Sentosa. Spanning 49 hectares, RWS is home to world-class attractions including Universal Studios Singapore, S.E.A. Aquarium, Dolphin Island and Adven

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Accor CyberSecurity History Information
How many cyber incidents has Accor faced?
Total Incidents: According to Rankiteo, Accor has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at Accor?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
How does Accor detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through communication strategy with Emailed each affected hotel with information on the event.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: FastBooking Data Breach
Description: A security compromise gained by FastBooking, a provider of hotel booking software, has impacted 100 hotels across the globe. Experts estimate that over 1000 hotels globally may be affected, with over 380 of those being in Japan alone. The number of impacted users was not disclosed by the company. The company swiftly emailed each affected hotel with information on the event, including the number of guests who were impacted. The attackers gained access to the FastBooking system by taking advantage of a flaw in the online application. Employees of the organisation found the breach when they saw the malware on the server. The malware functions as a backdoor, giving the attacker access to take over the server and take private information.
Type: Data Breach
Attack Vector: Malware
Vulnerability Exploited: Flaw in the online application
Motivation: Data Theft
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
How does the company identify the attack vectors used in incidents?
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Flaw in the online application.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach DED456251223
Data Compromised: Private information
Systems Affected: FastBooking system
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Private information.
Which entities were affected by each incident?

Incident : Data Breach DED456251223
Entity Type: Hotel Booking Software Provider
Industry: Hospitality
Location: Global
Customers Affected: 100 hotels (potentially over 1000 hotels globally)
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach DED456251223
Communication Strategy: Emailed each affected hotel with information on the event
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach DED456251223
Type of Data Compromised: Private information
Investigation Status
How does the company communicate the status of incident investigations to stakeholders?
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Emailed each affected hotel with information on the event.
Initial Access Broker
How did the initial access broker gain entry for each incident?

Incident : Data Breach DED456251223
Entry Point: Flaw in the online application
Backdoors Established: Malware functioning as a backdoor
Post-Incident Analysis
What were the root causes and corrective actions taken for each incident?

Incident : Data Breach DED456251223
Root Causes: Flaw in the online application
Additional Questions
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident was Private information.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was FastBooking system.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Private information.
Initial Access Broker
What was the most recent entry point used by an initial access broker?
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Flaw in the online application.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
