Gekko Group Company Cyber Security Posture

gekko-group.de

Thanks to the visionary projects of Micky Rosen & Alex Urseanu Gekko Group established a real brand in Frankfurt's hospitality and gastronomy industries. The formula: Individual lifestyle at the highest level. The portfolio from apartments, hotels, gastronomy and event locations differentiate themselves in conception and design โ€“ they all share one thing in common: the love for hotels and service and the passion to share it. The Gekko Group and keeps continuously expanding to other vibrating European cities. The owners were awarded to โ€œHoteliers of the year 2018โ€ by AHGZ and dfv Media Group. www.gekko-group.de/impressum ROOMERS FRANKFURT www.roomers-frankfurt.com ROOMERS BADEN-BADEN www.roomers-badenbaden.com ROOMERS MUNICH www.roomers-munich.com PROVOCATEUR BERLIN www.provocateur-hotel.com THE PURE www.the-pure.de MORIKI www.moriki.de GOLDEN PHOENIX www.goldenphoenix.berlin JIMMY'S BAR FRANKFURT TRINITII www.trinitii.de GEKKO RESIDENCES www.gekko-residences.com

GG Company Details

Linkedin ID:

gekko-management-gekko-group

Employees number:

38 employees

Number of followers:

1345

NAICS:

721

Industry Type:

Hospitality

Homepage:

gekko-group.de

IP Addresses:

Scan still pending

Company ID:

GEK_1550404

Scan Status:

In-progress

AI scoreGG Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Gekko Group Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Gekko Group Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Gekko GroupData Leak85411/2019GEK1271523Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: A vulnerable Elasticsearch database used by Gekko Group allowed the leak of over 1 TB of information about its clients, partners, and customers, putting those people at risk of financial crime, identity theft, and account takeover. The largest hotel chain in Europe's subsidiary is reported to have 600,000 hotels on its clientele list, according to the leaked data. The information itself was gathered from a number of different Gekko Group companies as well as the booking websites and travel agencies with which they do business. Reservation information, such as complete names and addresses, as well as invoices including payment information for both travel agencies and their clients were among the data that were exposed.

Gekko Group Company Subsidiaries

SubsidiaryImage

Thanks to the visionary projects of Micky Rosen & Alex Urseanu Gekko Group established a real brand in Frankfurt's hospitality and gastronomy industries. The formula: Individual lifestyle at the highest level. The portfolio from apartments, hotels, gastronomy and event locations differentiate themselves in conception and design โ€“ they all share one thing in common: the love for hotels and service and the passion to share it. The Gekko Group and keeps continuously expanding to other vibrating European cities. The owners were awarded to โ€œHoteliers of the year 2018โ€ by AHGZ and dfv Media Group. www.gekko-group.de/impressum ROOMERS FRANKFURT www.roomers-frankfurt.com ROOMERS BADEN-BADEN www.roomers-badenbaden.com ROOMERS MUNICH www.roomers-munich.com PROVOCATEUR BERLIN www.provocateur-hotel.com THE PURE www.the-pure.de MORIKI www.moriki.de GOLDEN PHOENIX www.goldenphoenix.berlin JIMMY'S BAR FRANKFURT TRINITII www.trinitii.de GEKKO RESIDENCES www.gekko-residences.com

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=gekko-management-gekko-group' -H 'apikey: YOUR_API_KEY_HERE'
newsone

GG Cyber Security News

2019-11-22T08:00:00.000Z
European Hotel Group Suffers Data Breach Impacting 600,000 Hotels Worldwide

Gekko Group, a subsidiary of Accor Hotels, has suffered a major data breach that may have affected a customer base of 600000 hotelsย ...

2025-05-20T07:00:00.000Z
All the major cyber attacks in the UK this year: Are they on the rise and what can be done?

British companies have toppled like dominoes at the hands of cyber criminals. What happened and are these attacks the new norm?

2020-04-24T07:00:00.000Z
Accenture buys tech companies in France, Germany and UK

Accenture has purchased Gekko, a leading French Amazon Web Services (AWS) cloud services company. Gekko has more than 100 trained cloud professionals.

2022-11-15T08:00:00.000Z
127 Accenture Acquisitions Listed: Digital, Big Data Analytics, Cloud and Cybersecurity Buyouts

Accenture continues to acquire digital, cloud, cybersecurity & IT consulting companies. Here's the latest M&A list of Accentureย ...

similarCompanies

GG Similar Companies

Hilton Grand Vacations

Hilton Grand Vacations is a global leader in vacation ownership, developing, marketing and operating a portfolio of high-quality, shared-ownership properties in highly desired vacation destinations. Our company also manages and operates innovative club membership programs providing exclusive exchang

Minor Hotels Europe and Americas

Minor Hotels is a global hospitality leader with a network of more than 560 hotels across six continents. We drive growth through eight diverse hotel brands and a portfolio of related hospitality businesses. Perpetually driven by an entrepreneurial spirit, we create better brands, businesses and p

Hilton Alexandria Mark Center

Located on the West End of Historic Alexandria, adjacent to the Winkler Botanical Preserve and minutes from Old Town Alexandria, on a serene lake surrounded by landscaped gardens, sits the Hilton Alexandria Mark Center. Owned by a private investment fund advised by Crow Holdings Capital Partners,

Meliรก Hotels International

Welcome to Meliรก Hotels International! From Mallorca to the world, our story is an exciting journey that began more than six decades ago and has led us to become one of the largest hotel chains on the planet and the most sustainable in Europe (S&P Global). With more than 400 hotels across the worl

Resorts World Sentosa

ABOUT RESORTS WORLD SENTOSA Resorts World Sentosa (RWS), Asiaโ€šร„รดs premium lifestyle destination resort, is located on Singaporeโ€šร„รดs resort island of Sentosa. Spanning 49 hectares, RWS is home to world-class attractions including Universal Studios Singapore, S.E.A. Aquarium, Dolphin Island and Adven

DoubleTree by Hilton

DoubleTree by Hilton hotels are distinctively designed properties that provide true comfort to todayโ€™s business and leisure travelers. From the millions of delighted hotel guests who are welcomed with the brandโ€™s legendary, warm chocolate chip cookies at check-in to the advantages of the award-winni

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

GG CyberSecurity History Information

How many cyber incidents has GG faced?

Total Incidents: According to Rankiteo, GG has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at GG?

Incident Types: The types of cybersecurity incidents that have occurred incident Data Leak.

Incident Details

Can you provide details on each incident?

Incident : Data Leak

Title: Gekko Group Data Leak

Description: A vulnerable Elasticsearch database used by Gekko Group allowed the leak of over 1 TB of information about its clients, partners, and customers, putting those people at risk of financial crime, identity theft, and account takeover.

Type: Data Leak

Attack Vector: Vulnerable Elasticsearch Database

Vulnerability Exploited: Misconfigured Elasticsearch Database

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Leak GEK1271523

Data Compromised: Reservation information, Complete names and addresses, Invoices including payment information

Identity Theft Risk: High

Payment Information Risk: High

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Reservation information, Complete names and addresses and Invoices including payment information.

Which entities were affected by each incident?

Incident : Data Leak GEK1271523

Entity Type: Company

Industry: Travel and Hospitality

Incident : Data Leak GEK1271523

Entity Type: Company

Industry: Hospitality

Size: 600,000 hotels

Incident : Data Leak GEK1271523

Entity Type: Company

Industry: Travel

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Leak GEK1271523

Type of Data Compromised: Reservation information, Complete names and addresses, Invoices including payment information

Sensitivity of Data: High

Personally Identifiable Information: Yes

Additional Questions

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Reservation information, Complete names and addresses and Invoices including payment information.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Reservation information, Complete names and addresses and Invoices including payment information.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge