Threat Landscape
Hospitality cybersecurity is the cybersecurity of guest experience itself. When systems fail, slot machines stop, room doors won't unlock, restaurants go cash-only, and the public consequence is immediate.
The travel, hospitality, and tourism threat landscape is defined by guest-facing operational dependence. Every guest interaction in a modern hotel, resort, casino, cruise line, or large hospitality operator depends on integrated digital systems — reservation platforms, loyalty programmes, payment processing, room-key issuance, point-of-sale, food-and-beverage management, gaming-floor management, conference-and-events coordination. A successful adversary who compromises these systems disrupts guest experience visibly, immediately, and across every property of the operator simultaneously.
The September 2023 attacks on MGM Resorts International and Caesars Entertainment represent the canonical recent illustration. Both attacks were attributed to Scattered Spider (operating with ALPHV / BlackCat ransomware) and used the same fundamental attack pattern: social engineering of IT helpdesk via LinkedIn-sourced employee identity, credential issuance through legitimate IT support process, escalation to administrator privileges, and ransomware deployment. MGM's ten-day operational disruption affected 30+ properties — slot machines displayed error messages, ATMs were inoperable, digital room keys did not work, casino floors were empty, restaurants and bars switched to cash-only. Damages reached USD 100 million in Q3 2023 alone; MGM committed USD 50 million in subsequent cybersecurity reinvestment. Caesars, attacked the same week, paid a USD 15 million ransom (negotiated down from USD 30 million) to prevent loyalty-programme database disclosure. [01]
"All ALPHV ransomware group did to compromise MGM Resorts was hop on LinkedIn, find an employee, then call the Help Desk." From cold call to credential issuance to network access took less than ten minutes. The ten-minute attack produced ten days of operational disruption and USD 100 million in losses. The asymmetry is the architecture.
The 2023–2024 hospitality incident calendar extends well beyond MGM and Caesars. The November 2023 LBA Hospitality attack by ALPHV / BlackCat compromised the management company for nearly 100 Marriott, Hilton, Holiday Inn, and Best Western properties across 12+ US states. The October 2023 Motel One attack (ALPHV / BlackCat). The March 2024 Omni Hotels attack. The 2018 Marriott Starwood breach (500 million guest records, attributed by US DoJ to PRC Ministry of State Security) remains the largest documented hospitality-sector breach. Booking.com, Expedia, Hotels.com, and other large online-travel-agency platforms are persistent targets due to the concentration of guest-PII, payment-card data, and reservation-history they hold.
The cruise-line and airline-adjacent travel sectors face parallel exposure. Royal Caribbean, Carnival, MSC, and other major cruise operators have disclosed cybersecurity incidents in 2022–2024. Travel-management companies (American Express Global Business Travel, BCD Travel, CWT) hold concentrated corporate-traveller data with both PII and corporate-itinerary intelligence value. The 2021 CWT ransomware attack (USD 4.5 million paid to attackers) established the corporate-travel attack pattern.