Skip to content
Go back

What Three Casino Breaches Can Teach Every Organization

Microsoft Sign-in Request Page

Photo by Ed Hardie on Unsplash

A financially motivated cybercriminal group known as ShinyHunters, with a well-documented history of large-scale data theft, is threatening to release more than 800,000 employee records stolen from Wynn Resorts unless the company pays $1.5 million. Wynn hasn’t confirmed the breach, which is fairly standard posture in these situations, but the data samples being circulated appear legitimate. Names, Social Security numbers, salaries, birthdays, phone numbers of current and former employees.

Walk onto any major casino floor and the security is hard to miss. Cameras cover every angle, staff are trained to spot cheaters and social engineering in real time, and high-value transactions require multiple people to authorize. That’s just what you can see. Behind the scenes, the monitoring and access controls run deep enough to make an Ocean’s Eleven plot feel optimistic. Vendor access is escorted and logged. Facial recognition and cross-property intelligence sharing on known bad actors have been standard practice for decades. These operators have spent 75 years learning how to stop people from stealing from them in person.

What keeps happening digitally tells a different story.

Caesars Entertainment was hit first, in the summer of 2023. The attackers social engineered an outsourced IT support vendor and used that access to compromise Caesars’ Okta Agent, capture credentials, and escalate privileges. Caesars paid approximately $15 million, but the story barely registered because MGM’s more visible breach was already dominating headlines by the time Caesars disclosed.

MGM followed that September. The attackers identified a current employee through LinkedIn, researched enough to impersonate them convincingly, called the IT help desk, and walked away with administrator access to MGM’s Okta and Azure environments within ten minutes. Slot machines, digital room keys, and reservation systems went down for over a week, contributing to a $100 million hit to MGM’s third quarter results that year.

The alleged Wynn Resorts data breach has been much quieter. The attackers reportedly compromised credentials and exploited a vulnerability in Oracle PeopleSoft, the HR system, allegedly resulting in the breach of 800,000 employee records. Full details haven’t been publicly confirmed, however this threat actor has a record of being successful, and the gaps it exposes are just as worth studying.

The network behind all three breaches, tracked by researchers under names like Scattered Spider, ShinyHunters, and LAPSUS$, has demonstrated they can get in. But what sets them apart is the social engineering. This is a largely English-speaking group with members reportedly ranging from their late teens into their mid-twenties, and they study how organizations work from the inside out. Before an attack, they find employee names on LinkedIn, learn internal terminology, and figure out what questions a help desk agent is trained to ask so they can answer them convincingly.

CISA has documented their methods in detail, including voice phishing, SIM swapping, MFA push bombing, and help desk impersonation. In practice, that looks like a call from someone claiming to be IT support, telling an employee the company is rolling out new MFA settings, and directing them to a credential harvesting site branded to look like the company’s own login page. The employee enters their SSO credentials and MFA code, and the attacker registers their own device. The whole thing takes minutes.

The casino sector is functioning as a proving ground right now. These operators built physical security programs over decades that account for social engineering, insider threats, and vendor access. Digitally, the same rigor wasn’t there. None of that is specific to gaming. Google and Krebs have both documented this same network targeting SaaS providers, telecom companies, and financial institutions with the same playbook.

There’s enough public information on these breaches and the tactics these threat actors use to start applying real safeguards. The CISA advisory, the Google and Krebs reporting, the attack paths from all three incidents all point to specific gaps that most organizations can address. Help desk verification, vendor access controls, identity infrastructure hardening. That’s what risk assessment looks like when it’s aligned with the business, not a spreadsheet that gets updated once a year because audit needs it. These groups are already adapting, and your security architecture should be too.


Share this post on:

Previous Post
Adaptive Threats Expose Ineffective Risk Assessments
Next Post
Threat Response Without Business Context Is Just Firefighting