Special Features

Cybersecurity Month

Casino giant Caesars tells thousands: Yup, ransomware crooks stole your data

House always wins, er, wait ...


As more details emerge from September's Las Vegas casino cyberattacks, Caesars Entertainment – the owner of Caesars Palace – has disclosed more than 41,000 Maine residents alone had their info stolen by a ransomware gang.

In a Friday filing with the the US state's Attorney General's office, Caesars disclosed extortionists siphoned 41,397 Mainers' data, and listed the total number of victims "TBD."

The hotel, restaurant, and casino chain described the theft as follows:

Caesars was the victim of a social engineering attack on an outsourced IT support vendor that resulted in unauthorized access (on August 18, 2023) to Caesars' network and the exfiltration of data (beginning on or about August 23, 2023), which Caesars subsequently confirmed (on September 7, 2023) included the personal information of state residents.

The hotel chain's loyalty program was pillaged and Caesars noted that the stolen personal data included names and driver's license numbers and/or identification card numbers. According to the filing, the crooks didn't access customers' financial information nor payment details.

In an attached security breach notification letter [PDF], Caesars told customers that the entertainment conglomerate has "taken steps to ensure that the stolen data is deleted by the unauthorized actor, although we cannot guarantee this result."

These steps, we'd assume, including paying the ransom demand – which was reportedly negotiated at $15 million after an initial demand for $30 million.

"To ease any concern you may have, we are offering you complimentary identity theft protection services for two years through IDX, a data breach and recovery services expert," the notification letter continued. 

"This identity protection service includes two years of credit and dark web monitoring to help detect any misuse of your information, as well as a $1,000,000 insurance reimbursement policy and fully managed identity restoration in the event that you fall victim to identity theft."

The casino giant first confirmed the data theft in an SEC filing in September, but has yet to comment on the reported ransom paid to the ransomware crew. 

Caesars has not responded to multiple inquiries from The Register. These include questions about the ransom demanded and whether it was paid, and how many thousands of customers were caught in the ransomware crew's web. The biz's 8-K SEC form claimed a "significant number" of loyalty members were feared stolen. We will update this story if and when we hear back. 

News of that ransomware infection broke as another huge casino and hotel chain, MGM Resorts, was forced to shut down IT systems and slot machines after the same cybercrime crew – known as Scattered Spider – broke into its network and stole customers' data.

Scattered Spider is reportedly an affiliate of ALPHV, also known as BlackCat, a ransomware-as-a-service (RaaS) operation that rents its malware to other criminals.

Last week, in its 8-K SEC filing, MGM said it expects the security breach will cost the company at least $100 million.

Why MGM didn't pay the ransom

While Caesars reportedly paid to make the pain stop, MGM did not. Its CEO, Bill Hornbuckle, told Bloomberg his reasons for not caving to the crooks' extortion were not driven by nobility.

The data thieves had already been in the hotel giant's IT environment for several days before sending a ransom note for a sum Hornbuckle declined to reveal. By that point, the gambling biz had started rebuilding its systems from backups and didn't see any reason to respond to the criminals.

"I'd love to tell you there was this, you know, 'a jump on a white horse moment and devil be damned — we're not paying these bastards,'" Hornbuckle said. "The reality is because we caught this so early and we were on them."

The Register has also asked MGM repeatedly for comment about the intrusion and is yet to receive a response. 

And while we know of these two casino and resort giants who fell victim to Scattered Spider, there are likely more victims that have yet to disclose data losses.

In August, Okta revealed that "multiple US-based customers" reported social engineering attacks that targeted their IT service desks in attempts to steal user account info for those accounts with administrator permissions. 

At the time, Okta's chief security officer David Bradbury told The Register that Scattered Spider was behind these attacks. 

While we know that two of these Okta customers were Caesars and MGM, the same crew reportedly also broke into the systems of three other big businesses. These included a manufacturing, retail, and technology firm – but these other targets have yet to be named. ®

Send us news
10 Comments

US construction giant unearths concrete evidence of cyberattack

Simpson Manufacturing yanks systems offline, warns of ongoing disruption

Cisco zero-day bug allows router hijacking and is being actively exploited

We'd say 'Hurry up and patch' but it hasn't written one yet. While you wait, disable HTTP

US Navy sailor admits selling secret military blueprints to China for $15K

Worth it for 20 years behind bars?

Cisco's critical zero-day bug gets even worse – 'thousands' of IOS XE devices pwned

Good news: There's a free scanner to check your kit. Bad news: Still no fix

530K people's info feared stolen from cloud PC gaming biz Shadow

Will players press start to continue with this outfit?

Arm patches GPU driver bug exploited by spyware to snoop on targets

As Qualcomm warns of similar fixes coming for its chips

'Gay furry hackers' brag of second NATO break-in, steal and leak more data

'No impact on missions,' military powerhouse insists

FTC: Please stop falling for social media scams, you've given crooks at least $650M so far this year

Internet considered harmful

Feds hopelessly behind the times on ransomware trends in alert to industry

Better late than never, we guess

IT networks under attack via critical Confluence zero-day. Patch now

'Handful' of customers hit so far, public-facing instances at risk

Routers have been rooted by Chinese spies, US and Japan warn

BlackTech crew looking to steal sensitive data traffic

PhD student guilty of 3D-printing 'kamikaze' drone for Islamic State terrorists

'Research purposes' excuse didn't fly