A cybercriminal group specializing in social engineering campaigns compromised both MGM Resorts and Caesars Entertainment this month, and the disruption continues for MGM.
The attacks highlight the complexity of the cybercriminal ecosystem, composed of multiple threat actors with various methods and specializations, and the perverse outcomes of paying ransomware demands.
The methods used by the group behind the MGM and Caesars attacks may serve as a preview of what banks may face as it expands from targeting business process outsourcers, as the threat actor did
Scattered Spider, the threat actor
Google-owned cybersecurity firm Mandiant said Scattered Spider began changing its tactics this year by deploying ransomware and targeting a broader swath of companies, including those in hospitality, retail, media and entertainment and financial services.
As part of this shift in tactics, Scattered Spider has started working with the Alphv threat group, which deploys Black Cat ransomware, according to Charles Carmakal, the chief technology officer at Mandiant. Alphv acts as a kind of software vendor to Scattered Spider and others.
"Alphv is a ransomware-as-a-service operation that works with many different discrete affiliates. One of those affiliates is UNC3944," Carmakal said in
Over the past few months, the group has started to deploy BlackCat ransomware, which is a
Alphv has had its hand in other recent intrusions, including briefly claiming responsibility for a disruption of
One security researcher said the total number of consumers who had data stolen in MoveIt breaches exceeds 20 million, and more are expected to be reported.
According to cybersecurity firm Trellix, Scattered Spider
MGM has not said what data, if any, the Scattered Spider and Alphv groups stole from it. The hacking groups told
Most MGM systems
Caesars Entertainment, which operates properties including Caesars Palace on the Las Vegas Strip, told the Securities and Exchange Commission on Friday that it had
The breach did not disrupt any of the company's systems but did compromise drivers' license numbers and Social Security numbers for "a significant number" of Caesars loyalty program members.
Caesars Entertainment did not respond to American Banker's request for comment.
Caesars paid a ransom to the hackers, according to reports from
In other words, Caesars paid despite having no guarantees that paying would do anything, according to
"That is an EXTREMELY artful way of saying, oh yea we paid even though we know ransomware groups are lying bastards who won't actually delete the data," Liska said in
The FBI advises against paying ransoms.
"The FBI does not support paying a ransom in response to a ransomware attack," the
The FBI also notes that paying ransoms to cybercriminals "encourages perpetrators to target more victims and offers an incentive for others to get involved in this type of illegal activity."