Caesars Entertainment pays ransom to hackers

September 15, 2023

Caesars Entertainment, one of the world’s largest casino operators, has reportedly paid “tens of millions of dollars” to hackers who threatened to release company data, according to Bloomberg.

The attack was reportedly perpetrated by a group called Scattered Spider (aka UNC 3944), a group skilled at using social engineering to bypass corporate network security.

Scattered Spider’s members, some as young as 19, are believed to operate from the United States and the United Kingdom. Their campaign against Caesars began as early as August 27th, with the group gaining access to an external vendor before infiltrating the company’s inner sanctum.

Once inside the network, Scattered Spider reportedly exploited vulnerabilities and used tools like “Stonestop” to evade security software. Stonestop is a type of malware that can disable security software and steal data.

It is unclear how much data was stolen in the attack, but Caesars has not disclosed any evidence that customer data was compromised. The company is expected to disclose the attack “imminently” in a regulatory filing.

Scattered Spider is known for using social engineering to gain access to corporate networks. Social engineering is a type of attack that relies on human error and manipulation to trick victims into revealing confidential information or clicking on malicious links.

The sources for this piece include an article in Engadget.

Top Stories

Related Articles

March 5, 2026 Check Point Software on Wednesday launched a dedicated Canada data region for its CloudGuard Web Application Firewall more...

March 5, 2026 A small development company in Mexico says a compromised Google Cloud API key triggered more than $82,000 more...

March 2, 2026 Thousands of exposed Google Cloud API keys can authenticate to Gemini endpoints when the Generative Language API more...

March 2, 2026 Threat actors are exploiting Microsoft Entra ID through Open Authorization (OAuth) consent abuse, using seemingly legitimate third-party more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn