Open Side Menu Go to the Top
Register
MGM Cyberattack MGM Cyberattack

09-14-2023 , 09:05 AM
I have always wondered about Casino IT security. I can name you atleast 3 Las Vegas casinos that I've visited recently and I've noticed an extremely out-of-date Windows OS being used within plain sight.

Are these airgapped, highly firewalled computers? I hope so...

but when I see casinos with Windows 7 and Windows 8 machines in use, in plain sight and I can see this as a casual customer, I have to wonder what an unethical threat actor must think knowing that there are dozens of known vulnerabilities for these operating systems. Most organizations have policies prohibiting EOL operating systems.

These types of vulnerable systems can be used a pivot point for a future attack, should they somehow gain access.

These are just my arm chair anecdotal observations. I really wouldn't be surprised if the social engineering story is true. There are plenty of well educated, highly informed people who fall for these sorts of things all day, every day.
MGM Cyberattack Quote
09-14-2023 , 09:16 AM
Quote:
Originally Posted by easyfnmoney
Most organizations have policies prohibiting EOL operating systems.
And a lot of them make exceptions for systems that run legacy software even though they really shouldn't. I recently saw a computer run Windows 3.1 (albeit in a virtual machine) for a vector graphics software from the early 90s. Obviously asked if I could play some original Minesweeper.
MGM Cyberattack Quote
09-14-2023 , 10:02 AM
The US Military still uses Windows XP.
MGM Cyberattack Quote
09-14-2023 , 11:43 AM
Quote:
Originally Posted by Doctor_Strangelove
The US Military still uses Windows XP.
Yeah and they pay Microsoft very large sums for patches and updates for it. You can get Microsoft to support any EOL OS' if you have enough money.

See people post things like this without any context and understanding that Microsoft still supports these things. It's not like they are running Windows XP without any kind of patching for vulnerabilities in the last 10 years.
MGM Cyberattack Quote
09-14-2023 , 11:54 AM
Quote:
Originally Posted by easyfnmoney
These are just my arm chair anecdotal observations. I really wouldn't be surprised if the social engineering story is true. There are plenty of well educated, highly informed people who fall for these sorts of things all day, every day.
From what I'm reading, I'm starting to think there was likely was an element of social engineering in play.

How many times do we hear about underpaid employees who DNGAF and throw out all of their training because they fell prey to a skilled social engineer?

To that $18 an hour employee, who cares if they get fired. There's plenty of places that pay that.

My point being, when corporations start paying people a living wage, they might take their training more seriously since this is a job they may not want to lose. If said person who was social engineered was paid way more than that, yikes, shame on MGM for hiring folks and not constantly reminding them of their IT policies to help promote social engineering awareness.

I think sometime in the mid 2010s, cybercrime became more profitable than the drug trade. Most people do not realize this, and it will only get worse from here unless people and organizations start taking things more seriously. Once this is taken more seriously, the biggest threat, in my mind, would be insider threats.
MGM Cyberattack Quote
09-14-2023 , 12:07 PM
There are some extremely sharp poker playing cyber security professionals in the world.

I feel like poker and cyber have a lot of cross over, and that's something that isn't commonly pointed out.

Like poker, cyber is a game of incomplete information. To be good at cyber, you have to be good at predicting what people will do, or what they may be capable of doing. You literally have to plug leaks when you find them (I.e. patch a server, firewall rules, etc)

Ive probably went to far off topic, but wanted to point that out there is a potential for poker skillset crossover for anyone thinking about a career in cybersecurity.
MGM Cyberattack Quote
09-14-2023 , 02:21 PM
Quote:
Originally Posted by easyfnmoney
There are some extremely sharp poker playing cyber security professionals in the world.

I feel like poker and cyber have a lot of cross over, and that's something that isn't commonly pointed out.

Like poker, cyber is a game of incomplete information. To be good at cyber, you have to be good at predicting what people will do, or what they may be capable of doing. You literally have to plug leaks when you find them (I.e. patch a server, firewall rules, etc)

Ive probably went to far off topic, but wanted to point that out there is a potential for poker skillset crossover for anyone thinking about a career in cybersecurity.
this is a bit of a stretch IMO
MGM Cyberattack Quote
09-14-2023 , 02:45 PM
Quote:
Originally Posted by PUSATFH
this is a bit of a stretch IMO
Maybe, maybe not.. but some of the top cyber security researchers call themselves Poker Players and I thought that was interesting.

https://www.cybersecpeople.com/podca...kelton-codingo
MGM Cyberattack Quote
09-14-2023 , 02:52 PM
There's plenty of overlap.

Poker is a puzzle to be solved. So is cyber. There are weaknesses you target if you're on the attack and weaknesses to protect if you're on defence. There's lots of skills to learn and a lot of depth to all of them. It's an entirely appropriate comparison imo.
MGM Cyberattack Quote
09-14-2023 , 04:49 PM
Im an idiot with this kind of stuff.

How long can this take mgm to get this fixed?
MGM Cyberattack Quote
09-14-2023 , 05:17 PM
A lot easier to pay the "foolish" employee $10K and pretend you conned them than to run the risk your con fails.
MGM Cyberattack Quote
09-14-2023 , 05:42 PM
Should I be worried if I have funds in my front $ account?
MGM Cyberattack Quote
09-14-2023 , 06:38 PM
Quote:
Originally Posted by borg23
Im an idiot with this kind of stuff.

How long can this take mgm to get this fixed?
They’re claiming 2 weeks… but I’ll take the under.

How hard could getting a network back up possibly be?
MGM Cyberattack Quote
09-14-2023 , 06:40 PM
Quote:
Originally Posted by madchens123
Yeah and they pay Microsoft very large sums for patches and updates for it. You can get Microsoft to support any EOL OS' if you have enough money.

See people post things like this without any context and understanding that Microsoft still supports these things. It's not like they are running Windows XP without any kind of patching for vulnerabilities in the last 10 years.
What’s the benefit of them doing it this way rather than just upgrading the OS?
MGM Cyberattack Quote
09-14-2023 , 06:50 PM
Source: https://gist.githubusercontent.com/B.../gistfile1.txt

Quote:
Statement on MGM Resorts International: Setting the record straight
9/14/2023, 7:46:49 PM

We have made multiple attempts to reach out to MGM Resorts International, "MGM". As reported, MGM shutdown computers inside their network as a response to us. We intend to set the record straight.

No ransomware was deployed prior to the initial take down of their infrastructure by their internal teams.

MGM made the hasty decision to shut down each and every one of their Okta Sync servers after learning that we had been lurking on their Okta Agent servers sniffing passwords of people whose passwords couldn't be cracked from their domain controller hash dumps. Resulting in their Okta being completely locked out. Meanwhile we continued having super administrator privileges to their Okta, along with Global Administrator privileges to their Azure tenant. They made an attempt to evict us after discovering that we had access to their Okta environment, but things did not go according to plan.

On Sunday night, MGM implemented conditional restrictions that barred all access to their Okta (MGMResorts.okta.com) environment due to inadequate administrative capabilities and weak incident response playbooks. Their network has been infiltrated since Friday. Due to their network engineers' lack of understanding of how the network functions, network access was problematic on Saturday. They then made the decision to "take offline" seemingly important components of their infrastructure on Sunday.

After waiting a day, we successfully launched ransomware attacks against more than 100 ESXi hypervisors in their environment on September 11th after trying to get in touch but failing. This was after they brought in external firms for assistance in containing the incident.

In our MGM victim chat, a user suddenly surfaced a few hours after the ransomware was deployed. As they were not responding to our emails with the special link provided (In order to prevent other IT Personnel from reading the chats) we could not actively identify if the user in the victim chat was authorized by MGM Leadership to be present.

We posted a link to download any and all exfiltrated materials up until September 12th, on September 13th in the same discussion. Since the individual in the conversation did not originate from the email but rather from the hypervisor note, as was already indicated, we were unable to confirm whether they had permission to be there.

To guard against any unneeded data leaking, we added a password to the data link we provided them. Two passwords belonging to senior executives were combined to create the password. Which was clearly hinted to them with asterisks on the bulk of the password characters so that the authorized individuals would be able to view the files. The employee ids were also provided for the two users for identification purposes.

The user has consistently been coming into the chat room every several hours, remaining for a few hours, and then leaving. About seven hours ago, we informed the chat user that if they do not respond by 11:59 PM Eastern Standard Time, we will post a statement. Even after the deadline passed, they continued to visit without responding. We are unsure if this activity is automated but would likely assume it is a human checking it.

We are unable to reveal if PII information has been exfiltrated at this time. If we are unable to reach an agreement with MGM and we are able to establish that there is PII information contained in the exfiltrated data, we will take the first steps of notifying Troy Hunt from HaveIBeenPwned.com. He is free to disclose it in a responsible manner if he so chooses.

We believe MGM will not agree to a deal with us. Simply observe their insider trading behavior. You believe that this company is concerned for your privacy and well-being while visiting one of their resorts?

We are not sure about anyone else, but it is evident from this that no insiders have purchased any stock in the past 12 months, while 7 insiders have sold shares for a combined 33 MILLION dollars. (https://www.marketbeat.com/stocks/NY...nsider-trades/). This corporation is riddled with greed, incompetence, and corruption.

We recognize that MGM is mistreating the hotel's customers and really regret that it has taken them five years to get their act together. Other lodging options, including casinos, are undoubtedly open and happy to assist you.

At this point, we have no choice but to criticize VX Underground for falsely reporting events that never happened. We typically consider their information to be highly reliable and timely, but we did not attempt to tamper with MGM's slot machines to spit out money because doing so would not be to our benefit and would decrease the chances of any sort of deal.

The rumors about teenagers from the US and UK breaking into this organization are still just that—rumors. We are waiting for these ostensibly respected cybersecurity firms who continue to make this claim to start providing solid evidence to support it. Starting to the actors' identities as they are so well-versed in them.

The truth is that these specialists find it difficult to delineate between the actions of various threat groupings, therefore they have grouped them together. Two wrongs do not make a right, thus they chose to make false attribution claims and then leak them to the press when they are still unable to confirm attribution with high degrees of certainty after doing this. The tactics, procedures, and indicators of compromise (TTPs) used by the people they blame for the attacks are known to the public and are relatively easy for anyone to imitate.

The ALPHV ransomware group has not before privately or publicly claimed responsibility for an attack before this point. Rumors were leaked from MGM Resorts International by unhappy employees or outside cybersecurity experts prior to this disclosure. Based on unverified disclosures, news outlets made the decision to falsely claim that we had claimed responsibility for the attack before we had.

We still continue to have access to some of MGM's infrastructure. If a deal is not reached, we shall carry out additional attacks. We continue to wait for MGM to grow a pair and reach out as they have clearly demonstrated that they know where to contact us.
https://mgmresorts.com
MGM Cyberattack Quote
09-14-2023 , 07:05 PM
Along with personal files this is probably some form of a DDOS attack, flooding MGM's servers inoperable. Somewhat amusing to think about the Casino Giants squirming. Robbed people of billions, now the tables turn and they get exploited. I'd pay up, buy time for adapting to an entirely new system. But we know how big these Egos are.
MGM Cyberattack Quote
09-14-2023 , 07:10 PM
Quote:
Originally Posted by SetTheLine
Along with personal files this is probably some form of a DDOS attack, flooding MGM's servers inoperable. Somewhat amusing to think about the Casino Giants squirming. Robbed people of billions, now the tables turn and they get exploited. I'd pay up, buy time for adapting to an entirely new system. But we know how big these Egos are.
If you read the ^^ gist, they've been completely owned, are locked out of all their own servers, and are refusing to negotiate. This thread sounds like when Trump tried to talk about "the cyber". Are you all MGM's IT team?
MGM Cyberattack Quote
09-14-2023 , 08:32 PM
Quote:
Originally Posted by SenatorKevin
I don't know anything about IT or understand a lot of that statement so perhaps this is my ignorance talking, but if it were directed at me I would be terrified.
MGM Cyberattack Quote
09-14-2023 , 09:21 PM
Quote:
Originally Posted by L0LWAT
If you read the ^^ gist, they've been completely owned, are locked out of all their own servers, and are refusing to negotiate. This thread sounds like when Trump tried to talk about "the cyber". Are you all MGM's IT team?
so what does this mean exactly? if they don't pay up they're ****ed for a very long time?
MGM Cyberattack Quote
09-14-2023 , 09:42 PM
Quote:
Originally Posted by borg23
so what does this mean exactly? if they don't pay up they're ****ed for a very long time?
Here, I'll translate some to less technical words:


Quote:
We have made multiple attempts to reach out to MGM Resorts International, "MGM". As reported, MGM shutdown computers inside their network as a response to us. We intend to set the record straight.
They tried to talk to MGM, but MGM won't respond.

Quote:
No ransomware was deployed prior to the initial take down of their infrastructure by their internal teams.
They didn't use ransomware until MGM shut it's systems down.

Quote:
MGM made the hasty decision to shut down each and every one of their Okta Sync servers after learning that we had been lurking on their Okta Agent servers sniffing passwords of people whose passwords couldn't be cracked from their domain controller hash dumps. Resulting in their Okta being completely locked out. Meanwhile we continued having super administrator privileges to their Okta, along with Global Administrator privileges to their Azure tenant. They made an attempt to evict us after discovering that we had access to their Okta environment, but things did not go according to plan.
MGM shut down their internal authentication servers and locked themselves out.

Quote:
On Sunday night, MGM implemented conditional restrictions that barred all access to their Okta (MGMResorts.okta.com) environment due to inadequate administrative capabilities and weak incident response playbooks. Their network has been infiltrated since Friday. Due to their network engineers' lack of understanding of how the network functions, network access was problematic on Saturday. They then made the decision to "take offline" seemingly important components of their infrastructure on Sunday.
MGM no longer had admin access to their servers and their security team is bad at their job.

Quote:
After waiting a day, we successfully launched ransomware attacks against more than 100 ESXi hypervisors in their environment on September 11th after trying to get in touch but failing. This was after they brought in external firms for assistance in containing the incident.
MGM didn't respond so ransomware was deployed.

Quote:
In our MGM victim chat, a user suddenly surfaced a few hours after the ransomware was deployed. As they were not responding to our emails with the special link provided (In order to prevent other IT Personnel from reading the chats) we could not actively identify if the user in the victim chat was authorized by MGM Leadership to be present.
MGM logged into chat, but didn't adequately identify themselves as authorized MGM personnel.


That's pretty much it, It says MGM is incompetent and not cooperating with hackers. If the posted text is legit, MGM can't do anything but cooperate as all data compromised and the hackers own their servers.
MGM Cyberattack Quote
09-14-2023 , 10:45 PM
any guesses to how much Caesars paid or how much the Hackers want from MGM?
MGM Cyberattack Quote
09-14-2023 , 11:35 PM
Quote:
Originally Posted by sickhuman
any guesses to how much Caesars paid or how much the Hackers want from MGM?
I read they originally demanded Caesars pay 30 million but Caesars negotiated down to 15 million lol, what a world
MGM Cyberattack Quote
09-15-2023 , 12:51 AM
Quote:
Originally Posted by tiger24
I read they originally demanded Caesars pay 30 million but Caesars negotiated down to 15 million lol, what a world
Caesars cyber insurance probably covered up-to 15 million, so 15 million was what they paid....
MGM Cyberattack Quote
09-15-2023 , 12:59 AM
Quote:
Originally Posted by L0LWAT
Here, I'll translate some to less technical words:
That's actually a pretty good non technical summary.
MGM Cyberattack Quote
09-15-2023 , 03:01 AM
But makes the assumption that the blackmailers are telling the truth. Do you believe all criminals?
MGM Cyberattack Quote

      
m