• 07 3184 7575
  • November 6, 2023
  • 0 Comments

This Cybersecurity Threat Advisory highlights cyberattacks on MGM Resorts, a $33 billion hospitality and entertainment company operating out of Las Vegas. On Monday, September 11th, 2023, MGM Resorts experienced a ransomware attack that encrypted over 100 ESXi hypervisors and exfiltrated an unknown quantity of data. The group claiming responsibility for the attack is an advanced persistent threat (APT) group named “Scattered Spider”, an affiliate of the ALPHV/Blackcat ransomware-as-a-service operation. MGM was one of many targeted entities on the Las Vegas Strip, with Caesars paying an estimated $30 million ransom earlier this month.

What is the threat?

On Friday, September 8th, Scattered Spider reportedly gained access to the MGM network through social engineering. Within a 10-minute call, the threat actor was able to establish initial access to MGM’s environment. After gaining entry, the threat actor escalated their privileges to achieve administrator privileges in OKTA and even global administrator privileges to MGM’s Azure tenant, collecting and dumping passwords along the way.

In response to the breach, the company attempted (unsuccessfully) to shut down network access to sensitive devices. After electing to not pay the ransom, on Sunday, September 10th, Scattered Spider deployed BlackCat ransomware and encrypted over 100 ESXi hypervisors, causing even more destruction and disruption. Scattered Spider claims that they hacked MGM in response to their alleged insider trading behavior.

Why is it noteworthy?

This event highlights the importance of cybersecurity awareness training for all employees. A small mistake by a single user was all it took to incur extensive financial and reputation damages. To prevent similar events, businesses should implement MFA and, more importantly, stringent authentication and authorization monitoring. In addition, MGM failed to recognize the scope of the compromise when conducting their incident response. This resulted in an incomplete eradication of the threat. To improve incident response, businesses should develop a comprehensive incident response plan, infrastructure documentation, and conduct table-top exercises.

What are the recommendations?

  • Employ proactive monitoring for all common attack surfaces, especially cloud and internal services for signs of compromise,
  • Implement MFA for all users, privileged or not,
  • Conduct security awareness training, especially for employees who are expected to receive calls such as help desk personnel.
Previous Post
Cybersecurity Threat Advisory: Apple releases patches for zero-day vulnerabilities
Next Post
What is malware?

Subscribe to our newsletter

Subscribe to our newsletter and get the latest updates on news, technology, tips, and tricks on how to securing your business.


Join Our Newsletter

Please complete this form to create an account, receive email updates and much more.
  *
 
 
*Required Fields
Note: It is our responsibility to protect your privacy and we guarantee that your data will be completely confidential.