Skip To Main Content 2026 Ransomware Resilience Benchmark Report
Get the Report

In recent weeks, the cybersecurity world was rocked by two high-profile ransomware attacks targeting industry giants MGM Resorts and Caesars Entertainment, both prominent players in the casino and hotel sector. These incidents not only caused operational disruptions but also exposed sensitive customer data. As organizations increasingly invest in top-tier security solutions to protect against such threats, this recent attack is a stark reminder that relying solely on prevention-based strategies can not provide an absolute defense. This blog will summarize these attacks’ key details and emphasize the urgent need for robust ransomware containment measures.

The MGM Resorts Ransomware Attack

On September 11th, MGM Resorts became the epicenter of a cyber crisis. The company experienced widespread system outages and service disruptions across its Las Vegas and Atlantic City properties. Both customers and MGM employees faced numerous issues as a result. Reservations were erased, and existing keycards malfunctioned, forcing hotel staff to spend hours resolving room access issues for customers and costing MGM thousands in cancellation and change fees—which were waived as guests whose reservations weren’t erased canceled their upcoming trips. All gambling and betting had to be manually tracked, with only cash available for exchange, causing further security issues throughout casino floors.

MGM’s systems were down for 10 days, costing the company an estimated $8.4 million per day and roughly $850 million in market value as their stock dipped 12.5%. Unlike Caesars, MGM declined to pay the ransom demanded. As a result, personal information, including social security numbers and bank account info for more than 10.6 million customers, was leaked. However, the servers and data held by the hackers were held hostage, forcing MGM to use the backup servers to restore operations.

This attack, attributed to an affiliate of the notorious ransomware group Alphv (also known as BlackCat), is a stark example of the crippling impact ransomware can have on even the most robust organizations.

The Caesar Casino Data Breach

Caesars Entertainment disclosed a data breach in a separate alarming incident through a regulatory filing. The attack exposed sensitive customer information from their Caesars Loyalty Rewards database, including Social Security numbers and driver’s license details. Even more shocking is that Caesars reportedly paid a $15 million ransom to prevent the release of stolen customer data and restore their systems. This incident vividly underscores the financial and reputational risks associated with ransomware attacks. So far, according to Caesars, this customer info has not been released.

Attack Methods

Unlike many recent cyberattacks where hackers have breached systems via email phishing, USB ports, or IoT, the attacks on MGM and Caesars were done via social engineering tactics. Scattered Spider is unique because its members are primarily younger and based in the U.S. and U.K. In MGM’s case, a group member found an MGM employee on LinkedIn and then called the company’s help desk, impersonating said employee. Within a 10-minute phone call, they could hack MGM’s system using that employee’s admin credentials. Caesars was infiltrated through a third-party outsourced IT services contractor using similar tactics.

It is worth noting that given their cash flow and treasure troves of sensitive customer data, casinos such as MGM and Caesars have best-of-breed solutions in place to help mitigate potential threats. This includes EDRs, malware detection, email scanners, and even red teams whose sole purpose is identifying vulnerabilities before hackers can exploit them. Yet, these sophisticated security measures were all thwarted by a fraudulent phone call to the IT departments that help administer them.

These attacks highlight a very important fact of cybersecurity that, until now, has been overlooked: sometimes, all the prevention in the world is still not enough. Not even well-funded, heavily secured, and monitored casinos are immune.

As Emily Phelps, Director of Cyware, was quoted in CPO Magazine: “If organizations take away anything from the Caesars ransomware attack, let it be a reminder that human behavior is one of the most common vulnerabilities threat actors exploit. Technologies change rapidly. Human behavior doesn’t. Improving security awareness must be an ongoing effort, and it is only the beginning. To minimize social engineering risks, it’s important to ensure you require multifactor authentication, ideally using different types of authentication, such as a passphrase and an authenticator app..”

As Phelps notes, organizations need to do more. With increasingly sophisticated attack methods, preventative measures will never be enough. Whether the attack comes from an endpoint or a fraudulent phone call, containment protects against even human error.

The Crucial Role of Ransomware Containment

The MGM Resorts and Caesar Casino incidents serve as a wake-up call for organizations of all sizes. Although they invested in the best-in-breed prevention-based security tools such as EDRs, email gateways, firewalls, MFA, etc., neither casino could detect and prevent the attack. The cybercriminals were still successful at getting through and caused significant damage to their IT infrastructure.

To protect against the rising tide of ransomware attacks, organizations must augment their preventative measures with automated ransomware containment solutions to address the attacks that eventually get through. These solutions extend beyond traditional cybersecurity measures, focusing on rapid detection of an active attack, isolation of the compromised user and device, and containment of the data encryption and exfiltration that takes place.

As technology advances, attack vectors increase. Even the most sophisticated prevention measures cannot cover every single ingress, as new methods consistently pop up and groups such as Scattered Spider take advantage of social engineering. Containment, however, is ingress agnostic. With containment solutions, attacks can be halted as soon as they are initiated, preventing data encryption, isolating the affected endpoint(s), and preventing operation downtime.

Learn More

BullWall offers a ransomware penetration test to help you assess how your current tools respond to various ransomware variants. You can request one here or schedule a demo of our containment solution.

RECENT BLOGS

The Cyber Assessment Framework

Why CAF 4.0 Demands a Ransomware-First Mindset — and How BullWall Delivers It The CAF 4.0 Challenge for Executives CAF 4.0 isn’t just another compliance...

Read More

CIS18 Ransomware Compliance

Augmenting CIS18 Ransomware Compliance with BullWall: Strengthening Ransomware Defence Through Automated Containment In today’s cyber landscape, defending against ransomware isn’t just a best practice, it’s...

Read More

DORA Ransomware Compliance

How BullWall Helps Financial Institutions Strengthen DORA Ransomware Compliance As cyberattacks on financial services continue to rise in scale and sophistication, the European Union’s Digital...

Read More

GDPR Ransomware Compliance

How BullWall Supports GDPR Ransomware Compliance and Resilience Against Ransomware Under the General Data Protection Regulation (GDPR), organizations are held to a high standard when...

Read More

HIPAA Ransomware Compliance

HIPAA Ransomware Compliance and the Critical Role of BullWall in Healthcare Cyber Resilience In healthcare, cybersecurity is no longer just an IT issue; it's a...

Read More

NIST Ransomware Compliance

Bridging the NIST Gap: How BullWall Strengthens Cyber Resilience for Regulated Organizations As organizations across government, defence, healthcare, and other regulated sectors face mounting pressure...

Read More

SOX Ransomware Compliance

Ransomware and SOX: Why Cybersecurity Is Now a Financial Compliance Issue The Sarbanes-Oxley Act (SOX) was enacted to improve financial transparency and protect investors from...

Read More

What Is Ransomware Protection?

BullWall Orange Background

Building True Ransomware Resilience Ransomware has rapidly evolved from an opportunistic threat into a highly scalable, continuously optimized criminal business model. What began as simple...

Read More

Securing VMware Environments in an Era of Escalating Cyber Threats

BullWall Blue & Black Background with Logos

Protect Your Virtual Environment from Ransomware Ransomware has evolved into one of the most disruptive threats in cybersecurity, and virtualized environments have become an increasingly...

Read More