For five months, the hacker collective ShinyHunters had unfettered access to Wynn Resorts’ Oracle PeopleSoft system. They moved through 800,000+ employee records — Social Security numbers, salaries, birthdates, government IDs, phone numbers, job titles — and nobody at Wynn detected them. When ShinyHunters finally went public on February 20, 2026, demanding $1.5 million in Bitcoin to not dump the data, it wasn’t a surprise to anyone following the casino industry’s cybersecurity record. It was the fifth major casino data breach in eighteen months. And the attackers used the same playbook every time.

KEY FACTS AT A GLANCE
- Breach Period: September 2025 (initial access) — February 20, 2026 (public disclosure)
- Records Exposed: 800,000+ current and former employee records
- Data Types: SSNs, salaries, birthdates, government IDs, emails, phone numbers, job positions
- Threat Actor: ShinyHunters (now merged with Scattered Spider and LAPSUS$)
- Attack Vector: Oracle PeopleSoft vulnerability + employee credentials
- Ransom Demand: 22.34 BTC (~$1.5 million) with February 23 deadline
- Wynn’s Cumulative Fines: $155.6M+ in regulatory penalties since 2019
- Class Action: Reed v. Wynn Resorts — filed February 21, 2026, seven counts
Five Breaches, One Playbook, Zero Lessons
The Wynn Resorts breach isn’t an isolated incident. It’s the latest entry in a pattern that should alarm anyone who has ever handed a casino their Social Security number, signed up for a loyalty program, or swiped a player’s card. Since August 2023, five major casino operators have been breached — and the attack methods haven’t evolved. Social engineering, credential theft, help-desk impersonation, and exploiting unpatched software. The hackers aren’t getting more sophisticated. The casino industry simply refuses to learn.
| Date | Target | Attack Vector | Impact | Outcome |
|---|---|---|---|---|
| Aug 2023 | Caesars Entertainment | Social engineering on third-party IT vendor; help-desk impersonation | Loyalty database of 65M+ members breached; a significant number of SSNs, driver’s licenses stolen | Paid $15M ransom (negotiated from $30M) |
| Sep 2023 | MGM Resorts | 10-minute phone call to IT help desk using LinkedIn intel | Full system shutdown — slots, check-in, elevators, reservations offline for 10 days | $100M+ in losses; refused to pay ransom |
| Jan 2025 | Oyo Las Vegas | LockBit 3.0 ransomware attack | ~4,700 guests, employees, and business partners; 30GB data leaked | Hidden for 8 months; publicly disclosed Sep 2025 |
| Sep 2025 | Boyd Gaming | Unauthorized access Sep 5–7; vector not publicly disclosed | 11,000+ employee SSNs, driver’s licenses, passport numbers, DOBs | SEC 8-K filed Sep 23; five class-action lawsuits |
| Sep 2025 – Feb 2026 | Wynn Resorts | Oracle PeopleSoft vulnerability + employee credentials (social engineering or purchased access) | 800,000+ employee records — SSNs, salaries, birthdates, government IDs | $1.5M ransom demand; class-action filed Feb 21 |
The timeline above doesn’t include every incident. In July 2025, Flutter Entertainment — parent company of FanDuel, Paddy Power, and Betfair — confirmed that 800,000 UK and Ireland customer accounts were compromised through a third-party vulnerability. In August 2025, Bragg Gaming Group disclosed that hackers had breached its internal computer environment. Neither company has faced regulatory penalties for these failures.
The critical pattern: Scattered Spider used a ten-minute phone call to cripple MGM Resorts in September 2023. Two years later, ShinyHunters used an unpatched Oracle PeopleSoft vulnerability and stolen credentials to sit inside Wynn’s systems for five months. The sophistication hasn’t changed — it’s still social engineering and exploiting known weaknesses. Industry-wide, attacks on gambling platforms have surged — with industry reports estimating a 37% year-over-year increase in 2025. The casino sector remains one of the most frequently targeted industries in cybersecurity.
When Caesars was breached, the FBI later tracked and tracked the $15 million Bitcoin ransom payment through the Avalanche Bridge using Chainalysis blockchain analysis tools — freezing 277.56 BTC before criminals could cash out, though 125 BTC had already moved beyond reach. The investigative apparatus exists. What doesn’t exist is the industry’s willingness to invest in preventing these attacks from happening in the first place.
Billion-Dollar Revenues, Bargain-Bin Security
To understand why the casino industry keeps getting breached, look at what they collect versus what they spend to protect it. Casinos operate under some of the most data-intensive regulatory requirements of any consumer-facing business — and then layer voluntary loyalty program data collection on top of it. The result is a data footprint that rivals or exceeds what your bank holds on you.
WHAT CASINOS KNOW ABOUT YOU VS. WHAT YOUR BANK KNOWS
WHAT CASINOS COLLECT
- Full legal name, date of birth, home address
- Social Security Number (required for W-2G tax reporting on jackpots $1,200+ for slots, $5,000+ for poker)
- Driver’s license, passport, government ID
- Financial account information, credit lines
- Currency transaction reports (any cash over $10,000)
- Complete gambling behavioral data — every spin, hand, and wager
- Hotel stays, dining, shows, spa, retail purchases
- Geolocation data via mobile apps
- Device data (mobile ID, operating system, IP address)
- Biometric data (in some jurisdictions)
WHAT YOUR BANK COLLECTS
- Full legal name, date of birth, home address
- Social Security Number
- Government-issued ID
- Account and transaction history
- Credit score and financial profile
- Employment and income verification
- Device and login data
Banks collect less behavioral data — but spend 500x more protecting what they have.
The SSN requirement isn’t optional. Federal law (Title 31, Bank Secrecy Act) requires casinos to file Currency Transaction Reports for any cash transaction over $10,000, and the IRS requires Form W-2G for gambling winnings above specific thresholds. Every time someone hits a qualifying jackpot, the casino needs their Social Security number. Add loyalty program enrollment — which casinos aggressively incentivize through tiered comp systems — and you get a data profile that includes not just identity documents but a complete behavioral map of how someone spends their leisure time and money.
The difference between sweepstakes casinos and real-money casinos matters here too. Real-money casinos operating under state gaming commissions collect the most sensitive data because compliance mandates it. Sweepstakes platforms may collect less, but the regulatory expectations for protecting that data remain just as undefined. When the Caesars breach exposed a loyalty database containing up to 65 million members — with a significant number of SSNs, driver’s licenses, passport numbers, geolocation data, biometric information, and health information — it revealed that a single casino loyalty database can contain more sensitive personal data than most financial institutions.
Now look at the spending disparity.
| Entity | Annual Cybersecurity Spend | Context |
|---|---|---|
| JPMorgan Chase | ~$1B/year | 62,000 technologists; budget doubled from earlier $600M; CEO calls cybersecurity “the biggest threat to the U.S. financial system” |
| Bank of America | $1B+/year | “Unlimited” cybersecurity budget — the only department with no spending constraint |
| HSBC | $600–750M/year | Cybersecurity is now HSBC’s largest single operational cost |
| Financial services sector average | ~15% of IT budgets | 83% of banks planned cybersecurity budget increases in 2023; average 21% increase over prior year |
| Average casino operator | Not publicly disclosed | No major casino operator publicly reports cybersecurity spending |
| Casino industry aggregate | Unknown | No publicly available aggregate cybersecurity spending data exists for the casino industry |
JPMorgan Chase now spends approximately $1 billion per year on cybersecurity with 62,000 technologists. Bank of America has described its cybersecurity budget as “unlimited” — the only department in the company with no spending cap. HSBC’s CEO has called cybersecurity the bank’s single largest operational cost. The global cybersecurity market for banking alone was valued at $74.3 billion in 2022 and is projected to reach $282 billion by 2032.
The casino industry? There is no comparable market data, because the industry doesn’t publicly track or disclose aggregate cybersecurity spending. No major casino operator publishes its cybersecurity budget — a silence that itself tells the story. A Saturn Partners casino cybersecurity compliance report from June 2025 identified a systemic vulnerability: “flat network architecture between guest systems, surveillance, and gaming environments” that enables attackers to move laterally once inside. The report also flagged a lack of Zero Trust architecture, unpatched systems, and undertrained staff as industry-wide weaknesses.
THE REGULATORY GAP NOBODY IS TALKING ABOUT
In 2025, Nevada gaming regulators collected approximately $32.3 million in anti-money-laundering fines from four Strip casinos: Resorts World Las Vegas ($10.5M), MGM Resorts ($8.5M), Caesars Entertainment ($7.8M), and Wynn Resorts ($5.5M).
In that same period, how much has Nevada fined casinos for cybersecurity failures — despite more than $100 million in breach-related costs, 65+ million exposed customer records, and five separate attacks?
Zero dollars.
Banking operates under a multi-layered federal cybersecurity framework: the FFIEC (Federal Financial Institutions Examination Council) develops uniform cybersecurity standards for all federally regulated banks. The NYDFS (New York Department of Financial Services) Cybersecurity Regulation requires a dedicated CISO, penetration testing, multi-factor authentication, encryption of nonpublic information, and annual compliance certifications — with penalties up to $2,500 per day per violation. Since 2022, NYDFS has issued at least eleven consent orders and levied millions in fines against financial institutions for cybersecurity failures. The GLBA (Gramm-Leach-Bliley Act) adds federal requirements for safeguarding consumer data.
What do casinos face? Nevada’s NRS 463.0129, which went into effect January 1, 2023, requires casinos to notify the Nevada Gaming Control Board within 72 hours of a confirmed cyberattack and take “reasonable measures” to protect systems. That’s it. No mandatory spending floors. No required encryption standards. No CISO mandate. No penetration testing requirements. And despite the Board stating it “reserves the right to take action” against operators that fail to implement reasonable measures, that right has never been exercised. The NGCB held workshops after the 2023 MGM and Caesars disasters and proposed updated reporting rules — but levied no cybersecurity-specific penalties against either company.
Nevada aggressively enforces anti-money-laundering rules. It has shown zero comparable interest in enforcing data security.
$155 Million in Fines, $0 in Accountability
If the Wynn Resorts data breach were an isolated event — a single bad day for an otherwise clean company — the response might be different. But Wynn’s regulatory record tells a different story entirely. This is a company that has paid $155.6 million in confirmed fines and forfeitures since 2019, is currently under a separate federal investigation, and is now facing a class-action lawsuit over employee data it allegedly stored unencrypted.
| Year | Violation | Amount | Authority |
|---|---|---|---|
| 2019 | Failure to investigate sexual misconduct allegations against founder Steve Wynn | $20,000,000 | Nevada Gaming Commission |
| 2024 | Conspiracy with unlicensed money transmitters; decade-long DOJ investigation into “flying money” schemes | $130,131,645 | U.S. DOJ (Non-Prosecution Agreement) |
| 2025 | AML violations — unlicensed money transfers, proxy betting, circumventing federal reporting laws | $5,500,000 | Nevada Gaming Commission (4-1 vote) |
| 2025–26 | Federal probe over alleged fraudulent liquor kickback scheme | Ongoing | DOJ (same lead prosecutor as $130M case) |
| 2026 | ShinyHunters data breach — 800K+ employee records; class-action lawsuit (7 counts) | TBD | U.S. District Court, Nevada |
| Confirmed Total | $155,631,645+ | Not including ongoing investigations or breach litigation | |
The $130.1 million DOJ forfeiture in September 2024 is believed to be the largest civil asset forfeiture by a U.S. casino based on admissions of criminal wrongdoing. The scheme involved “Qian chen” or “Flying Money” — a method where money processors collected USD cash from third parties and delivered it to Wynn patrons, who then electronically transferred foreign currency equivalents. One independent agent alone, Juan Carlos Palermo, conducted more than 200 transfers totaling over $17.7 million across more than 50 foreign patrons. Fifteen people previously admitted money laundering or other crimes and paid criminal penalties exceeding $7.5 million. The investigation spanned a decade.
The $5.5 million AML fine in May 2025 made Wynn the third Las Vegas Strip casino fined for money laundering violations in two months, after Resorts World ($10.5M in March) and MGM ($8.5M in April). The 90-minute Nevada Gaming Commission hearing produced some of the most striking regulatory language in recent memory.
“They weren’t locked up. They’re like invasive fish species. Somebody threw them back in the lake and they’ll pop up at other casinos and resorts going forward.”
— Commissioner George Markantonis, on Wynn employees terminated for AML violations
“To say the new Wynn is paying a very heavy price for the old Wynn is putting it mildly.”
— Commission Chair Jennifer Togliatti
Wynn’s leadership has repeatedly emphasized that the “new Wynn” — under CEO Craig Billings, CFO Julie Cameron-Doe, and CCO Omar Khoury — was not in position during the earlier violations. The AML violations date back to 2014; the employees involved were terminated. This defense has limits. The September 2025 data breach happened entirely under current leadership’s watch. The ongoing federal liquor kickback probe — led by the same Assistant U.S. Attorney, Carl Brooker IV, who secured the $130.1 million forfeiture — involves a current Wynn assistant VP who remains employed. This isn’t legacy baggage. The pattern of institutional failure persists across leadership regimes, as other casino operators facing legal accountability have also discovered.
The ShinyHunters Connection: A Cybercrime Merger
ShinyHunters isn’t a group of anonymous unknowns. Active since 2020 and responsible for breaches at Ticketmaster, Santander, and dozens of other targets, the collective was dealt a significant blow in June 2025 when French authorities arrested four members — known by aliases ShinyHunters, Hollow, Noct, and Depressed — in raids across Paris suburbs, Normandy, and La Réunion. All four were in their twenties and tied to the administration of BreachForums, one of the internet’s most notorious dark web marketplaces for stolen data.
Those arrests didn’t stop the operation. In August 2025 — two months after the French raids and reportedly around the same time ShinyHunters gained initial access to Wynn’s systems — the group publicly announced a merger with two other infamous collectives: Scattered Spider (the group behind the MGM and Caesars attacks) and remnants of LAPSUS$ (the teenage hacker group that breached Microsoft, Nvidia, and Samsung). The new entity, operating under the name “Scattered LAPSUS$ Hunters,” created sixteen Telegram channels and combined three distinct capabilities: ShinyHunters’ massive stolen database pipeline, LAPSUS$’s spectacle-driven extortion model, and Scattered Spider’s sophisticated social engineering skills.
By November 2025, reports surfaced of “ShinySp1d3r” — a ransomware-as-a-service platform in development designed to rival LockBit and DragonForce. And in September 2025, a seventeen-year-old from the Chicago area turned himself in to Clark County Juvenile Detention in Las Vegas — charged with extortion, conspiracy, and multiple counts of unlawful computer access related to the 2023 MGM and Caesars attacks. He was fifteen years old when those attacks occurred. The Clark County District Attorney is seeking to try him as an adult.
The fluid, decentralized structure of these groups means that arrests don’t stop operations. The same ecosystem that brought down MGM with a phone call in 2023 is now the same ecosystem that exploits the casino industry’s weakest links and sat inside Wynn’s internal systems for five months. They share infrastructure, techniques, and targets — and the casino industry remains their preferred hunting ground.
Inside the Wynn Class Action: Reed v. Wynn Resorts
On February 21, 2026 — one day after ShinyHunters’ public disclosure — California resident Richard Reed filed a federal class-action lawsuit against Wynn Resorts in U.S. District Court for the District of Nevada. The complaint contains seven counts: negligence, negligence per se, unjust enrichment, invasion of privacy, breach of fiduciary duty, breach of implied contract, and a request for declaratory judgment.
The lawsuit’s most damaging allegations go beyond the breach itself. It claims Wynn’s breach notification letter was deliberately incomplete — omitting the identity of the hackers, the root cause of the breach, the specific vulnerabilities exploited, and what remedial measures the company has taken. The complaint alleges that sensitive employee data was stored unencrypted, and that Wynn’s offer of 24 months of identity monitoring is “wholly inadequate” given that Social Security numbers create a lifetime exposure risk, not a two-year one.
As of publication, Wynn Resorts has not publicly confirmed the breach and has not responded to inquiries from multiple outlets including The Register, which first reported the ShinyHunters claim. The company’s silence stands in contrast to the scale of the exposure: 800,000+ employee records containing the most sensitive personal data an employer holds.
WHAT TO DO IF YOU’RE A CASINO REWARDS MEMBER
- Freeze your credit with all three bureaus (Equifax, Experian, TransUnion) — it’s free and takes minutes. This is the single most effective step against identity theft.
- Check if you’re affected by any of the five breaches. Caesars, MGM, Boyd, and Wynn have all sent notification letters to affected individuals. If you were a loyalty member or employee at any of these companies, check your mail and email.
- Enroll in identity monitoring if offered — but understand its limits. Boyd offered 2 years; Wynn offered 24 months. SSN exposure creates lifetime risk, not 24-month risk.
- File with the FTC at IdentityTheft.gov if you notice suspicious activity. This creates a formal record and generates a personalized recovery plan.
- Know your W-2G rights: Casinos require your SSN for jackpots above reporting thresholds ($1,200+ for slots in 2025, $2,000+ starting 2026). But you can provide it verbally — you don’t need to hand over your Social Security card.
- Weigh the trade-off: Every casino loyalty program asks you to hand over extensive personal data in exchange for comps and tier status. After five breaches in eighteen months, it’s worth asking whether the free buffet is worth the financial exposure.
KEY TAKEAWAYS
- Five major casino breaches in 18 months — Caesars, MGM, Oyo, Boyd, and now Wynn. The attack methods are the same every time: social engineering, credential theft, unpatched software.
- Casinos collect more sensitive data than banks — SSNs, government IDs, salary data, gambling behavior, geolocation, biometrics — but spend a fraction of what financial institutions invest in cybersecurity.
- Nevada collected $32.3M in AML fines in 2025 but $0 in cybersecurity fines — despite $100M+ in breach-related costs and 65+ million exposed records. Gaming regulators enforce money rules aggressively but ignore data security.
- Wynn Resorts has accumulated $155.6M+ in regulatory penalties — across sexual misconduct failures, money laundering, and federal fraud investigations. The data breach happened on the “new leadership’s” watch.
- ShinyHunters and Scattered Spider have merged — the groups that attacked MGM and Caesars in 2023 now share infrastructure with the group that breached Wynn. Arrests haven’t stopped operations.
- Five months of undetected access — ShinyHunters sat inside Wynn’s Oracle PeopleSoft system from September 2025 to February 2026 before going public. Detection capabilities across the industry are fundamentally broken.
Sources
- ShinyHunters Demands $1.5M Not to Leak Wynn Resorts Data — The Register (Feb 20, 2026)
- Wynn Class Action Lawsuit Over ShinyHunters Data Breach — Gambling Insider (Feb 24, 2026)
- Wynn Las Vegas Forfeits $130 Million for Illegally Conspiring with Unlicensed Money Transmitting Businesses — U.S. Department of Justice
- Wynn Agrees to $5.5 Million AML Fine — The Nevada Independent
- Nevada Regulators Weigh In on ‘Reputational Bruising’ in Approving $5.5M Fine — CDC Gaming Reports
- How Chainalysis Helped the FBI Track Down Caesars Casino Ransom — Chainalysis
- MGM Resorts Ransomware Attack Led to $100 Million Loss, Data Theft — Bleeping Computer
- Boyd Gaming Discloses Data Breach After Cyberattack — Bleeping Computer
- Another Las Vegas Casino Suffered Major Cyberattack — Back in January — Casino.org
- Casino Cybersecurity Compliance Report — Saturn Partners (Jun 2025)
- Cybersecurity Insights 2023: Budgets and Benchmarks for Financial Services — Deloitte
- With $600 Million Cybersecurity Budget, JPMorgan Chief Endorses AI and Cloud — SecurityWeek
- Regulators Fine Wynn Resorts $20 Million Over Sexual Misconduct Allegations — PBS NewsHour
- French Authorities Arrest Four ShinyHunters Members — Infosecurity Magazine (Jun 2025)
- Las Vegas Police Arrest Minor Accused of Casino Attacks — CyberScoop (Sep 2025)
- Understanding Nevada’s New Gaming Cybersecurity Rule (NRS 463.0129) — REDW