Gambling and lottery giant disrupted by cyberattack, working to bring systems back online

Avatar

One of the largest gambling companies in the U.S. said a cyberattack last week caused massive disruptions to their operations, forcing them to take some systems offline.

International Game Technology (IGT) notified the U.S. Securities and Exchange Commission on Tuesday that it became aware of the cyberattack when it “experienced disruptions in portions of its internal information technology systems and applications” on Sunday.

“The Company has also proactively taken certain systems offline to help protect them. The Company’s ongoing investigation and response include efforts to bring its systems back online,” the company said

The company added that it had not yet determined if it would impact its bottom line, and had implemented some operational workarounds to continue servicing its customers.

IGT provides systems and technology for lotteries, gambling machines and sports betting. The company has more than 11,000 employees around the world and reported a revenue of $1.9 billion for the first nine months of the year. 

No hacking group has taken credit for the attack as of Thursday but ransomware operations have repeatedly targeted casinos and lotteries over the last year. 

Ohio’s state lottery was impacted by a ransomware incident last year and the disruption of MGM Casino last fall caused more than $100 million in damages. Yesterday, the Justice Department unsealed charges against several of the hackers involved in the incident.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

FBI says BianLian based in Russia, moving from ransomware attacks to extortion

Next Post

Microsoft seizes 240 websites used by Egyptian phishing-as-a-service operation ‘ONNX’

Related Posts

Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes

Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging app Signal to gain unauthorized access to their accounts. "The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app's legitimate 'linked devices' feature that enables Signal to be used on multiple
Avatar
Read More

Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication

A set of five critical security shortcomings have been disclosed in the Ingress NGINX Controller for Kubernetes that could result in unauthenticated remote code execution, putting over 6,500 clusters at immediate risk by exposing the component to the public internet. The vulnerabilities (CVE-2025-24513, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, and CVE-2025-1974 ), assigned a CVSS score of
Avatar
Read More