Casino company Boyd Gaming hacked, employee data stolen

Las Vegas-based casino giant Boyd Gaming said information on its employees was stolen during a recent cyberattack. 

The company notified the U.S. Securities and Exchange Commission (SEC) on Tuesday evening, writing in an 8-K form that while the incident had no impact on Boyd Gaming properties or business operations, data on employees and “a limited number of other individuals” was stolen from its internal IT system. 

Boyd Gaming did not respond to requests for comment. The filing does not say when the attack occurred or whether it involved ransomware. Federal law enforcement has been involved in the recovery effort, the company said. 

The company reported $1 billion in revenue last quarter through its 28 gaming properties in 10 states. Boyd Gaming brought in another $1.75 billion in July from the sale of its equity in digital gaming company FanDuel. 

The 8-K form says Boyd Gaming is in the process of notifying those impacted as well as state regulators.

The cyberattack is not expected to have a material impact on the financial standing of the company, according to the form. A cyber insurance policy is expected to cover all of the incident response costs and regulatory fines. 

Boyd Gaming operates casinos and resorts across the U.S, with facilities in California, Nevada, Illinois, Indiana, Iowa, Kansas, Louisiana, Mississippi, Missouri, Ohio and Pennsylvania

It’s the latest gaming company to face a breach in recent months after incidents impacting Australia’s Ainsworth Game Technology and International Game Technology — which reported significant disruptions in November. 

One month ago, casino game producer Bragg Gaming Group warned of a cyberattack impacting its systems. 

Ohio’s state lottery was impacted by a cyber incident last year, and the ransomware attacks on Caesars Entertainment and MGM Resorts caused more than $100 million in damages. The Justice Department recently unsealed charges against several of the hackers involved in the MGM Resort incident, with at least one teen turning himself in last week.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

How One Bad Password Ended a 158-Year-Old Business

Next Post

Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

Related Posts

NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems

Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google Drive API for command-and-control (C2) purposes. According to a report from Elastic Security Labs, the malware shares code similarities with another implant codenamed FINALDRAFT (aka Squidoor) that employs Microsoft Graph API for C2. FINALDRAFT is attributed to a
Read More

SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities

Vulnerability management is a core component of every cybersecurity strategy. However, businesses often use thousands of software without realising it (when was the last time you checked?), and keeping track of all the vulnerability alerts, notifications, and updates can be a burden on resources and often leads to missed vulnerabilities.  Taking into account that nearly 10% of
Read More