Gambling and lottery giant disrupted by cyberattack, working to bring systems back online

Avatar

One of the largest gambling companies in the U.S. said a cyberattack last week caused massive disruptions to their operations, forcing them to take some systems offline.

International Game Technology (IGT) notified the U.S. Securities and Exchange Commission on Tuesday that it became aware of the cyberattack when it “experienced disruptions in portions of its internal information technology systems and applications” on Sunday.

“The Company has also proactively taken certain systems offline to help protect them. The Company’s ongoing investigation and response include efforts to bring its systems back online,” the company said

The company added that it had not yet determined if it would impact its bottom line, and had implemented some operational workarounds to continue servicing its customers.

IGT provides systems and technology for lotteries, gambling machines and sports betting. The company has more than 11,000 employees around the world and reported a revenue of $1.9 billion for the first nine months of the year. 

No hacking group has taken credit for the attack as of Thursday but ransomware operations have repeatedly targeted casinos and lotteries over the last year. 

Ohio’s state lottery was impacted by a ransomware incident last year and the disruption of MGM Casino last fall caused more than $100 million in damages. Yesterday, the Justice Department unsealed charges against several of the hackers involved in the incident.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

FBI says BianLian based in Russia, moving from ransomware attacks to extortion

Next Post

Microsoft seizes 240 websites used by Egyptian phishing-as-a-service operation ‘ONNX’

Related Posts

CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks carried out by a threat actor called UAC-0099 targeting government agencies, the defense forces, and enterprises of the defense-industrial complex in the country. The attacks, which leverage phishing emails as an initial compromise vector, are used to deliver malware families like MATCHBOIL, MATCHWOK, and
Avatar
Read More

Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Cybersecurity researchers have detailed a new cluster of activity where threat actors are impersonating enterprises with fake Microsoft OAuth applications to facilitate credential harvesting as part of account takeover attacks. "The fake Microsoft 365 applications impersonate various companies, including RingCentral, SharePoint, Adobe, and Docusign," Proofpoint said in a Thursday report. The
Avatar
Read More

The Hidden Weaknesses in AI SOC Tools that No One Talks About

If you’re evaluating AI-powered SOC platforms, you’ve likely seen bold claims: faster triage, smarter remediation, and less noise. But under the hood, not all AI is created equal. Many solutions rely on pre-trained AI models that are hardwired for a handful of specific use cases. While that might work for yesterday’s SOC, today's reality is different. Modern security operations teams face a
Avatar
Read More