Anatomy of a Breach

Anatomy of a Breach: MGM Resorts and Caesars — Scattered Spider's $100 Million Social Engineering Campaign Against Las Vegas

> series: anatomy_of_a_breach —— part: 177 —— targets: mgm_resorts + caesars —— attacker: scattered_spider —— method: phone_call_to_help_desk —— cost: $100M+<span class="cursor-blink">_</span>_

Hedgehog Security 30 September 2023 15 min read

A phone call to the help desk. $15 million paid by Caesars. $100 million lost by MGM. Slot machines, room keys, ATMs — all down.

In September 2023, Scattered Spider — a threat group composed primarily of young, English-speaking hackers — attacked two of Las Vegas's largest casino and hotel operators within days. Caesars Entertainment disclosed that attackers had stolen its loyalty programme database and paid approximately $15 million in ransom (against an initial $30 million demand). MGM Resorts was hit shortly after and refused to pay — resulting in a ten-day operational shutdown across its Las Vegas properties including the Bellagio, Mandalay Bay, Aria, and MGM Grand.

The MGM shutdown was total: hotel room keys stopped working, slot machines went dark, online reservations failed, the company's website went offline, guests queued for hours to check in manually, and even ATMs within the properties were non-functional. MGM estimated the total cost at approximately $100 million in lost revenue and remediation. Both attacks began the same way: a phone call to the company's IT help desk, with the attacker impersonating an employee whose identity had been researched through LinkedIn. The help desk reset the employee's credentials — giving the attackers access to the corporate network.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

LinkedIn research. A phone call. A password reset. $100 million in damage.

Social Engineering — The Universal Entry Vector
From the <a href="/blog/anatomy-of-a-breach-twitter-hack">Twitter hack</a> (2020, phone call) through <a href="/blog/anatomy-of-a-breach-uber-2022">Uber</a> (2022, WhatsApp) to MGM/Caesars (2023, help desk call) — social engineering of IT support staff has become the dominant initial access technique for sophisticated attackers. Our <a href="/penetration-testing/social-engineering">social engineering assessments</a> include vishing (voice phishing) scenarios targeting help desk and IT support teams.
Help Desk as the Weakest Link
IT help desks are designed to be helpful — which makes them vulnerable to social engineering. The attacker impersonated an employee, provided details found on LinkedIn, and requested a password reset. Help desk identity verification procedures must be robust enough to resist social engineering. Our <a href="/penetration-testing/social-engineering">social engineering testing</a> evaluates help desk verification procedures.
Hospitality: Total Operational Shutdown
MGM's ten-day shutdown affected every aspect of the guest experience — demonstrating that modern hospitality operations are entirely dependent on IT systems. For UK <a href="/blog/sector-under-the-microscope-hospitality">hospitality organisations</a>, the MGM case demonstrates that ransomware can cause complete operational failure. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> assesses operational resilience.
Scattered Spider: Young, English-Speaking, Effective
Scattered Spider is composed primarily of young Western hackers — not the Russian or Chinese state actors that dominate threat intelligence reporting. Their English fluency makes social engineering attacks against English-speaking help desks particularly effective. The barrier to entry for devastating social engineering is age, language skills, and LinkedIn — not technical sophistication. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for the anomalous account activity that follows social engineering compromises.

Your help desk is a security control. Test it like one.

The MGM/Caesars attacks proved that IT help desks are critical security controls that must be tested with the same rigour as firewalls and access controls. Identity verification procedures for password resets, account unlocks, and MFA resets must resist social engineering — and the only way to know if they do is to test them. Social engineering assessments test help desk resilience. Cyber Essentials mandates MFA that resists social engineering. SOC in a Box monitors for anomalous password resets and access patterns. And UK Cyber Defence provides incident response when social engineering succeeds.


A phone call to MGM's help desk cost $100 million. Would your help desk verify the caller's identity?

<a href="/penetration-testing/social-engineering">Social engineering testing</a> includes help desk vishing. <a href="/cyber-essentials">Cyber Essentials</a> mandates robust MFA. <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects post-compromise activity.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles