
They say the house always wins, unfortunately for the gaming industry its seldom the case when it comes to ransomware. The gambling industry has certainly become a firm favorite for cybercriminal gangs, with a 2022 a study showing that cyberattacks on casinos and gaming companies had increased by a massive 167% in one year.
When it comes to casinos making ransomware headlines, the list is long, and it spans the globe. Notable incidents include Australia’s Crown Resorts, Wrest Point and Country Club casinos in Tasmania, Gateway Casino and Entertainment in Canada, Lucky Star Tribal Casinos in the US, and online casinos DraftKings and BetMGM to name a few.
The fallout from such attacks can be catastrophic. Obviously there can be massive ransom demands to contend with, while operationally some are forced to shutter the doors until operations can resume, but it’s what comes after the remediation that is the real concern as we can see in the case of Rancho Mesquite. Following a successful ransomware attack, the organization, which owns and operates three locations is dealing with a class action lawsuit from the resulting data breach which impacted 200,000 customers.
A lucrative target
In 2022, US casinos alone reaped more than $60 billion in gambling revenues, and that doesn’t include the billions that were made by the tribal casinos. With revenues in the billions and a plethora of sensitive data relating to millions of customers, it’s hardly a surprise that they have become such a target for cybercriminals.
Late last year security experts warned that attacks on casinos would become worse as they increased in sophistication, and the FBI issued a warning to tribal casinos to be on high alert for ransomware attacks.
New cybersecurity regulations
In December, the Nevada Gaming Commission (NGC) announced that it had adopted new cybersecurity regulations for certain gaming operators. Organizations have until December 31st, 2023, to fully comply with new regulations which include:
- Taking steps to secure and protect systems from cyberthreats
- Documenting all measures taken to comply and maintaining records which must be available for the board for a 5 year period
- Conducting an initial risk assessment and developing cybersecurity best practice
- Continuous monitoring of cybersecurity risks
- Providing written disclosure of cyberattacks to the board within 72 hours
- Investigating the incident and preparing a report of the findings
Bridging the cybersecurity gap
Those responsible for complying with this new legislation must look beyond traditional defensive based cybersecurity to prevent attacks. A quick look into some of the successful ransomware attacks this year, and the well-known companies that have made the victim list, provides an insight into what not to do. The days of relying on traditional tools that focus on securing the perimeter are well and truly behind us. Newer technologies that focus on prevention and anti data exfiltration provide new barriers to stop data extortion.
Beating the odds
With 1 in 2 companies now experiencing a cyberattack it is only a matter of time before a breach occurs. Organizations can also be certain that their data is the ultimate prize for the attackers, with 89% of ransomware attacks now exfiltrating data. With hackers moving away from encryption to focus on exfiltration and extortion, preventing any unauthorized data exfiltration must be a key component of any cybersecurity strategy.
Winning the war on ransomware
When it comes to cyberattacks, all roads lead to data exfiltration. Without it, there is no success for the attackers. No data exfiltration equals no ransom, no extortion, and no data breach. Third generation cybersecurity solutions that focus on preventing data exfiltration are now a critical layer in a strong cybersecurity strategy. BlackFog’s fully automated 24/7 ADX technology prevents cyberattacks in real-time and ensures that if cybercriminals manage to bypass traditional defenses, they will be unable to remove any data.
Share This Story, Choose Your Platform!
Related Posts
What Enterprises Need To Know About Artificial Intelligence Privacy Concerns
The use of generative AI in the workplace gives rise to a range of Artificial Intelligence privacy concerns. What do cybersecurity leaders need to know when adopting these tools?
Answering Key GenAI Security Questions: Are ChatGPT Conversations Private?
Do you know how private your ChatGPT conversations really are? Here's what cybersecurity pros and IT admins should know about the tool.
Does ChatGPT Store Your Data? What Every Business Needs To Know
Understanding how tools like ChatGPT store your data is critical for the secure use of GenAI - here's what to know.
Why Enterprise ChatGPT Isn’t A Silver Bullet For AI Security
What cybersecurity considerations should businesses take into account if they plan to adopt Enterprise ChatGPT as a generative AI tool?
Could An OpenAI Data Breach Expose Your Firm’s Secrets?
Have you considered what damage an OpenAI data breach could potentially do to your business?
Understanding Generative AI Risks For Businesses
What generative AI risks will businesses need to be mindful of in the coming year to prevent issues such as data leakage, inaccurate results or compliance challenges?






