(New York) The American casino and hotel group Caesars Entertainment was the victim of a hack in which customer data was stolen, but its activities were not disrupted, an announcement that comes two days after a similar one from MGM Resorts.
In a declaration to the American stock market watchdog, the SEC, the Caesars group explains that it identified “suspicious activity” on its network on an unspecified date and that it immediately activated its protocols to contain the attack and initiated security measures. required. He notified the police and the local gaming regulatory authority.
“We have taken steps to ensure that the unauthorized actor erases the stolen data, although we cannot guarantee the outcome,” it said, without detail other than to say that it had “experienced certain expenses” as a result of this cyberattack.
According to the American business daily The Wall Street Journal, he paid half of the $30 million ransom demanded by the pirates.
Contacted by AFP, the group did not react immediately.
“Our customer-facing operations, including in our establishments and on our internet and mobile applications, have not been affected by this incident and are continuing without disruption,” he said.
The initial findings of its internal investigation, released on September 7, determined that “an unauthorized actor had acquired a copy of, among other information, our loyalty program database including driver’s license numbers and/ or social security numbers of a significant number of members.”
A thorough investigation is underway to determine the extent of the stolen data and its exact contents, the group said, stressing that there was “no indication at this stage that passwords, PIN codes, account details banking or card payments” had been recovered.
Its competitor MGM Resorts International announced Tuesday in a brief press release that it had “identified a cybersecurity issue affecting certain company systems.”
“We have taken steps to protect our systems and data, including shutting down certain systems,” he said, adding that the investigation was continuing with law enforcement and IT security experts. .