MGM Resorts Hacked: $110 Million Loss and Data Breach

Hotel and casino giant MGM Resorts has recently disclosed that it suffered a devastating hack attack, leading to significant financial losses and a data breach. The company estimates that the attack cost $110 million in lost revenue and mitigation expenses. This article delves into the details of the breach, explores the potential methods used by attackers, discusses the possibility of a ransom payment, examines the financial consequences for MGM Resorts, highlights the impact on its operations, and outlines the steps taken to assist affected customers.

Details of the data breach

During the hack, attackers gained access to sensitive customer data, including names, contact information, gender, birthdates, and driver’s license numbers. Moreover, some customers’ Social Security numbers or passport numbers may have been acquired as well, exposing them to potential identity theft.

Lack of Information about the Breach

MGM Resorts has not provided any specific details about how their systems were breached. However, there is anecdotal evidence suggesting that the attackers successfully deceived a help desk employee into granting them access to an employee account. This allowed the attackers to bypass multi-factor authentication controls provided by Okta, an identity management company.

Possibility of Ransom Payment

While MGM Resorts has not confirmed or denied it, speculation suggests that the company may have paid a ransom. Interestingly, rival hotel and casino operator Caesars Entertainment appears to have been targeted by the same group and did pay a ransom.

In a regulatory filing, MGM Resorts informed investors that it expects to record a staggering $100 million loss in earnings for the third quarter due to the attack and its response. The $110 million overall cost includes not only lost revenue but also expenses associated with mitigating the attack and strengthening their cybersecurity defenses.

Cybersecurity Insurance Coverage

MGM Resorts states that it believes its cybersecurity insurance will be sufficient in covering the financial impact of the breach. However, the full scope of the costs and related impacts is yet to be determined. This incident serves as a reminder to companies to adequately invest in robust cybersecurity measures.

Impact on Operations

The attack had a substantial impact on MGM Resorts’ operations, particularly its booking system. Due to disruptions, the company saw a decline in September occupancy, falling to 88% compared to September 2022’s 93%. This highlights the significance and long-lasting consequences of a cybersecurity incident on business operations and customer confidence.

Steps Taken to Aid Affected Customers

MGM Resorts has pledged to directly notify affected customers via email. Additionally, the company will offer these individuals two years of identity theft monitoring through Experian, a credit reporting agency. This proactive approach aims to support those affected and mitigate the potential harm caused by the breach.

The hack attack on MGM Resorts has resulted in substantial financial losses, with an estimated $110 million in revenue and mitigation expenses. The breach exposed sensitive customer data, including personal information and potentially even Social Security or passport numbers. The company has not disclosed how their systems were breached, and speculation suggests a potential ransom payment. The impact on MGM Resorts’ operations, including a decline in occupancy, illustrates the far-reaching consequences of a cybersecurity incident. Efforts to aid affected customers underscore the company’s commitment to rectifying the situation. As MGM Resorts navigates the fallout from this attack, it serves as a stark reminder for businesses to prioritize cybersecurity to protect themselves and their customers from future breaches.

Explore more

A Beginner’s Guide to Data Engineering and DataOps for 2026

While the public often celebrates the triumphs of artificial intelligence and predictive modeling, these high-level insights depend entirely on a hidden, gargantuan plumbing system that keeps data flowing, clean, and accessible. In the current landscape, the realization has settled across the corporate world that a data scientist without a data engineer is like a master chef in a kitchen with

Ethereum Adopts ERC-7730 to Replace Risky Blind Signing

For years, the experience of interacting with decentralized applications on the Ethereum blockchain has been fraught with a precarious and dangerous uncertainty known as blind signing. Every time a user attempted to swap tokens or provide liquidity, their hardware or software wallet would present them with a wall of incomprehensible hexadecimal code, essentially asking them to authorize a financial transaction

Germany Funds KDE to Boost Linux as Windows Alternative

The decision by the German government to allocate a 1.3 million euro grant to the KDE community marks a definitive shift in how European nations view the long-standing dominance of proprietary operating systems like Windows and macOS. This financial injection, facilitated by the Sovereign Tech Fund, serves as a high-stakes investment in the concept of digital sovereignty, aiming to provide

Why Is This $20 Windows 11 Pro and Training Bundle a Steal?

Navigating the complexities of modern computing requires more than just high-end hardware; it demands an operating system that integrates seamlessly with artificial intelligence while providing robust security for sensitive personal and professional data. As of 2026, many users still find themselves tethered to aging software environments that struggle to keep pace with the rapid advancements in cloud computing and data

Notion Launches Developer Platform for AI Agent Management

The modern enterprise currently grapples with an overwhelming explosion of disconnected software tools that fragment critical information and stall meaningful productivity across entire departments. While the shift toward artificial intelligence promised to streamline these disparate workflows, the reality has often resulted in a chaotic landscape where specialized agents lack the necessary context to perform high-stakes tasks autonomously. Organizations frequently find