Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsHospitality & Casinos

MGM Resorts cyberattack cost could exceed $100M

By Rachelle Blair-Frasier, Editor in Chief
casino room with machines

Image via Unsplash

October 9, 2023

In a filing with the Securities and Exchange Commission, MGM Resorts reported that a recent cyberattack is expected to cost the company an estimated $100 million.

According to the SEC 8-K filing, the company estimates the negative effect from the cybersecurity incident to exceed $100 million, including $10 million in one-time consulting clean-up fees.

“We experienced disruptions at some of our properties, operations at our affected properties have returned to normal, and the vast majority of our systems have been restored,” MGM Resorts CEO and President Bill Hornbuckle said in an open letter published online. “We also believe that this attack is contained.”

Hornbuckle said the company believes the cyberattackers obtained certain personal information belonging to some customers who transacted with MGM Resorts prior to March 2019.

“This includes name, contact information, gender, date of birth and driver’s license number,” he said. “The types of impacted information varied by individual. We also believe a more limited number of Social Security numbers and passport numbers were obtained. We have no evidence that the criminal actors have used this data to commit identity theft or account fraud.”  

Security leaders weigh in

Anne Cutler, Cybersecurity Evangelist at Keeper Security:

While MGM may not be publicly disclosing the full extent of the impacts, the ramifications of any cyberattack of this size are inevitably far-reaching and long-lasting. No organization is too large to hack, but the ability to recover from a significant attack is certainly bolstered when the company has deep pockets. For many small to medium sized businesses, a ransomware attack can force them out of business entirely.

Although the $100 million in losses are costly on the surface, MGM's decision not to pay the ransom followed the course of action recommended by cybersecurity experts, government and law enforcement. Paying a ransom to cybercriminals does not guarantee a full return of an organization's systems and data, and only furthers the ransomware ecosystem.

Omri Weinberg, Co-Founder and CRO at DoControl:

In cybersecurity, you have endless threats on a daily basis and basically endless points of attack.

No company will be ever be fully bulletproof, and just like the casino, you need to bet where to invest the resources and funds in your cybersecurity practice. Adversaries will always be more sophisticated with new technologies and it's a never-ending game.

Luckily there are many great cybersecurity companies out there that can give a lot of great coverage to reduce the risk and make sure you "bet" less. MGM Resorts International is obligated to give clarity about its action and the damage that was caused by this specific attack. If the SEC received a detailed brief about what happened, why, and how it can be prevented next time that's okay. If that is not the case, and they were just conceived by an announcement, that's very concerning.

Bud Broomhead, CEO at Viakoo:

Criminals often return to the scene of the crime, and want the victim to still be alive and able to be continually vulnerable to subsequent attacks.

No company is too big to hack; the key issue is a business too resilient to hack.  MGM may have invested heavily in backup and recovery, and may use this attack to learn where their weakness are so next time they will be even more resilient to attack.  

MGM deserves credit for not paying the ransom; hopefully their example will push more organizations to focus on resiliency and business continuity. It’s never a question of will you be hacked, just when you’ll be hacked and how prepared you are for it.

Andrew Barratt, Vice President at Coalfire:

It's important to look at this in the context of their income. MGM is a huge organization that is very profitable. With revenues of $14 billion, it's easy to see why they've flagged this as not being material. However, it doesn't mean they're too big to hack. Quite the opposite. It shows that larger organizations are likely a very profitable target for OCGs with cyber capability.   

Adam Marrè, CISO, Arctic Wolf:

When looking at the total cost of a breach, such as the one which impacted MGM, many factors can be taken into account. This can include a combination of revenue lost for downtime, extra hours worked for remediation, tools that may have been purchased to deal with the issue, outside incident response help, setting up and operating a hotline for affected people, fixing affected equipment, purchasing credit monitoring and sending physical letters to victims. Even hiring an outside PR firm to help with crisis messaging. When you add up everything, $100 million does not sounds like an unrealistic number for organization like MGM.

Stolen information can be used in identity theft or sold to other criminals to use it in this way. It can also be used for spear phishing or other social engineering campaigns, including SIM swapping, to assist in other attacks, and so the value of the data is high.

KEYWORDS: casino security MGM Resorts ransomware SEC regulations security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rachelle blairfrasier headshot white

Rachelle Blair-Frasier is Security magazine’s Editor in Chief. Blair-Frasier handles eMagazine features, as well as writes and publishes online news and web exclusives on topics including physical security, risk management, cybersecurity and emerging industry trends. She helps coordinate multimedia content and manages Security magazine's social media presence, in addition to working with security leaders to publish industry insights. Blair-Frasier brings more than 15 years of journalism and B2B writing and editorial experience to the role.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cybersecurity hand graphic

    Security leaders discuss new SEC disclosure rule as deadline nears

    See More
  • Woman being mentored

    Mentorship key in building security careers

    See More
  • Guests checking in at hotel front desk

    Securing hospitality: Balancing guest experience and safety

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing