Join us for the Human Behavior Conference on Oct. 30th

Learning from the MGM Security Breach 

Learning from the MGM Security Breach

Share This Post

In the rapidly evolving digital landscape, no entity is immune to the pervasive threat of cyberattacks. The security breach at MGM Resorts highlights the vulnerability of even massive organizations. As we reflect on this incident, several key lessons emerge. These lessons urge us to reassess our approach to cybersecurity as we navigate the complexities of the year 2024.

Learning from the MGM Security Breach

The MGM Breach: A Closer Look 

MGM Resorts, a prominent casino chain with a global footprint, fell victim to a cyberattack that disrupted its operations for several days. The attackers employed sophisticated social engineering techniques, specifically “vishing,” to impersonate a legitimate IT worker on the phone. They were able to call MGM’s IT Help Desk and successfully answer questions based on what they had previously found through OSINT. After asking the help desk for assistance with a password reset, the attackers gained initial entry. This would only spiral further for MGM as the bad actors would then obtain administrator rights, allowing them to deploy ransomware. The aftermath revealed that personal information of some customers, including names, contact details, date of birth, driver’s license number, and other sensitive identification data, had been compromised.

Taking a closer look at this security breach helps us to identify key lessons learned that will aid in bettering our own security posture.

Lessons Learned 

1. Never Underestimate Human Vulnerability: The MGM breach underscores the reality that even organizations with significant resources can be compromised if attackers exploit human nature. Social engineering, especially vishing, remains a potent tool for cybercriminals. As was the case in this security breach, a well-crafted pretext will not raise any alarms if it seems legitimate enough.

2. Diversify Cybersecurity Training: While phishing attacks are widely recognized, vishing often gets overlooked in employee training programs. The incident at MGM emphasizes the need for a comprehensive cybersecurity curriculum that addresses a range of attack vectors, including social engineering techniques like vishing. Employees may not be as “on-guard” against the likes of attacks over the phone as they would be to receiving a suspicious email.

3. Heightened Awareness for Personal Cyber Hygiene: Individuals must remain vigilant in protecting their personal information, especially what is shared on public platforms. Social media in itself is not bad, however how much we choose to share on it can be. An attacker could build a profile and impersonate an individual who shares too much, and this is worth remaining vigilant about. Implementing strong, unique passwords and enabling multi-factor authentication also adds an extra layer of protection that may stop an attacker.

Protecting Ourselves in 2024 

1. Employee Training and Awareness: Organizations must prioritize ongoing cybersecurity training for employees at an advanced level. This would include various attack scenarios, including the use of real-world simulated vishing calls as opposed to robo dialers or CBT (Computer Based Training). Awareness campaigns on social engineering tactics like vishing can empower employees to identify and report potential threats.

2. Enhanced Verification Processes: Implementing robust verification processes, especially for critical access points like IT help desks, is crucial. Companies should regularly review and update these processes to stay ahead of evolving cyber threats. Especially in the case of a password reset, extra security protocols should be met such as Multi-Factor Authentication.

3. Individual Online Presence: Personal responsibility in the digital realm is paramount. As mentioned above in the lessons learned, individuals should be cautious about the information they share online. This makes it much more difficult for an attacker to build a profile of the individual and attack them with personalized pretexts (or perhaps impersonate them).

4. Prompt Incident Response and Communication: In the event of a security breach, organizations must have a well-defined incident response plan. Swift communication with affected parties, along with offering identity protection and credit monitoring services, helps mitigate potential damage and stop an attacker in their tracks.

Why Is Vishing So Effective?

Vishing, also known as voice phishing, leverages the human connection with other humans that no other attack vector can. Through vishing, a bad actor can establish a personal connection with their target. This allows for the attacker to emotionally manipulate their target or create a sense of urgency, fear, and even authority. With the right pretext, an attacker could simply call in and ask for the sensitive information they are looking for once they have built enough rapport or created enough urgency.

Moving Forward

The MGM security breach serves as a stark reminder that cyber threats are constantly evolving. As we advance into 2024, a proactive and adaptive approach to cybersecurity is imperative. By learning from incidents like MGM’s, both organizations and individuals can strengthen their defenses, creating a more resilient digital ecosystem. There are always aspects of our security to improve, so we should never allow ourselves to become overconfident. At Social-Engineer, LLC, we continue to strive in promoting awareness of the tactics bad actors use to deceive unsuspecting victims. Through live vishing simulations, we train our clients’ staff on what to expect from a vishing call and how to counteract a bad actor’s advances. By means of this effective training, we can avoid the stress and devastation that comes from large-scale security breaches.

Written by Josten Peña

More To Explore

Social Engineering

Keeping it Simple in Cybersecurity 

Today, the cybersecurity industry focuses a lot more on complicated solutions and tools. Companies are always looking to improve their security measures with the latest technologies. However, attackers often choose