BetMGM Hackers Are Draining Betting Accounts, According to Users

  • MGM just suffered a cyberattack that shut down many of its computer systems 
  • Now, BetMGM users are complaining that hackers are accessing accounts
  • One user said someone changed her email address and added two new cards
  • Another said BetMGM support did little to help when his account was emptied
Hacker with credit card
BetMGM users are claiming that hackers have accessed their accounts and withdrawn the cash to new cards. [Image: Shutterstock.com]

If you haven’t been living under a rock for the past few weeks, you will be well aware that MGM Resorts International was the victim of a cyberattack that shut down many of its computer systems across Las Vegas and elsewhere. Now, users of the company’s sportsbook are complaining about the potential lasting ramifications of that hack.

drained their accounts of funds and even gained access to sensitive documents

BetMGM users have taken to social media to share their experiences, claiming that hackers have drained their accounts of funds and even gained access to sensitive documents. On Wednesday, Las Vegas Locally shared one such account posted on an MGM Rewards Facebook group:

If other social media posts are to be believed, this certainly isn’t an isolated incident. One X user called Monica said that the email address on her BetMGM account had been changed without her knowledge before two new credit cards were added. She claimed she had been “fighting with BetMGM to regain access since then” but is certain her account is now empty.

Another X user called Timothy Walthall said that BetMGM support was less than helpful when he contacted them after his own account was emptied:

The MGM hack began on September 8 and lasted for nearly two weeks before the US casino giant confirmed it had resolved the issue. Hacker group ALPHV claimed responsibility for the ransomware attack and warned that it would leak the sensitive data of customers if MGM did not pay up. It is unclear if MGM paid anything to the group.

Leave a Reply

Your email address will not be published. Required fields are marked *