Rumors of New Caesars Hack Abound as Staff Lose Okta Access

  • Hack rumors recall the 2023 attack when Caesars paid a $30m ransom
  • Caesars’ staff have lost mobile access to Okta, a vulnerability in the 2023 hack
  • X user said potential hacks were “just one of the downsides” of paying a ransom
Caesars Palace Las Vegas
Rumors of a Caesars hack were compounded by staff losing mobile access to software that “was a key vulnerability” in the 2023 attack. [Image: Shutterstock.com]

Rumors of sustained hacks on Caesars Entertainment are spreading fast on social media, with many fearing a repeat of 2023 when the entertainment giant had to pay a $30m ransom after its systems were breached.

A Vegas-based influencer giant took to X on Wednesday to cite internal communications coming from Caesars warning of “a spike in phishing attempts”:

The communications shared by Vital Vegas revealed that the attackers were claiming to be “IT, Cybersecurity, HR, and trusted vendors.” More text read: “Team members from across the company are receiving phone calls that appear to come from Caesars over email, text, phone or website.”

Vital Vegas updated its X post on Wednesday to reveal that Caesars’ staff “have lost mobile access to Okta.” It referred to the 2023 hack, in which gaining access to Okta’s login management software “was a key vulnerability resulting in the data breach.”

I’m sure Caesars was warned this would happen.” 

The influencer’s post has gained nearly 30k views and attracted comments such as ex-MGM employee Whitney Dawe’s “here we go again” and Skylar Jameson’s “Better ramp up personal (sic) at the help desk.” X user clicktician said: “I’m sure Caesars was warned this would happen. It’s just one of the downsides of paying up.” 

Paying the $30m during the 2023 hacks meant that Caesars didn’t suffer the operational shutdowns experienced by MGM Resorts’ Las Vegas casino-resorts, as MGM did not give in to demands. Hackers, however, might consider Caesars a more lucrative target.

Leave a Reply

Your email address will not be published. Required fields are marked *