The MGM Cybersecurity Event: A Lesson in Social Engineering


In September 2023, the MGM Resorts International casino and hotel chain was the victim of a major cybersecurity attack. The attackers gained access to the company's network and stole the personal information of over 10 million customers.

The attack is believed to have started with a social engineering attack. Social engineering is a type of cyberattack that relies on human manipulation to gain access to sensitive information or systems. Attackers may use a variety of techniques, such as phishing emails, phone calls, or in-person interactions, to trick victims into revealing confidential information or performing actions that compromise security.

In the case of the MGM attack, the attackers are believed to have used a phishing email to gain access to the company's network. The email may have appeared to be from a legitimate source, such as a company executive or vendor. It may have contained a request for sensitive information, such as login credentials.

Once the attackers had access to the MGM network, they were able to steal the personal information of millions of customers. This information included names, addresses, phone numbers, and dates of birth. The attackers may also have stolen credit card numbers and Social Security numbers.

The MGM cybersecurity event is a reminder of the importance of cybersecurity for businesses of all sizes. It also highlights the need for employees to be aware of social engineering attacks and how to protect themselves from them.

What is social engineering?

Social engineering is a type of cyberattack that relies on human manipulation to gain access to sensitive information or systems. Attackers may use a variety of techniques, such as phishing emails, phone calls, or in-person interactions, to trick victims into revealing confidential information or performing actions that compromise security.

Why is social engineering so effective?

Social engineering attacks are effective because they exploit human vulnerabilities. For example, attackers may try to prey on our tendency to trust others or our desire to be helpful. Additionally, social engineering attacks can be difficult to detect because they often do not involve any technical expertise.

Social Engineering: Business Email Compromised

In 2022, the IC3 received 21,832 BEC complaints with adjusted losses over $2.7 billion. BEC is a sophisticated scam targeting both businesses and individuals performing transfers of funds. The scam is frequently carried out when a subject compromises legitimate business email accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.

The scheme has evolved from simple hacking or spoofing of business and personal email accounts and a request to send wire payments to fraudulent bank accounts. These schemes historically involved compromised vendor emails, requests for W-2 information, targeting of the real estate sector, and fraudulent requests for large amounts of gift cards.

There was also an increasingly prevalent tactic by BEC bad actors of spoofing legitimate business phone numbers to confirm fraudulent banking details with victims. With this increased tactic of "spoofed" phone numbers it emphasizes the importance of leveraging two-factor or multi-factor authentication as an additional security layer. Procedures should be put in place to verify payments and purchase requests outside of e-mail communication and can include direct phone calls but to a known verified number and not relying on information or phone numbers included in the e-mail communication.

How can you protect your business from social engineering attacks?

There are a number of things that businesses can do to protect themselves from social engineering attacks, including:

  • Educate employees about social engineering attacks. Employees should be aware of the common techniques that attackers use and how to identify and report suspicious activity.
  • Implement strong security policies and procedures. Security policies should cover topics such as password management, email security, and physical security.
  • Use security technologies to protect your network and systems. Security technologies such as firewalls, intrusion detection systems, and web content filtering can help to block malicious traffic and protect your data.

Here are some additional tips for protecting your business from social engineering attacks:

  • Be suspicious of unsolicited emails and phone calls. If you receive an email or phone call from someone you don't know, be suspicious, especially if they ask for sensitive information.
  • Verify the identity of the sender before responding. If you are unsure about the legitimacy of an email or phone call, contact the sender directly using a known contact method.
  • Do not open suspicious attachments or click on links in unsolicited emails. Malicious attachments and links can contain malware that can infect your computer or network.
  • Keep your software up to date and use strong passwords. Software updates often include security patches that can help to protect your systems from known vulnerabilities. Use strong passwords and two-factor authentication (2FA) to protect your online accounts.

IC3 BY THE NUMBERS


Cybersecurity Tech Tip

A Reminder About Vishing

Vishing, or voice phishing, is a type of phishing attack that uses the telephone to trick people into revealing sensitive information. This week, two Las Vegas casino organizations, MGM and Caesars, were both victims of vishing attacks.

In the MGM case, the attackers were able to gain access to the company's systems by calling the IT help desk and impersonating an employee. They were able to convince the help desk representative to give them their login credentials, which they then used to access the company's network.

Vector Choice offers employee training to help fortify your company's cybersecurity defense. Interested in learning more please click here to register for our 10 Minute Discovery Call to find out how we can help your business.