What Today’s Cyber Breaches Teach Casino Operators—Insights from GLI
Monday 08 de September 2025 / 12:00
2 minutos de lectura
(New Jersey).- The detection of irregularities within an organization’s IT systems often signals the possibility of a security incident. When such anomalies arise, cybersecurity experts are tasked with investigating the evidence to confirm whether a breach has taken place, uncover the methods used by potential intruders, and evaluate the consequences for the business.
What a security investigation reveals about today’s gaming cyber threats
The Anatomy of a Cybersecurity Compromise
When unusual activity or anomalies are detected in a company’s IT infrastructure, this may suggest a potential problem. In such cases, a team of security professionals analyze the available evidence to determine whether unauthorized access has occurred, identify the techniques employed, and assess the impact for the organization.
A recent investigation by the Bulletproof security team presents an overview of the mechanisms behind modern
A wide-ranging investigation typically covers the following areas:
- Critical servers showing unusual activity
- System logs and network traffic
- Configuration and patching status
- Threat intelligence and behavioral analytics
- Internal training on cybersecurity awareness and best practices
These methods aim to comprehensively identify all indicators, such as potential backdoors and techniques for data exfiltration.
How to Investigate a Breach
Security investigators use a blend of automated tools and hands-on investigation to:
- Collect and review evidence from affected systems
- Classify suspicious processes and activity
- Analyze network traffic for abnormal connections
- Examine logs for hints of unauthorized access
- Review application code for any hidden vulnerabilities or malicious changes
The Main Findings: What Lurked Beneath gaming cyberattacks, and measures that organizations can use to strengthen their resilience against these threats.
During our investigation of a casino gaming client, the digital equivalent of a break-in was confirmed. Here’s what our cybersecurity team found:
- Malicious Processes: Suspicious software had been quietly installed on key servers. Tools, such as PupyRAT and Rekoobe, are known for giving attackers secret control over systems, allowing them to elevate privileges and siphon off data without detection.
- Living off the Land: Attackers cleverly used legitimate software already present on the servers (like the Amazon SSM Agent) to avoid raising alarms. This technique, called “Living off the Land,” makes their actions blend in with normal operations.
- Persistent Access: The Rekoobe backdoor, for example, could receive commands, transfer data, and even access sensitive password files. Its stealthy design allowed it to hide in plain sight and communicate with outside command servers at regular intervals.
- Command & Control Links: Unusual network traffic revealed connections to suspicious domains and IP addresses—classic signs of an attacker maintaining remote control.
The investigation flagged five key signs that an attack had taken place:
- Simultaneous installation of suspicious processes on different servers
- Unusual outbound connections to known malicious domains and IP addresses
- Misuse of administrative privileges for ongoing access
- Transmission of sensitive information (like usernames and passwords) over unprotected channels
- Possible application of steganographic techniques for the concealment of information
Attribution
There is no definitive or conclusive attribution to a particular origin or group; however, tools such as PupyRat were observed in cyberattacks associated with Earth Berberoka (also referred to as GamblingPuppet or DiceyF). This group is believed to have links to Chinese-speaking individuals and has been active since early 2022. Their operations primarily target online gambling and casino websites, especially within China and Southeast Asia[i].
Moreover, the analysis revealed that multiple files initially encoded in ASCII presented Chinese characters when processed with Unicode encoding and the translation of these characters subsequently uncovered hidden information. This method is commonly employed to evade detection.
Recommendations: How to Bounce Back and Build Resilience
Indicators of a Compromise
Leaving No Stone Unturned
Responding to and recovering from a breach encompasses more than the restoration of normal operations; it presents an opportunity to strengthen organisational resilience. Our Bulletproof cybersecurity recommends:
- Better Network Segmentation: Divide networks into secure zones to limit how far attackers can move if they get in.
- Advanced Endpoint Protection and Monitoring: Employ next-generation security solutions to identify and oversee potential threats, and utilize detection rules to enhance detection capabilities, reducing the likelihood of evasion by malicious actors.
- Regular Security Assessments: Don’t wait for trouble; conduct frequent evaluations of your security posture to proactively identify and remediate emerging risks. In addition to routine vulnerability scans and penetration testing, it is advisable to validate security controls through red teaming exercises that emulate real-world attack scenarios.
- Restrict Administrative Privileges: Only give the keys to the kingdom to those who truly need them—and review access rights regularly.
- Incident response: Strengthen your organization’s incident response capabilities by evaluating the maturity of current procedures, developing comprehensive plans and playbooks, and routinely conducting tabletop exercises to assess and improve their effectiveness.
Takeaways for Everyone
This case isn’t unique. Cyber attackers are constantly evolving, making use of both new malware and legitimate system tools to slip past traditional defenses. While technology helps, the key to cybersecurity resilience is a culture of vigilance, regular testing, and readiness to respond quickly when (not if) anomalies are detected.
Distributed Denial of Service (DDoS) attacks can flood casino systems with overwhelming traffic, resulting in service outages that disrupt gaming operations and cause significant revenue loss, particularly during peak times. Alongside this threat, insider threats pose a serious risk, as employees or contractors with access to sensitive systems may inadvertently or deliberately compromise security, leading to data leaks. These situations illustrate several potential vulnerabilities where data may be at risk.
With the vast amount of personal and financial data casinos collect from their players with key efforts around enhancing KYC initiatives, they are prime targets for data breaches. An attack could expose sensitive information, leading to identity theft and loss of player trust.
Even when your code and systems are well-built, the threat landscape is always changing. Proactive monitoring, robust incident response plans, internal cyber awareness training, and a healthy dose of skepticism about anything unusual can make all the difference.
Final Thoughts
The online gaming and land-based gambling industry is increasingly targeted by cybercriminals. To address these risks, operators are encouraged to implement strong security protocols, invest in advanced defensive technologies, and collaborate with others in the sector to share threat intelligence in real time. Operators must remain vigilant and invest in robust cybersecurity measures to protect against these evolving threats. A proactive approach can help strengthen platform security, protect player data and funds, and maintain player confidence.
Categoría:Analysis
Tags: GLI,
País: United States
Región: North America
Event
G2E - Las Vegas 2025
06 de October 2025
CT Interactive on Innovation, Networking, and Market Growth at G2E 2025
(Las Vegas, SoloAzar Exclusive).- The global gaming industry marked G2E’s 25th anniversary with a major gathering in Las Vegas. CT Interactive stood out for its innovative product development and international growth strategy. Account Manager LATAM at CT Interactive, Roberto Muñoz, shared insights on G2E’s importance, emerging trends, and the company’s collaborative expansion efforts.
Thursday 30 Oct 2025 / 12:00
Atlaslive Explored the Future of Gaming in Latin America at Recent G2E 2025
(Las Vegas, SoloAzar Exclusive).- Bruno Almeida, Head of Sales LATAM at Atlaslive, attended G2E for the first time to explore how land-based and online gaming are converging. His experience highlighted key trends shaping the Latin American market, from immersive casino innovations to strategic networking and regulatory insights.
Monday 27 Oct 2025 / 12:00
G2E 2025: Cristian Galarza, ASAP Director Explains the Importance of Attending the Event
(Las Vegas, SoloAzar Exclusive). - After attending the 25th anniversary edition of G2E in Las Vegas, ASAP’s director shares his perspective on the evolution of the industry, driven by digitalization, efficiency, and the creation of international networks that foster new business opportunities.
Tuesday 28 Oct 2025 / 12:00
SUSCRIBIRSE
Para suscribirse a nuestro newsletter, complete sus datos
Reciba todo el contenido más reciente en su correo electrónico varias veces al mes.

