ShinyHunters Wants $1.5M From Wynn Resorts Not To Leak Las Vegas Casino & Resort Data – Say No Vlog

YouTube video link: https://www.youtube.com/watch?v=03FoeeHU71I

nflnewsbyzennie62.com Presents:

ShinyHunters Wants $1.5M From Wynn Resorts Not To Leak Las Vegas Casino & Resort Data – Say No

. A vlog by the YouTube channel named in the video’s upper left corner and serves as the original blog post for this content.

ShinyHunters Wants $1.5M From Wynn Resorts Not To Leak Las Vegas Casino & Resort Data – Say No Says Krebs On SecurityLas Vegas hotel and casino giant Wynn Resorts appears to be the latest victim of data-grabbing and extortion gang ShinyHunters.On Friday, the cybercrime crew ShinyHunters (aka Scattered Lapsus ShinyHunters) listed Las Vegas Wynn Resorts hospitality company on its blog, claiming to have stolen more than 800,000 records containing employees’ Social Security numbers and other private details. The ShinyHunters set a February 23 deadline for Wynn to “reach out” and threatened to leak the data, “along with several annoying (digital) problems that’ll come your way,” if the resort chain did not comply with the demands.The Register says that they saw samples of the stolen data that contained employees’ full names, emails, phone numbers, positions, salaries, start dates, birthdays, and other personal information. But how does The Register know the data is real?Wynn Resorts, which owns five resorts, 81 restaurants, and 200 high-end retail outlets, did not immediately respond to The Register’s inquiries. But Krebs on Security says do not pay Scattered Lapsus ShinyHunters.Krebs said:A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and regulators about the extent of the intrusion. Some victims reportedly are paying — perhaps as much to contain the stolen data as to stop the escalating personal attacks. But a top SLSH expert warns that engaging at all beyond a “We’re not paying” response only encourages further harassment, noting that the group’s fractious and unreliable history means the only winning move is not to pay.Krebs contnues:Unlike traditional, highly regimented Russia-based ransomware affiliate groups, SLSH is an unruly and somewhat fluid English-language extortion gang that appears uninterested in building a reputation of consistent behavior whereby victims might have some measure of confidence that the criminals will keep their word if paid.That’s according to Allison Nixon, director of research at the New York City based security consultancy Unit 221B. Nixon has been closely tracking the criminal group and individual members as they bounce between various Telegram channels used to extort and harass victims, and she said SLSH differs from traditional data ransom groups in other important ways that argue against trusting them to do anything they say they’ll do — such as destroying stolen data.Like SLSH, many traditional Russian ransomware groups have employed high-pressure tactics to force payment in exchange for a decryption key and/or a promise to delete stolen data, such as publishing a dark web shaming blog with samples of stolen data next to a countdown clock, or notifying journalists and board members of the victim company. But Nixon said the extortion from SLSH quickly escalates way beyond that — to threats of physical violence against executives and their families, DDoS attacks on the victim’s website, and repeated email-flooding campaigns.SLSH is known for breaking into companies by phishing employees over the phone, and using the purloined access to steal sensitive internal data. In a January 30 blog post, Google’s security forensics firm Mandiant said SLSH’s most recent extortion attacks stem from incidents spanning early to mid-January 2026, when SLSH members pretended to be IT staff and called employees at targeted victim organizations claiming that the company was updating MFA settings.“The threat actor directed the employees to victim-branded credential harvesting sites to capture their SSO credentials and MFA codes, and then registered their own device for MFA,” the blog post explained.Victims often first learn of the breach when their brand name is uttered on whatever ephemeral new public Telegram group chat SLSH is using to threaten, extort and harass their prey. According to Nixon, the coordinated harassment on the SLSH Telegram channels is part of a well-orchestrated strategy to overwhelm the victim organization by manufacturing humiliation that pushes them over the threshold to pay.Krebs says that SLSH just uses the media to scare the target, but the exposed data is a cheap price to pay compared to their harassment actions. So, do not pay them.🎙️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! 😍 https://ift.tt/YmAwCat

via IFTTT

Note from Zennie62Media and ZennieReport.com : this video-blog post demonstrates the full and live operation of the latest updated version of an experimental Zennie62Media , Inc. mobile media video-blogging system network that was launched June 2018. This is a major part of Zennie62Media , Inc.’s new and innovative approach to the production of news media. What we call “The Third Wave of Media”.

The uploaded video is from the Zennie62 YouTube channel. It is automatically uploaded to and formatted automatically at the nflnewsbyzennie62.com site and Zennie62-created and owned social media pages. The overall objective here, on top of our is smartphone-enabled, real-time, on the scene reporting of news, interviews, observations, and happenings anywhere in the World and within seconds and not hours – is the use of the existing YouTube social graph on any subject in the World.

Now, news is reported with a smartphone and also by promoting current content on YouTube: no heavy and expensive cameras or even a laptop are necessary, or having a camera crew to shoot what is already on YouTube. The secondary objective is faster, and very inexpensive media content news production and distribution.

We have found there is a disconnect between post length and time to product and revenue generated. With this approach, the problem is far less, though by no means solved.

Zennie62Media is constantly working to improve the system network coding and seeks interested content and media technology partners.

Leave a Comment