Two important pieces of news broke late Thursday on the MGM-Caesars breach that has plagued the two Las Vegas hotels all week.BleepingComputer reported that the BlackCat/ALPHV ransomware group responsible for the attacks claimed they infiltrated MGM’s infrastructure since last Friday and encrypted more than 100 ESXi hypervisors.BlackCat reportedly said that they exfiltrated data from the network and maintain access to some of MGM’s infrastructure, threatening to deploy new attacks unless MGM finally agrees to pay a ransom.Reports earlier this week indicated that negotiations between MGM and BlackCat/ALPHV have been ongoing. It was also reported by Bloomberg that Caesars paid millions of dollars in ransom. The hackers said that the only action they saw from MGM in response to the breach was that MGM disconnected their Okta Sync servers after learning that BlackCat/ALPHV had been lurking on their Okta Agent servers. Despite MGM shutting down the Okta servers, the hackers said in their statement they continue to be present on the MGM network.Nick Hyatt, cyber practice leader at Optiv, explained that as major organizations have moved to virtualization over the past decade, more and more of their technology has moved from bare metal machines to virtualized servers. By encrypting ESXi servers, Hyatt said threat actors can cripple functionality — encrypting the host server essentially disables all the virtualized servers in one fell swoop.“This is not a new tactic, but it’s efficient,” said Hyatt. “As we see threat actor groups like this focus more on efficiency and payouts rather than causing carnage, organizations must rely on defense-in-depth and ensuring mission-critical applications are protected by multiple layers of defense and redundancy. It’s an expensive problem, but in the long run results in a more secure environment.”Callie Guenther, senior manager, cyber threat research at Critical Start, added that the evolving modus operandi of this group, particularly their use of social engineering attacks and the Bring Your Own Vulnerable Driver (BYOVD) strategy that gives them elevated Windows privileges, underlines the multifaceted nature of the cyber threat environment.“This combination of data encryption and the threat of its release is a stark reminder of the multi-dimensional challenges businesses face when dealing with ransom attacks,” said Guenther. “The alleged continuous access the attackers claim to have, even after their initial breach, underscores the importance of thorough post-incident investigations. The supposed demographic profile of these threat actors — primarily young English-speakers — serves as a poignant reminder that cyber adversaries can emerge from virtually any quarter.”Guenther said when her team analyzed the information about the Okta breaches, especially as it relates to MGM and Caesars, they saw a different, but connected, phase of the attack chain. Guenther said Okta's compromise appears centered around social engineering attacks against IT service desk personnel to reset MFA factors for highly-privileged users.“Once attackers gain Super Administrator rights in Okta, they can potentially leverage these rights to further penetrate the organization's network,” explained Guenther. “This can include gaining escalated privileges on Windows systems. The ‘novel methods of lateral movement and defense evasion’ mentioned in the Okta report likely pertain to this. With the right permissions, they could gain access to critical systems, including those managing virtual environments like ESXi hypervisors.”Guenther added that gaining control over ESXi hypervisors offers the attackers immense power over VMs. She said they could encrypt these VMs for ransom, as evidenced by the BlackCat/ALPHV ransomware attack on MGM.“Most organizations run a significant number of their applications and databases on Windows-based VMs under ESXi hypervisors,” said Guenther. “If attackers exploit ESXi, and consequently the VMs, they essentially have control over these Windows systems. This can lead to further data theft, system disruptions, and other malicious activities. In essence, the Okta breaches can be viewed as an entry or pivot point. Once attackers gain significant privileges via tools like Okta, they can move laterally, escalate their privileges on critical systems like Windows servers, and then exploit high-value targets like ESXi hypervisors.”
Ransomware, Phishing, Cloud Security
BlackCat/ALPHV reportedly encrypted more than 100 MGM ESXi hypervisors

Guests walk in front of MGM Grand Hotel and Casino on the Las Vegas Strip amid the spread of coronavirus on Aug. 28, 2020. (Photo by Ethan Miller/Getty Images)
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds