{"id":1118230,"date":"2023-10-01T12:29:40","date_gmt":"2023-10-01T16:29:40","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/nevadas-casinos-should-not-be-allowed-to-pay-off-cybercriminals-the-nevada-independent\/"},"modified":"2023-10-01T12:29:40","modified_gmt":"2023-10-01T16:29:40","slug":"nevadas-casinos-should-not-be-allowed-to-pay-off-cybercriminals-the-nevada-independent","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/casino\/nevadas-casinos-should-not-be-allowed-to-pay-off-cybercriminals-the-nevada-independent\/","title":{"rendered":"Nevada&#8217;s casinos should not be allowed to pay off cybercriminals &#8211; The Nevada Independent"},"content":{"rendered":"<p><p>    It likely started with     a phone call.  <\/p>\n<p>    Well never know all of the details of the cyberattack that    brought MGM Resorts International down for     over a week.     The details that are publicly available, however, are    convincing enough to explain the size and scope of the outage:    A hacker called its help desk and asked for     multifactor authentication to be turned off on a highly    privileged account. That, in turn, made it possible for the    hackers to log into that account, either with a previously    compromised password or with a password they successfully    reset, without alerting the user of that account.  <\/p>\n<p>    Once logged in, hackers used that account to     seize control of the identity provider  the system used to    store the user names and passwords of everyone in the company    thus compromising every other account used by the business.    With that information, the hackers then proceeded to     log into several systems and brought the company down.  <\/p>\n<p>    Was the highly privileged account a dedicated administrative    account or was it an account used routinely by a high-ranking    member of MGM Resorts IT team? Did the highly privileged    account have access to multiple systems or was it scoped to    administer a single system? Why did the help desk, which    normally doesnt have administrative access, have the ability    to alter a highly privileged account  an ability that a    malicious help desk employee could just as effectively use to    hack their employers system as the hackers who claimed    responsibility for the attack?  <\/p>\n<p>    The hackers and the MGM Resorts IT team know the answers to    those questions but, for a variety of good reasons, well    likely never learn them. MGM Resorts understandably doesnt    want the rest of the world to know where its security    vulnerabilities are lest another wave of hackers take advantage    of the same weaknesses that compromised their business once    already.  <\/p>\n<p>    The hackers, meanwhile, have every incentive to appear    invincible and inescapable  or, at the very least, invincible    and inescapable enough for a companys accountants to decide    that it would be cheaper to pay a ransom than it would be to    clean up after whatever damage the hackers might do.  <\/p>\n<p>    The amount of damage and money lost by MGM Resorts, in fact,    serves as excellent advertising, which is why the hackers are        so territorial over claiming credit for the attack. They    want future businesses to know that if they refuse to pay their    ransom like MGM Resorts did, the same thing will happen to    their business.  <\/p>\n<p>    The damage, by the way, was and likely continues to be    considerable. Even though MGM Resorts is now fully open for    business, at least from the customers perspectives, that    doesnt mean they have fully recovered from the attack. MGM    Resorts was still struggling with     paying employees days after the company fully reopened.    Additionally, a     public job post suggested that the company planned to    perform recovery activities for the better part of a month    following the conclusion of the attack.  <\/p>\n<p>    Thats why Caesars Entertainment     paid tens of millions to those who hacked its network and    why MGMs losses are insured     up to $200 million  a successful cyberattack is an    extremely expensive and disruptive experience. Paying hackers    off so your business doesnt have to go through one is very    tempting in the moment.  <\/p>\n<p>    The logic behind not paying protection money, however, is every    bit as seductive as when the mob shook casinos down after World    War II. Sure, they did their work with a more personal touch    than a phone call to a remote help desk but the principles    remain the same.  <\/p>\n<p>    What casinos used to understand  what they were forced to    understand, in many circumstances, with strong judicial    encouragement from federal and state regulators  was that    paying ransom money supports the business of asking for future    ransoms. If youre willing to pay multimillion dollar ransoms,    whether thats because someone planted a bomb on your car or    because someone undesirable has administrative access to your    network and knows how to abuse it, more people are going to be    interested in holding you ransom.  <\/p>\n<p>    Reacting appropriately to that realization, however, requires    appropriate incentives.  <\/p>\n<p>    I dont say things like this very often but those incentives    wont come from the free market. Caesars paid the ransom and    was allowed to remain open for business, all while it quietly    swept the leak of customer drivers license and Social Security    numbers into a tartly bureaucratic     SEC form. MGM Resorts, by contrast, refused to pay ransom    and suffered visible disruptions, ironically enough, during a    major information security conference. In the minds of    customers who dont know any better, then, Caesars will seem    the safer place to do business of the two.  <\/p>\n<p>    The past months attacks against Caesars and MGM Resorts    demonstrate that, in terms of pure market incentives, paying    ransoms is a perfectly economically rational call. Break the    numbers down far enough and it might even be cheaper to pay    periodic ransoms and issue accompanying filings regarding the    breach of customer data to federal regulators than it would be    to have an acceptably robust information security posture.  <\/p>\n<p>    Of course, in terms of pure market incentives, if youre a    member of Caesars information technology team, you now know    your employer pays ransoms. Given your knowledge of your    employers network and systems  knowledge that hackers usually    have to guess at  how much damage could you do with that    information? How much might your employer pay to keep you from    doing any of it? How much might a criminal be willing to pay    you to use that information to your  ah  mutual    benefit?  <\/p>\n<p>    Would a criminal have to pay you to use that information if    they credibly knew where you and your family lived?  <\/p>\n<p>    This is why market incentives alone cannot solve this problem.    Instead, the solution must come from the government. Just as    Nevadas casinos arent legally allowed to pay off the mob    anymore, Nevadas casinos should not be allowed to pay off    cybercriminals. To ensure every casino does the right thing    when faced with a cybersecurity attack, regulators must serve    as     barrier troops  meaning they should be willing and capable    of doing more damage to casino owners businesses when they    retreat from their obligations to protect their customers data    and pay ransoms than hackers can.  <\/p>\n<p>    This approach has the added benefit of incentivizing stronger    information security measures across the industry. When a    casinos only choices are either facing hundreds of millions of    dollars in lost business or losing its license if they pay a    hacker off, a casino will be willing to put far more time,    money and effort into protecting its customers data than it    might if it can quietly pay a few million and sweep the problem    under the rug.  <\/p>\n<p>    I, for one, am not interested in living in a world where the    loss of my personal data is viewed as a routine cost of doing    business. I doubt you are, either. If customers conclude that    losing their personal data is viewed as a routine cost of doing    business with Nevadas casinos, doing business with Nevadas    casinos will become far less routine.  <\/p>\n<p>    Oh, and if you work somewhere that uses Okta, send your IT team    a link to     Oktas guidance on securing its product from the sort of    attack that befell MGM Resorts. Theyve likely already read it    but it never hurts to have a refresher.  <\/p>\n<p>    David Colborne ran for public office twice. He is now an IT    manager, the father of two sons, and a weekly opinion columnist    for The Nevada Independent. You can follow him on    Mastodon @[emailprotected],    on Bluesky @davidcolborne.bsky.social    or email him at     [emailprotected].  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/thenevadaindependent.com\/article\/nevadas-casinos-should-not-be-allowed-to-pay-off-cybercriminals\" title=\"Nevada's casinos should not be allowed to pay off cybercriminals - The Nevada Independent\">Nevada's casinos should not be allowed to pay off cybercriminals - The Nevada Independent<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> It likely started with a phone call.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/casino\/nevadas-casinos-should-not-be-allowed-to-pay-off-cybercriminals-the-nevada-independent\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[678864],"tags":[],"class_list":["post-1118230","post","type-post","status-publish","format-standard","hentry","category-casino"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1118230"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1118230"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1118230\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1118230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1118230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1118230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}