Wynn Resorts has confirmed {that a} hacker stole worker information from its programs after the corporate was listed on the ShinyHunters extortion gang’s information leak web site.
In an announcement shared right now, the corporate stated it activated its incident response procedures and launched an investigation, with help from exterior cybersecurity consultants, after discovering the breach.
“We’ve got discovered that an unauthorized third celebration acquired sure worker information,” reads an announcement shared with BleepingComputer.
“Upon discovery, we instantly activated our incident response protocols and launched a radical investigation with the assistance of exterior cybersecurity consultants.”
Whereas Wynn has not said whether or not it paid a ransom to forestall the info leak, the corporate stated the attackers confirmed the stolen information had been deleted. In previous extortion instances, risk actors have sometimes solely claimed information was deleted after reaching an settlement with a sufferer.
“The unauthorized third celebration has said that the stolen information has been deleted. We’re monitoring and up to now haven’t seen any proof that the info has been printed or in any other case misused,” the assertion continued.
The corporate added that the incident didn’t impression visitor operations or its bodily properties, which stay absolutely operational, and that it’s providing complimentary credit score monitoring and identification safety providers to staff.
ShinyHunters leak web site itemizing
This assertion comes after Wynn Resorts appeared on the ShinyHunters information leak web site on Thursday.
Within the risk actors’ publish, the group claimed it had stolen “PII (SSNs, and so on) and worker information” and warned the corporate to make contact earlier than February 23, 2026, or the info could be printed.
“Over 800k information containing PII(SSNs, and so on) and worker information have been compromised,” reads the now-deleted publish on ShinyHunters information leak web site.
“This can be a remaining warning to achieve out by 23 Feb 2026 earlier than we leak together with a number of annoying (digital) issues that’ll come your manner. Make the proper resolution, do not be the subsequent headling.”

Shortly after, the Wynn entry was faraway from the positioning, a transfer that usually happens when negotiations are underway or claims are disputed.
Wynn Resorts didn’t reply questions on whether or not a ransom was paid or how many individuals have been affected. Equally, ShinyHunters advised BleepingComputer that they’d no touch upon whether or not they obtained a cost.
Nonetheless, the risk actors did beforehand declare to have stolen the info from the corporate’s Oracle PeopleSoft setting.
ShinyHunters is an information extortion group recognized for breaching organizations and threatening to publish stolen information until a ransom is paid.
The group has beforehand claimed accountability for a number of high-profile information theft incidents and has operated throughout numerous underground boards and extortion portals over time.
Final 12 months, ShinyHunters carried out a widespread marketing campaign to steal Salesforce information, concentrating on quite a few firms via social engineering and stolen third-party OAuth tokens.
In latest weeks, ShinyHunters has claimed accountability for a wave of different safety breaches, together with Panera Bread, Betterment, SoundCloud, Canada Goose, PornHub, and on-line courting big Match Group.
A number of the victims have been compromised via voice phishing (vishing) assaults concentrating on single sign-on (SSO) accounts at Google, Microsoft, and Okta, the place the risk actors posed as IT help workers to trick staff into coming into credentials and multi-factor authentication (MFA) codes on phishing websites.
As BleepingComputer first reported, the ShinyHunters group extra lately adopted system code vishing to acquire Microsoft Entra authentication tokens.
After stealing their targets’ credentials and auth codes, the risk actors hijack the victims’ SSO accounts to steal information from related SaaS purposes reminiscent of Salesforce, Microsoft 365, Google Workspace, SAP, Slack, Adobe, Atlassian, Zendesk, Dropbox, and lots of others.


