ShinyHunters Demands $1.5M From Wynn Resorts Over Stolen Data
ShinyHunters claims 800,000+ Wynn Resorts employee records including SSNs, salaries, and personal details. Group demands 22 Bitcoin by February 23, exploited Oracle PeopleSoft.
Ransomware group ShinyHunters is extorting Wynn Resorts over what the gang claims is more than 800,000 stolen employee records containing Social Security numbers, salaries, and personal information. The attackers have set today—February 23, 2026—as the deadline for the casino giant to pay approximately $1.5 million in Bitcoin.
What Was Stolen
According to samples posted by ShinyHunters, the stolen data includes:
- Full names and email addresses
- Phone numbers and physical addresses
- Job positions and salary information
- Start dates and birthdays
- Social Security numbers
The breach scope—over 800,000 records—suggests the attackers obtained comprehensive HR data spanning Wynn's current and former workforce across multiple properties.
ShinyHunters is demanding 22.34 Bitcoin (roughly $1.5 million at current rates) as a "starting price," implying negotiations could push the final figure higher. The group threatened to release the data publicly along with "several annoying digital problems" if Wynn fails to engage.
Oracle PeopleSoft as Entry Point
The attackers claim they gained initial access to Wynn's network in September 2025 via an Oracle PeopleSoft vulnerability, using compromised employee credentials. PeopleSoft runs Wynn's human resources systems—the same systems that would contain the exfiltrated employee data.
If accurate, this represents a five-month dwell time before the extortion campaign went public. That's ample time for attackers to map internal systems, identify valuable data, and establish persistence.
Oracle PeopleSoft vulnerabilities have been a recurring issue. CISA has previously issued warnings about actively exploited PeopleSoft flaws, and the platform's complexity makes it a frequent target for attackers seeking access to sensitive HR and financial data.
Casino Industry Continues to Be a Target
This attack follows a pattern of high-profile casino breaches. MGM Resorts and Caesars Entertainment both suffered major incidents in 2023 involving the Scattered Spider group, with Caesars reportedly paying $15 million to attackers.
The casino sector presents an attractive target profile: large employee bases, high-value customer data, and complex technology environments spanning hospitality, gaming, and financial systems. The Aflac breach earlier this year demonstrated similar techniques against another large employer with sensitive workforce data.
ShinyHunters has been active throughout 2026. The group's recent victims include major retail and technology companies, with their data breach samples frequently appearing on underground forums. They've built a reputation for following through on leak threats when negotiations fail.
Wynn's Response
Wynn Resorts has not publicly confirmed the breach or commented on negotiations. The company did not immediately respond to media inquiries about the incident.
For employees worried about exposure, Wynn would typically be required under Nevada data breach notification laws to inform affected individuals if the breach is confirmed. However, the timeline for such notifications can stretch weeks after an incident becomes public.
What Affected Employees Should Do
If you work or have worked for Wynn Resorts:
- Freeze your credit with all three bureaus (Equifax, Experian, TransUnion)
- Monitor financial accounts for unauthorized activity
- Be alert for phishing using your personal details
- Consider an IRS Identity Protection PIN to prevent tax fraud
The combination of SSNs with salary and employment details creates a potent identity theft package. Criminals can use this data to file fraudulent tax returns, open credit accounts, or conduct targeted social engineering attacks.
Why Deadline Pressure Works
Ransomware and extortion groups use hard deadlines to force rapid decisions. The psychology is simple: victims weighing weeks of careful deliberation face pressure to act before data goes public.
Whether Wynn engages with ShinyHunters or not, the stolen data represents long-term risk. Even if the company pays, there's no guarantee the attackers won't retain copies or sell them separately—as we've seen in numerous post-payment breach situations.
The GrubHub extortion incident earlier this year demonstrated how ShinyHunters operates: public pressure, hard deadlines, and a willingness to follow through on leak threats. Organizations dealing with this group should prepare for data exposure regardless of negotiation outcomes.
Related Articles
ShinyHunters Leaks 10M Records from Tinder, Hinge, OkCupid
Match Group confirms breach after ShinyHunters dumps 1.7GB of user data. Attackers used voice phishing to compromise an Okta SSO account.
Feb 2, 2026Ingram Micro Confirms Ransomware Breach Affecting 42,000
SafePay ransomware group allegedly stole 3.5TB from the $48B IT distributor. Employee SSNs, passports, and performance reviews exposed.
Jan 20, 2026Grubhub Hit by Second Breach, ShinyHunters Demanding Ransom
Food delivery giant confirms hackers stole data and are now extorting the company. Attack traced to credentials stolen in August 2025 Salesloft breach.
Jan 16, 2026Everest Gang Claims 900GB Nissan Breach, Sets 5-Day Deadline
Russia-linked ransomware group posts samples allegedly from Nissan's internal systems including dealership records and financial documents.
Jan 14, 2026