ShinyHunters Demands $1.5M From Wynn Resorts Over Stolen Data
ShinyHunters claims 800,000+ Wynn Resorts employee records including SSNs, salaries, and personal details. Group demands 22 Bitcoin by February 23, exploited Oracle PeopleSoft.
Ransomware group ShinyHunters is extorting Wynn Resorts over what the gang claims is more than 800,000 stolen employee records containing Social Security numbers, salaries, and personal information. The attackers have set today—February 23, 2026—as the deadline for the casino giant to pay approximately $1.5 million in Bitcoin.
What Was Stolen
According to samples posted by ShinyHunters, the stolen data includes:
- Full names and email addresses
- Phone numbers and physical addresses
- Job positions and salary information
- Start dates and birthdays
- Social Security numbers
The breach scope—over 800,000 records—suggests the attackers obtained comprehensive HR data spanning Wynn's current and former workforce across multiple properties.
ShinyHunters is demanding 22.34 Bitcoin (roughly $1.5 million at current rates) as a "starting price," implying negotiations could push the final figure higher. The group threatened to release the data publicly along with "several annoying digital problems" if Wynn fails to engage.
Oracle PeopleSoft as Entry Point
The attackers claim they gained initial access to Wynn's network in September 2025 via an Oracle PeopleSoft vulnerability, using compromised employee credentials. PeopleSoft runs Wynn's human resources systems—the same systems that would contain the exfiltrated employee data.
If accurate, this represents a five-month dwell time before the extortion campaign went public. That's ample time for attackers to map internal systems, identify valuable data, and establish persistence.
Oracle PeopleSoft vulnerabilities have been a recurring issue. CISA has previously issued warnings about actively exploited PeopleSoft flaws, and the platform's complexity makes it a frequent target for attackers seeking access to sensitive HR and financial data.
Casino Industry Continues to Be a Target
This attack follows a pattern of high-profile casino breaches. MGM Resorts and Caesars Entertainment both suffered major incidents in 2023 involving the Scattered Spider group, with Caesars reportedly paying $15 million to attackers.
The casino sector presents an attractive target profile: large employee bases, high-value customer data, and complex technology environments spanning hospitality, gaming, and financial systems. The Aflac breach earlier this year demonstrated similar techniques against another large employer with sensitive workforce data.
ShinyHunters has been active throughout 2026. The group's recent victims include major retail and technology companies, with their data breach samples frequently appearing on underground forums. They've built a reputation for following through on leak threats when negotiations fail.
Wynn's Response
Wynn Resorts has not publicly confirmed the breach or commented on negotiations. The company did not immediately respond to media inquiries about the incident.
For employees worried about exposure, Wynn would typically be required under Nevada data breach notification laws to inform affected individuals if the breach is confirmed. However, the timeline for such notifications can stretch weeks after an incident becomes public.
What Affected Employees Should Do
If you work or have worked for Wynn Resorts:
- Freeze your credit with all three bureaus (Equifax, Experian, TransUnion)
- Monitor financial accounts for unauthorized activity
- Be alert for phishing using your personal details
- Consider an IRS Identity Protection PIN to prevent tax fraud
The combination of SSNs with salary and employment details creates a potent identity theft package. Criminals can use this data to file fraudulent tax returns, open credit accounts, or conduct targeted social engineering attacks.
Why Deadline Pressure Works
Ransomware and extortion groups use hard deadlines to force rapid decisions. The psychology is simple: victims weighing weeks of careful deliberation face pressure to act before data goes public.
Whether Wynn engages with ShinyHunters or not, the stolen data represents long-term risk. Even if the company pays, there's no guarantee the attackers won't retain copies or sell them separately—as we've seen in numerous post-payment breach situations.
The GrubHub extortion incident earlier this year demonstrated how ShinyHunters operates: public pressure, hard deadlines, and a willingness to follow through on leak threats. Organizations dealing with this group should prepare for data exposure regardless of negotiation outcomes.
Related Articles
ShinyHunters Breaches Rockstar Games via Anodot Token Theft
GTA 6 developer Rockstar Games confirms third-party breach after ShinyHunters stole Snowflake credentials through Anodot. Ransom deadline set for April 14.
Apr 12, 2026ShinyHunters Breach Anodot, Steal Data From Snowflake Customers
ShinyHunters compromised SaaS analytics provider Anodot, using stolen authentication tokens to access and exfiltrate data from dozens of Snowflake customers.
Apr 10, 2026Hims & Hers Discloses Breach After Zendesk System Compromise
Telehealth company Hims & Hers reveals data breach affecting customer support tickets. ShinyHunters gang exploited Okta SSO to access Zendesk platform.
Apr 5, 2026Hasbro Confirms Cyberattack, Warns of Weeks-Long Recovery
Toy giant Hasbro filed an SEC 8-K disclosing unauthorized network access discovered March 28. Systems remain offline with recovery expected to take weeks.
Apr 2, 2026