Wynn Resorts confirms employee data breach after extortion threat

Published: (February 24, 2026 at 04:51 PM EST)
4 min read

Source: Bleeping Computer

Wynn Resorts – Las Vegas Strip

Company response

  • Activated incident‑response procedures immediately.
  • Launched an investigation with the help of external cybersecurity experts.
  • No impact on guest operations or physical properties – all locations remain fully operational.
  • Offering complimentary credit‑monitoring and identity‑protection services to affected employees.

“We have learned that an unauthorized third party acquired certain employee data.” – Wynn Resorts statement to BleepingComputer
“Upon discovery, we immediately activated our incident‑response protocols and launched a thorough investigation with the help of external cybersecurity experts.”
“The unauthorized third party has stated that the stolen data has been deleted. We are monitoring and to date have not seen any evidence that the data has been published or otherwise misused.”

Ransom status

Wynn has not disclosed whether a ransom was paid. The attackers claim the stolen data has been deleted—a claim that, in past extortion cases, often follows an agreement with the victim.


Wiz – AI Security Board Report Template

Image credit: Wiz – AI Security Board Report Template

Wynn Resorts Leak on ShinyHunters Site

A post on the ShinyHunters data‑leak site claimed the group had stolen “PII (SSNs, etc.) and employee data” from Wynn Resorts and gave the company until 23 Feb 2026 to make contact, or the data would be published.

“Over 800 k records containing PII (SSNs, etc.) and employee data have been compromised.”
“This is a final warning to reach out by 23 Feb 2026 before we leak along with several annoying (digital) problems that’ll come your way. Make the right decision, don’t be the next headline.”

Wynn Resorts listing on the ShinyHunters data‑leak site

Shortly after the post went live, the Wynn entry was removed—a common sign that negotiations are underway or the claim is being disputed.

  • Wynn Resorts has not commented on whether a ransom was paid or how many individuals were affected.
  • ShinyHunters told BleepingComputer they had no comment on any payment.

The threat actors previously claimed the data originated from Wynn’s Oracle PeopleSoft environment.

About ShinyHunters

ShinyHunters is a data‑extortion group that:

  • Breaches organizations and threatens to publish stolen data unless a ransom is paid.
  • Has claimed responsibility for multiple high‑profile thefts and operates across underground forums and extortion portals.

Recent Activity

YearCampaign / TargetNotable Tactics
2023Salesforce data theftSocial engineering, stolen third‑party OAuth tokens
2024Panera Bread, Betterment, SoundCloud, Canada Goose, PornHub, Match GroupVoice‑phishing (vishing) of SSO accounts (Google, Microsoft, Okta)
2024Microsoft Entra device‑code vishingObtaining authentication tokens via device‑code flow

After compromising credentials and authentication codes, ShinyHunters hijacks SSO accounts to exfiltrate data from SaaS platforms such as:

  • Salesforce
  • Microsoft 365
  • Google Workspace
  • SAP
  • Slack
  • Adobe
  • Atlassian
  • Zendesk
  • Dropbox
  • …and many others

“As BleepingComputer first reported, the ShinyHunters group more recently adopted device‑code vishing to obtain Microsoft Entra authentication tokens.”

References

Tines in art (illustrative)

The future of IT infrastructure is here

Read the guide →

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, you’ll learn how your team can:

  • Reduce hidden manual delays
  • Improve reliability through automated response
  • Build and scale intelligent workflows on top of tools you already use.
0 views
Back to Blog

Related posts

Read more »