Wynn Resorts Confirms ShinyHunters Stole Data of 800,000 Employees, May Have Paid Ransom

Wynn Resorts Confirms Employee Data Breach by ShinyHunters After $1.5M Ransom Demand

HIGH
February 25, 2026
5m read
Data BreachThreat ActorVulnerability

Impact Scope

People Affected

approximately 800,000

Affected Companies

Wynn Resorts

Industries Affected

Hospitality

Related Entities

Threat Actors

ShinyHunters

Products & Tech

Oracle PeopleSoft

Other

Wynn Resorts

Full Report

Executive Summary

On February 24, 2026, luxury hotel and casino operator Wynn Resorts confirmed it suffered a major data breach at the hands of the ShinyHunters extortion group. The attack resulted in the exfiltration of highly sensitive Personally Identifiable Information (PII) for approximately 800,000 current and former employees. The stolen data reportedly includes Social Security numbers, salaries, and contact information. The initial compromise is believed to have occurred in September 2025 through a vulnerability in the company's Oracle PeopleSoft system. After demanding a $1.5 million ransom, ShinyHunters removed Wynn from its data leak site, leading to widespread speculation that the company paid the ransom to prevent the data from being publicly released. Wynn is now providing credit monitoring services and is the subject of a class-action lawsuit.

Threat Overview

The incident follows a typical data extortion playbook by ShinyHunters. Rather than encrypting systems, the group focuses on exfiltrating valuable data and using the threat of public release as leverage for payment. The initial intrusion vector was reportedly a vulnerability in Oracle PeopleSoft, a common Human Resources and enterprise resource planning software. This highlights the risk posed by vulnerabilities in critical, public-facing enterprise applications.

The compromised data is extensive and highly sensitive, including:

  • Full names
  • Social Security numbers (SSNs)
  • Dates of birth
  • Email and physical addresses
  • Phone numbers
  • Salary and employment start dates

Technical Analysis

  1. Initial Access (T1190 - Exploit Public-Facing Application): The attack began by exploiting an unspecified vulnerability in Wynn's Oracle PeopleSoft platform. These systems are often internet-facing to allow employee access and can be a prime target for attackers if not properly patched and secured.
  2. Discovery & Collection: Once inside, the attackers would have navigated the internal network to locate and access the databases containing the employee records. This involves techniques like T1087 - Account Discovery and T1213 - Data from Information Repositories.
  3. Exfiltration: The attackers then exfiltrated the 800,000 employee records to their own infrastructure. This likely occurred over an encrypted channel to avoid detection, a form of T1041 - Exfiltration Over C2 Channel.
  4. Impact (T1657 - Financial Theft): The final stage was extortion. ShinyHunters listed Wynn on its leak site with a sample of the data and a ransom demand of $1.5 million in Bitcoin. The subsequent removal of the listing strongly implies the extortion was successful.

Impact Assessment

The primary impact is on the 800,000 individuals whose sensitive PII, including SSNs, was stolen. They are now at a significantly elevated, long-term risk of identity theft, financial fraud, and highly targeted phishing attacks. For Wynn Resorts, the financial impact includes the potential ransom payment, the cost of incident response, legal fees from the class-action lawsuit, and providing identity protection services. The reputational damage from such a large-scale employee data breach is also substantial, potentially affecting employee morale and future hiring.

Detection & Response

Detecting exploitation of enterprise applications like PeopleSoft is critical.

  1. Web Application Firewall (WAF): Deploy a WAF in front of all public-facing applications to detect and block common web-based attacks and exploitation attempts. This is a key part of D3FEND's D3-ITF - Inbound Traffic Filtering.
  2. Log Monitoring: Actively monitor application and web server logs for signs of exploitation, such as unusual URL requests, error messages, or unauthorized access attempts. Correlate these with network logs showing large data transfers.
  3. File Integrity Monitoring (FIM): Use FIM on application servers to detect unauthorized changes to files, which could indicate the placement of a web shell or backdoor.

Mitigation

Preventing such breaches requires a focus on fundamental security hygiene.

  1. Vulnerability and Patch Management: The most critical mitigation is a rigorous and timely patch management program. All critical vulnerabilities in public-facing systems like Oracle PeopleSoft must be patched as a top priority. This is D3FEND's D3-SU - Software Update.
  2. Network Segmentation: Segment the network to isolate critical systems like HR databases from less secure parts of the environment. This can prevent an attacker from moving laterally from a compromised web server to a backend database.
  3. Data Minimization and Encryption: Only store sensitive data that is absolutely necessary. Encrypt sensitive data at rest (e.g., the database containing SSNs) to ensure that even if the data is stolen, it is unusable to the attacker.

Timeline of Events

1
September 1, 2025
The initial intrusion into Wynn Resorts' network reportedly occurred via a vulnerability in Oracle PeopleSoft.
2
February 20, 2026
ShinyHunters lists Wynn Resorts on its data leak website, demanding a ransom.
3
February 21, 2026
A class-action lawsuit is filed against Wynn Resorts in federal court.
4
February 24, 2026
Wynn Resorts confirms the data breach and is subsequently removed from the leak site.
5
February 25, 2026
This article was published

MITRE ATT&CK Mitigations

Maintain a strict patch management schedule for all public-facing applications like Oracle PeopleSoft to prevent exploitation of known vulnerabilities.

Use a Web Application Firewall (WAF) to inspect traffic to web applications and block malicious requests.

Isolate critical database servers from internet-facing application servers to contain breaches and prevent lateral movement.

Encrypt sensitive data at rest, such as employee SSNs in the database, to render it useless if stolen.

D3FEND Defensive Countermeasures

The root cause of the Wynn Resorts breach was an unpatched vulnerability in a public-facing Oracle PeopleSoft system. The most direct and effective countermeasure is a robust and aggressive patch management program. Organizations must have a complete inventory of all internet-exposed assets and subscribe to security advisories from vendors like Oracle. Critical vulnerabilities, especially those with known exploits, must be patched within a strict, short timeframe (e.g., 48 hours to 14 days, depending on severity). Automated patch deployment and verification tools should be used to ensure consistent application across the environment. This preventative measure would have closed the initial access vector used by ShinyHunters.

As a compensating control and defense-in-depth layer, Wynn Resorts should have deployed a Web Application Firewall (WAF) in front of its PeopleSoft instance. A properly configured WAF can provide a 'virtual patch' by detecting and blocking requests that attempt to trigger a known vulnerability, even before the underlying software is patched. WAFs can filter traffic based on signatures for common attack types like SQL injection and cross-site scripting, as well as specific exploit patterns for PeopleSoft vulnerabilities. This would have provided a critical layer of protection against the initial compromise.

To mitigate the impact of a successful data exfiltration, sensitive data like Social Security numbers should be encrypted at rest. In this case, the specific columns in the PeopleSoft database containing SSNs, salaries, and other highly sensitive PII should have been encrypted using strong, industry-standard encryption. This technique, often called Transparent Data Encryption (TDE) in database systems, ensures that if an attacker manages to bypass other controls and steal the raw database files, the most sensitive information remains protected and unusable. The decryption keys must be managed separately and securely, inaccessible from the compromised application server.

Sources & References

Wynn Resorts Confirms Data Breach After Hackers Remove It From Leak Site
SecurityWeek (securityweek.com) February 25, 2026
'Stolen data has been deleted': Wynn releases statement on cyberattack
Las Vegas Review-Journal (reviewjournal.com) February 24, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ShinyHuntersWynn ResortsData BreachExtortionOracle PeopleSoftVulnerabilityPIISSN

📢 Share This Article

Help others stay informed about cybersecurity threats