December 6, 2025 • Mary Marshall
The MGM Resorts Breach: How a Help Desk Call Led to $100M in Losses
Discover how social engineering tactics bypassed MGM security, causing $100M in damages, and learn how IM can prevent similar attacks.

MGM Resorts International, one of the world’s largest casino and hospitality companies, suffered a devastating cyberattack that paralyzed operations across its Las Vegas properties and beyond. What began with a simple phone call to a help desk ultimately resulted in an estimated $100 million in losses.
The MGM breach serves as a sobering reminder of how social engineering can bypass even sophisticated security systems, highlighting critical vulnerabilities in traditional identity management approaches. More importantly, it underscores why enterprises need comprehensive identity security solutions that go beyond conventional password practices.
The Anatomy of the MGM Attack: A Masterclass in Social Engineering
According to cybersecurity investigations, the MGM breach began with a tactic as old as cybersecurity itself: social engineering. The attackers reportedly posed as an MGM employee, calling the company’s help desk and successfully convincing IT staff to reset credentials, effectively handing over privileged system access.
From there, the attack escalated rapidly:
- Initial Access: The attackers leveraged the newly acquired credentials to access MGM’s internal systems.
- Lateral Movement: Once inside, they moved laterally through the network, exploiting weak internal security controls.
- Ransomware Deployment: The attackers deployed ransomware across critical systems, encrypting data and demanding payment.
- Operational Shutdown: The attack forced MGM to shut down slot machines, hotel booking systems, restaurant point-of-sale terminals, and other vital operations.
The financial impact was staggering. MGM later disclosed in SEC filings that the breach cost approximately $100 million in direct losses, with additional reputational damage that’s harder to quantify but potentially even more significant.
The Vulnerability: Weak Identity Verification Protocols
At the heart of the MGM breach was a fundamental weakness in identity management practices. Despite investing millions in cybersecurity infrastructure, the company fell victim to one of the most basic attack vectors: inadequate verification of user identities.
According to the cybersecurity firm Mandiant, social engineering attacks like the one that compromised MGM have increased by 33% in the past year alone. These attacks specifically target help desks and IT support staff who have the authority to reset passwords and provide system access.
The MGM breach exposed several critical flaws common in many organizations’ identity management approaches:
- Over-reliance on knowledge-based authentication: Security questions and basic identifying information are easily compromised through social media research or data breaches.
- Lack of multi-factor authentication for privileged actions: Password resets and privilege escalations should require multiple verification methods.
- Insufficient help desk training: IT support staff often prioritize customer service over security protocols, making them vulnerable to manipulation.
- Disjointed identity governance: Siloed systems and fragmented access management create security gaps that attackers can exploit.
Beyond MGM: The Rising Threat of Social Engineering
The MGM incident is far from isolated. Similar social engineering tactics have compromised other major organizations, including:
- Caesars Entertainment, which suffered a breach around the same time as MGM, reportedly paying a $15 million ransom
- The 2020 Twitter hack where attackers gained access to high-profile accounts through social engineering of Twitter employees
- The 2022 Uber breach where an attacker convinced an employee to provide access credentials
A report from Verizon’s 2023 Data Breach Investigations Report found that 74% of breaches involve the human element, including social engineering, errors, or misuse. This statistic highlights a critical truth: technology alone cannot protect organizations without proper identity management protocols.
Preventing the Next MGM: Modern Identity Management Solutions
Organizations can significantly reduce their vulnerability to MGM-style attacks by implementing robust identity management solutions that address the full lifecycle of identity security. Avatier’s Identity Management Services offer comprehensive protection against social engineering and other identity-based threats.
1. Advanced Password Management and Authentication
Modern password management solutions go far beyond simple credential storage. Avatier’s Password Management system includes:
- Self-service password reset with multi-factor verification: Reduces help desk calls while maintaining strict identity verification
- Password complexity enforcement: Ensures strong passwords that resist brute force attacks
- Automated password expiration and rotation: Limits the window of opportunity for credential misuse
- Risk-based authentication: Adapts verification requirements based on contextual risk factors
These capabilities could have prevented the MGM attack by requiring multiple verification factors before allowing password resets or access to critical systems.
2. Zero-Trust Access Governance
The principle of “never trust, always verify” is essential for preventing lateral movement within networks, which was a critical factor in the MGM breach’s severity.
Avatier’s Access Governance implements zero-trust principles through:
- Just-in-time privilege elevation: Provides elevated access only when needed and only for the duration required
- Continuous authentication: Regularly re-verifies user identities throughout sessions
- Least privilege enforcement: Ensures users have only the minimum access necessary for their roles
- Access certification and review: Regularly validates that access rights remain appropriate
3. AI-Driven Anomaly Detection
Artificial intelligence and machine learning can identify suspicious behavior patterns that human analysts might miss. Advanced identity management solutions now incorporate:
- Behavioral biometrics: Analyzing typing patterns, mouse movements, and other behaviors to verify identity
- Contextual analysis: Flagging unusual access requests based on time, location, or system
- Pattern recognition: Identifying anomalous sequences of activities that might indicate compromise
These capabilities provide an additional layer of security that can detect and block social engineering attempts even when initial defenses are breached.
4. Comprehensive Help Desk Security Training
Technology must be complemented by well-trained personnel. Organizations should:
- Implement strict verification protocols for identity-based requests
- Train help desk staff to recognize social engineering tactics
- Create escalation procedures for unusual or high-risk requests
- Conduct regular simulated social engineering tests
Implementing Enterprise-Grade Identity Protection
For organizations looking to avoid becoming the next MGM, implementing a robust identity management strategy requires a multi-faceted approach:
- Assess your current vulnerabilities: Conduct a thorough review of existing identity management practices, particularly around help desk procedures and privileged access.
- Implement a comprehensive identity management solution: Avatier’s Identity Anywhere Lifecycle Management provides end-to-end identity security from onboarding to offboarding.
- Enhance authentication methods: Deploy Multifactor Integration across all critical systems, especially for privileged actions.
- Unify identity governance: Eliminate silos between different identity systems to ensure consistent security policies.
- Automate identity processes: Reduce human error and improve security through automation of routine identity management tasks.
- Conduct regular security assessments: Test your defenses against social engineering through red team exercises and penetration testing.
Identity Security for High-Risk Industries
Certain industries, like MGM’s casino and hospitality business, face heightened risks due to their high-value assets and complex operations. Avatier offers specialized solutions for these sectors, including:
- Financial services: Protecting financial data and transactions with robust identity controls
- Healthcare: Securing patient information while maintaining operational efficiency
- Government: Meeting rigorous compliance requirements like FISMA, FIPS 200, and NIST SP 800-53
- Gaming and hospitality: Addressing the unique challenges of 24/7 operations with high employee turnover
Each industry faces unique challenges, but the fundamental principles of strong identity management remain consistent across sectors.
The Future of Identity Security: Moving Beyond Passwords
As the MGM breach demonstrates, traditional password-based security measures are increasingly inadequate against sophisticated social engineering attacks. The future of identity security lies in more advanced approaches:
- Passwordless authentication: Eliminating passwords entirely in favor of biometrics, security tokens, and contextual factors
- Continuous adaptive risk assessment: Dynamically adjusting security requirements based on real-time risk analysis
- Identity-as-a-Service (IDaaS): Cloud-based identity management that provides scalability and always-current security updates
Organizations implementing these forward-looking solutions will be significantly better positioned to resist the sophisticated attacks that compromised MGM and other enterprises.
Conclusion: Learning from MGM’s $100 Million Lesson
The MGM Resorts breach offers a costly but valuable lesson: even a single successful social engineering attack can bypass millions of dollars in security infrastructure. The $100 million price tag for this breach underscores the critical importance of comprehensive identity management as the foundation of enterprise security.
By implementing robust password management solutions and comprehensive identity governance, organizations can significantly reduce their vulnerability to similar attacks. More importantly, they can maintain operational continuity and protect both financial assets and customer trust.
In today’s threat landscape, identity has become the new perimeter. The organizations that recognize this reality and implement appropriate identity security measures will be the ones that avoid becoming the next cautionary tale in cybersecurity.
The question is not whether your organization will face social engineering attempts—it’s whether your identity management system is sophisticated enough to stop them before they cause damage. With the right solutions in place, the answer can be a confident yes.








