Teenager Released Under Supervision After Alleged Cyberattacks on Las Vegas Casinos
A 17-year-old suspect, accused of being instrumental in orchestrating significant cyberattacks that resulted in millions of dollars in losses for Las Vegas casinos, has been released to the custody of his parents under court-ordered supervision.
Court Approval for Release
On Wednesday, Family Court Judge Dee Smart Butler approved the teen’s release, imposing several restrictions. He is required to remain within Clark County, limit internet access solely to school-related activities, and forgo unsupervised access to any electronic devices. The prosecution has announced plans to pursue an adult trial for him during a hearing set for November.
Charges Facing the Teen
The teenager is facing six serious felony charges, including unlawful computer activity, extortion, conspiracy, and the misuse of personal information to impersonate other individuals. Prosecutors allege that he played a significant role in a series of ransomware-style cyber intrusions that disrupted hotel and gaming operations across the Las Vegas Strip from August to October 2023.
These cyber intrusions severely impacted critical casino services, hindering check-in processes, disrupting digital room keys, and clashing with slot machine operations, ultimately forcing staff to revert to manual procedures. Notably, MGM Resorts reported a staggering loss of approximately $100 million due to these attacks, while Caesars Entertainment disclosed that it had to spend around $15 million to prevent the publication of stolen data.
Investigative Developments
Law enforcement agencies executed search warrants at the teen’s residence in Illinois in late 2023 and early 2024. According to prosecutors, it is believed that he still possesses around $1.8 million in bitcoin connected to the hacking incidents, although these assets remain unaccounted for.
Links to Cybercrime Group
Investigators have connected the teen’s activities to a cybercriminal organization known by various names, including Scattered Spider, Octo Tempest, and UNC3944. This group is infamous for employing social engineering tactics to target large corporations rather than relying solely on technical exploits.
The attackers often engaged in "vishing," or voice phishing, impersonating IT staff to persuade help-desk employees to reset login credentials or grant unauthorized access. Court documents reveal that the group was capable of infiltrating corporate systems in under an hour. Once inside, they escalated privileges, deployed ransomware, and threatened to leak sensitive customer data if their ransom demands were not met.
Lessons from the Attacks
The hacking incidents faced by these casinos have become instructive case studies illustrating how social engineering techniques can successfully overcome technical security measures. They have prompted industry-wide reassessments of access controls and employee training, highlighting vulnerabilities that have persisted despite investments in perimeter defenses.
Caesars Entertainment chose a negotiation strategy, paying millions to secure customer data, while MGM Resorts opted to resist paying the ransom, resulting in extended operational disruptions at its properties. These contrasting outcomes have underscored the financial burdens associated with cyber extortion, whether through direct payments or operational downtime.
Wider Implications for the Gaming Industry
Industry analysts argue that these incidents reflect critical business risks linked to vendor help desks, cloud systems, and other human-facing interfaces, which remain susceptible even with significant investment in cybersecurity. Given the casino sector’s heavy reliance on real-time reservations and cash flow, it has proven particularly vulnerable to prolonged disruptions.
These cyberattacks have ignited discussions about best practices in cybersecurity within the gaming industry, emphasizing the need for enhanced staff training and streamlined protocols to mitigate risks associated with social engineering tactics.


