โ† Back to IGT company page

IGT Breach Incident Score: Analysis & Impact (IGT2192021112025)

The Rankiteo video explains how the company IGT has been impacted by a Ransomware on the date November 20, 2025.

newsone

Incident Summary

Rankiteo Incident Impact
0
Company Score Before Incident
753 / 1000
Company Score After Incident
753 / 1000
Company Link
Incident ID
IGT2192021112025
Type of Cyber Incident
Ransomware
Primary Vector
NA
Data Exposed
10GB (~21,600 files)
First Detected by Rankiteo
November 20, 2025
Last Updated Score

If the player does not load, you can open the video directly.

newsone

Key Highlights From This Incident Analysis

  • Timeline of IGT's Ransomware and lateral movement inside company's environment.
  • Overview of affected data sets, including SSNs and PHI, and why they materially increase incident severity.
  • How Rankiteoโ€™s incident engine converts technical details into a normalized incident score.
  • How this cyber incident impacts IGT Rankiteo cyber scoring and cyber rating.
  • Rankiteoโ€™s MITRE ATT&CK correlation analysis for this incident, with associated confidence level.
newsone

Full Incident Analysis Transcript

In this Rankiteo incident briefing, we review the IGT breach identified under incident ID IGT2192021112025.

The analysis begins with a detailed overview of IGT's information like the linkedin page: https://www.linkedin.com/company/de-agostini-collectibles, the number of followers: 216635, the industry type: Software Development and the number of employees: 9833 employees

After the initial compromise, the video explains how Rankiteo's incident engine converts technical details into a normalized incident score. The incident score before the incident was 753 and after the incident was 753 with a difference of 0 which is could be a good indicator of the severity and impact of the incident.

In the next step of the video, we will analyze in more details the incident and the impact it had on IGT and their customers.

International Game Technology (IGT) recently reported "Qilin ransomware group claims 10GB data leak from gambling tech giant IGT", a noteworthy cybersecurity incident.

Qilin, a RaaS group, claimed to have leaked 10GB of data (approximately 21,600 files) from International Game Technology (IGT), a global leader in gambling technology.

The disruption is felt across the environment, and exposing 10GB (~21,600 files), with nearly ~21,600 files records at risk.

In response, and stakeholders are being briefed through No public confirmation or denial; no media responses.

The case underscores how Unconfirmed by IGT; no public investigation details available.

Finally, we try to match the incident with the MITRE ATT&CK framework to see if there is any correlation between the incident and the MITRE ATT&CK framework.

The MITRE ATT&CK framework is a knowledge base of techniques and sub-techniques that are used to describe the tactics and procedures of cyber adversaries. It is a powerful tool for understanding the threat landscape and for developing effective defense strategies.

Rankiteo's analysis has identified several MITRE ATT&CK tactics and techniques associated with this incident, each with varying levels of confidence based on available evidence. Under the Initial Access tactic, the analysis identified Exploit Public-Facing Application (T1190) with moderate confidence (60%), supported by evidence indicating qilin ransomware attack targeting IGT systems, no specific vector disclosed and Valid Accounts (T1078) with moderate confidence (50%), supported by evidence indicating no explicit evidence, but common RaaS tactic (Qilin) for initial access. Under the Exfiltration tactic, the analysis identified Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol (T1048.003) with high confidence (95%), supported by evidence indicating 10GB archive allegedly leaked via **FTP link** on dark web. Under the Impact tactic, the analysis identified Data Encrypted for Impact (T1486) with moderate to high confidence (80%), supported by evidence indicating qilin ransomware attack (implied encryption + double-extortion) and Data Destruction (T1485) with moderate to high confidence (70%), supported by evidence indicating 10GB data leak (public exposure as part of double-extortion). Under the Defense Evasion tactic, the analysis identified Indicator Removal: File Deletion (T1070.004) with moderate confidence (60%), supported by evidence indicating no forensic details, but common RaaS post-exfiltration cleanup. Under the Credential Access tactic, the analysis identified OS Credential Dumping (T1003) with moderate confidence (50%), supported by evidence indicating no direct evidence; inferred from RaaS (Qilin) modus operandi for lateral movement. Under the Lateral Movement tactic, the analysis identified Remote Services: Remote Desktop Protocol (T1021.001) with moderate confidence (50%), supported by evidence indicating no explicit evidence; typical RaaS behavior for internal propagation. These correlations help security teams understand the attack chain and develop appropriate defensive measures based on the observed tactics and techniques.