Company Details
igt
9,833
216,635
5112
igt.com
0
IGT_7744147
In-progress

IGT Company CyberSecurity Posture
igt.comIGT is a leading global provider of gaming, digital and financial technology solutions, formed through the combination of International Game Technology PLC’s Gaming & Digital Business and Everi Holdings Inc. IGT’s offering spans gaming machines, game content and systems, iGaming, sports betting, cash access, loyalty and player engagement solutions, enabling it to deliver integrated, customer-centric experiences across land-based and digital environments. Organized into Gaming, Digital and FinTech business units, IGT drives innovation, efficiency and value for casino, digital and hospitality operators worldwide. The company is headquartered in Las Vegas.
Company Details
igt
9,833
216,635
5112
igt.com
0
IGT_7744147
In-progress
Between 0 and 549

IGT Global Score (TPRM)XXXX

Description: International Game Technology (IGT), a global leader in gambling technology, allegedly fell victim to a **Qilin ransomware attack**, resulting in a **10GB data leak** (approximately 21,600 files) posted on the dark web. The leaked archive, labeled as 'Publicated,' suggests full public exposure, though IGT has neither confirmed nor denied the breach. Qilin, a Russian-speaking **ransomware-as-a-service (RaaS)** group known for **double-extortion tactics**, claimed responsibility. The attack targeted IGT’s systems, potentially compromising sensitive corporate, financial, or operational data. As the primary technology provider for **26 US lotteries** and a $2.5 billion revenue company operating in **100+ jurisdictions**, the breach could undermine trust among clients, regulators, and partners. The lack of sample verification and IGT’s silence heighten uncertainty, but the scale of the leak—combined with Qilin’s history of high-profile attacks (e.g., Synnovis, Asahi Group, SK Group)—signals severe reputational and operational risks. The incident aligns with Qilin’s pattern of targeting large enterprises for maximum disruption and financial gain.
Description: International Game Technology (IGT), a global leader in gambling technology, allegedly fell victim to a **Qilin ransomware attack**, resulting in a **10GB data leak** (approximately 21,600 files) posted on the dark web. The ransomware-as-a-service (RaaS) group, known for **double-extortion tactics**, claimed responsibility but provided no sample verification. The leaked archive, labeled 'Publicated,' is reportedly accessible via an FTP link, though IGT has neither confirmed nor denied the breach. As the primary technology provider for **26 US lotteries** and a $2.5B revenue enterprise (2024), the incident poses significant reputational and operational risks. Qilin, a prolific threat actor with **900+ victims** since 2022, has previously targeted high-profile entities like **Synnovis (NHS hospitals)**, Asahi Group (Japan), and SK Group (South Korea). The attack’s scope remains unclear, but the leaked data could include sensitive corporate, financial, or customer-related information, amplifying potential fallout for IGT’s global operations across **100+ jurisdictions**.


IGT has 127.27% more incidents than the average of same-industry companies with at least one recorded incident.
IGT has 56.25% more incidents than the average of all companies with at least one recorded incident.
IGT reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
IGT cyber incidents detection timeline including parent company and subsidiaries

IGT is a leading global provider of gaming, digital and financial technology solutions, formed through the combination of International Game Technology PLC’s Gaming & Digital Business and Everi Holdings Inc. IGT’s offering spans gaming machines, game content and systems, iGaming, sports betting, cash access, loyalty and player engagement solutions, enabling it to deliver integrated, customer-centric experiences across land-based and digital environments. Organized into Gaming, Digital and FinTech business units, IGT drives innovation, efficiency and value for casino, digital and hospitality operators worldwide. The company is headquartered in Las Vegas.

Catalyzing the era of pervasive intelligence, Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation. We partner closely with semiconductor and systems customers across a wide range of
SAP is the leading enterprise application and business AI company. We stand at the intersection of business and technology, where our innovations are designed to directly address real business challenges and produce real-world impacts. Our solutions are the backbone for the world’s most complex and

On the Fulfillment Technologies & Robotics Team, we build dynamic partnerships between people and intelligent machines. This intricate collaboration helps Amazon fulfill orders with unmatched accuracy. Since we began working with robotics, we've added over a million new jobs worldwide. Working in s

At Sage, we knock down barriers with information, insights, and tools to help your business flow. We provide businesses with software and services that are simple and easy to use, as we work with you to give you that feeling of confidence. Customers trust our Payroll, HR, and Finance software to m

DiDi Global Inc. is a leading mobility technology platform. It offers a wide range of app-based services across Asia Pacific, Latin America, and other global markets, including ride hailing, taxi hailing, designated driving, hitch and other forms of shared mobility as well as certain energy and vehi

More than one billion people around the world use Instagram, and we’re proud to be bringing them closer to the people and things they love. Instagram inspires people to see the world differently, discover new interests, and express themselves. Since launching in 2010, our community has grown at a r

With our unique ability to offer end-to-end solutions that connect the three pillars of IoT - Sensors, Software, and Services, we enable businesses to move from the traditional to the digital, or improve businesses by introducing a digital element in their products and processes. Now more than ever

[24]7.ai™ customer engagement solutions use conversational artificial intelligence to understand customer intent, enabling companies to create personalized, predictive, and effortless customer experiences across all channels; attract and retain customers; boost agent productivity and satisfaction; a
Shopify is a leading global commerce company, providing trusted tools to start, grow, market, and manage a retail business of any size. Shopify makes commerce better for everyone with a platform and services that are engineered for reliability, while delivering a better shopping experience for consu
.png)
International Game Technology (IGT), a global provider of digital gaming, sports betting, and fintech for casinos – including the popular...
Other noteworthy stories that might have slipped under the radar: US universities targeted by payroll pirates, Zimbra vulnerability...
Class-action law firm, Schubert Jonckheer & Kolbe LLP, is investigating the 2024 breach after the operator only began notifying affected...
PITTSBURGH, Oct. 06, 2025 (GLOBE NEWSWIRE) -- Brightstar Global Solutions Corporation (“Brightstar”), formerly known as IGT Lottery1...
Continent 8 Technologies is leveraging its expertise to deliver a new product designed to provide protection from cybersecurity attacks.
An SEC filing revealed a cybersecurity attack against Boyd Gaming Corporation, leading to a lawsuit filed by a former employee of the...
For casino-system producers, cybersecurity is at the forefront and their approach to ransomware attacks against tribal and commercial...
The 26th annual TribalNet Conference & Tradeshow kicks off Monday in Reno. This year's event has a heavy focus on gaming and hospitality...
Bragg Gaming Group saw its IT systems breached in a cyberattack on Saturday (16 August) . The iGaming supplier said it took immediate steps...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of IGT is http://www.IGT.com.
According to Rankiteo, IGT’s AI-generated cybersecurity score is 545, reflecting their Critical security posture.
According to Rankiteo, IGT currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, IGT is not certified under SOC 2 Type 1.
According to Rankiteo, IGT does not hold a SOC 2 Type 2 certification.
According to Rankiteo, IGT is not listed as GDPR compliant.
According to Rankiteo, IGT does not currently maintain PCI DSS compliance.
According to Rankiteo, IGT is not compliant with HIPAA regulations.
According to Rankiteo,IGT is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
IGT operates primarily in the Software Development industry.
IGT employs approximately 9,833 people worldwide.
IGT presently has no subsidiaries across any sectors.
IGT’s official LinkedIn profile has approximately 216,635 followers.
IGT is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, IGT does not have a profile on Crunchbase.
Yes, IGT maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/igt.
As of November 28, 2025, Rankiteo reports that IGT has experienced 2 cybersecurity incidents.
IGT has an estimated 26,736 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with no public confirmation or denial; no media responses, and communication strategy with no public confirmation or denial; no media responses..
Title: Qilin ransomware group claims 10GB data leak from gambling tech giant IGT
Description: Qilin, a RaaS group, claimed to have leaked 10GB of data (approximately 21,600 files) from International Game Technology (IGT), a global leader in gambling technology. The data was allegedly posted on the dark web via an FTP link, but IGT has not confirmed or denied the breach. Qilin is known for double-extortion attacks and has targeted over 900 victims across industries since 2022.
Type: ransomware
Threat Actor: Qilin (aka Agenda)
Motivation: financial gaindata extortion
Title: Qilin ransomware group claims 10GB data leak from gambling tech giant IGT
Description: Qilin, a RaaS group, claimed to have leaked 10GB of data (approximately 21,600 files) from International Game Technology (IGT), a global leader in gambling technology. The data was allegedly posted on the dark web via an FTP link, but IGT has not confirmed or denied the breach. Qilin is known for double-extortion attacks and has targeted over 900 victims across industries since 2022.
Type: ransomware
Threat Actor: Qilin (formerly Agenda)
Motivation: financial gaindata extortion
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: 10GB (~21,600 files)
Brand Reputation Impact: Potential reputational damage due to alleged breach

Data Compromised: 10GB (~21,600 files)
Brand Reputation Impact: Potential reputational damage (unconfirmed breach)

Entity Name: International Game Technology (IGT)
Entity Type: Corporation
Industry: Gambling Technology
Location: London, UK
Size: Global (operates in 100+ jurisdictions)

Entity Name: International Game Technology (IGT)
Entity Type: Public company
Industry: gambling technology, lottery systems, electronic gaming, sports betting
Location: London, UK
Size: Global (operates in 100+ jurisdictions)

Communication Strategy: No public confirmation or denial; no media responses

Communication Strategy: No public confirmation or denial; no media responses

Number of Records Exposed: ~21,600 files
Data Exfiltration: 10GB archive allegedly leaked via FTP link on dark web

Number of Records Exposed: ~21,600 files
Data Exfiltration: Claimed (10GB archive posted on dark web via FTP)

Ransomware Strain: Qilin (RaaS)
Data Exfiltration: 10GB (~21,600 files)

Ransomware Strain: Qilin (RaaS)
Data Exfiltration: Confirmed (double extortion: data stolen before encryption threat)

Source: TechRadar / Cybernews

Source: Cybernews

Source: TechRadar
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: TechRadar / Cybernews, and Source: Cybernews, and Source: TechRadar.

Investigation Status: Unconfirmed by IGT; no public investigation details available

Investigation Status: Unconfirmed by IGT; claims made by Qilin on dark web leak site
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through No public confirmation or denial; no media responses and No public confirmation or denial; no media responses.
Last Attacking Group: The attacking group in the last incident were an Qilin (aka Agenda) and Qilin (formerly Agenda).
Most Significant Data Compromised: The most significant data compromised in an incident were 10GB (~21,600 files), 10GB (~21 and600 files).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 10GB (~21 and600 files).
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 43.2K.
Most Recent Source: The most recent source of information about an incident are TechRadar / Cybernews, Cybernews and TechRadar.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Unconfirmed by IGT; no public investigation details available.
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.