โ† Back to IGT company page

IGT Breach Incident Score: Analysis & Impact (IGT2502025112125)

The Rankiteo video explains how the company IGT has been impacted by a Ransomware on the date June 16, 2022.

newsone

Incident Summary

Rankiteo Incident Impact
-134
Company Score Before Incident
764 / 1000
Company Score After Incident
630 / 1000
Company Link
Incident ID
IGT2502025112125
Type of Cyber Incident
Ransomware
Primary Vector
NA
Data Exposed
10GB (~21,600 files)
First Detected by Rankiteo
June 16, 2022
Last Updated Score
October 31, 2025

If the player does not load, you can open the video directly.

newsone

Key Highlights From This Incident Analysis

  • Timeline of IGT's Ransomware and lateral movement inside company's environment.
  • Overview of affected data sets, including SSNs and PHI, and why they materially increase incident severity.
  • How Rankiteoโ€™s incident engine converts technical details into a normalized incident score.
  • How this cyber incident impacts IGT Rankiteo cyber scoring and cyber rating.
  • Rankiteoโ€™s MITRE ATT&CK correlation analysis for this incident, with associated confidence level.
newsone

Full Incident Analysis Transcript

In this Rankiteo incident briefing, we review the IGT breach identified under incident ID IGT2502025112125.

The analysis begins with a detailed overview of IGT's information like the linkedin page: https://www.linkedin.com/company/igt, the number of followers: 216635, the industry type: Software Development and the number of employees: 9833 employees

After the initial compromise, the video explains how Rankiteo's incident engine converts technical details into a normalized incident score. The incident score before the incident was 764 and after the incident was 630 with a difference of -134 which is could be a good indicator of the severity and impact of the incident.

In the next step of the video, we will analyze in more details the incident and the impact it had on IGT and their customers.

International Game Technology (IGT) recently reported "Qilin ransomware group claims 10GB data leak from gambling tech giant IGT", a noteworthy cybersecurity incident.

Qilin, a RaaS group, claimed to have leaked 10GB of data (approximately 21,600 files) from International Game Technology (IGT), a global leader in gambling technology.

The disruption is felt across the environment, and exposing 10GB (~21,600 files), with nearly ~21,600 files records at risk.

In response, and stakeholders are being briefed through No public confirmation or denial; no media responses.

The case underscores how Unconfirmed by IGT; claims made by Qilin on dark web leak site.

Finally, we try to match the incident with the MITRE ATT&CK framework to see if there is any correlation between the incident and the MITRE ATT&CK framework.

The MITRE ATT&CK framework is a knowledge base of techniques and sub-techniques that are used to describe the tactics and procedures of cyber adversaries. It is a powerful tool for understanding the threat landscape and for developing effective defense strategies.

Rankiteo's analysis has identified several MITRE ATT&CK tactics and techniques associated with this incident, each with varying levels of confidence based on available evidence. Under the Initial Access tactic, the analysis identified Exploit Public-Facing Application (T1190) with moderate confidence (60%), supported by evidence indicating qilin ransomware attack (common RaaS entry vector) and Valid Accounts (T1078) with moderate confidence (50%), supported by evidence indicating no explicit vector, but RaaS groups often abuse stolen credentials. Under the Exfiltration tactic, the analysis identified Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol (T1048.003) with high confidence (95%), supported by evidence indicating 10GB archive posted on dark web via **FTP link** and Automated Exfiltration (T1020) with moderate to high confidence (80%), supported by evidence indicating ~21,600 files (bulk data exfiltration typical of RaaS). Under the Impact tactic, the analysis identified Data Encrypted for Impact (T1486) with high confidence (90%), supported by evidence indicating qilin ransomware (known for encryption + double extortion) and Data Destruction (T1485) with moderate to high confidence (70%), supported by evidence indicating 10GB data leak (potential deletion post-exfiltration). Under the Defense Evasion tactic, the analysis identified Indicator Removal: File Deletion (T1070.004) with moderate to high confidence (70%), supported by evidence indicating no logs/confirmation from IGT (suggests possible log tampering). Under the Credential Access tactic, the analysis identified OS Credential Dumping (T1003) with moderate confidence (60%), supported by evidence indicating raaS groups like Qilin often dump credentials for lateral movement. Under the Lateral Movement tactic, the analysis identified Remote Services: Remote Desktop Protocol (T1021.001) with moderate confidence (50%), supported by evidence indicating common RaaS tactic (no direct evidence but implied by scale). These correlations help security teams understand the attack chain and develop appropriate defensive measures based on the observed tactics and techniques.