Merkur: Player data leaks: Inside iGaming’s cyber crisis

Merkur: Player data leaks: Inside iGaming’s cyber crisis

iGaming Industry Faces Escalating Cyber Threats as Player Data Becomes Prime Target

The iGaming sector is grappling with a surge in cyberattacks, exposing vulnerabilities in an industry that handles vast amounts of sensitive player data. Since February 2025, cyber incidents targeting online and land-based casino operators have risen by 400%, signaling a shift from opportunistic attacks to systematic targeting, according to Cris Kuehl, chief data officer at Continent 8 Technologies.

The industry’s appeal to cybercriminals lies in its centralized data troves identity documents, payment credentials, behavioral patterns, and geolocation data all stored within single platforms. Unlike fragmented datasets in other sectors, a single breach in iGaming can yield a complete digital profile, enabling identity theft and financial fraud beyond the platform itself.

Security maturity has failed to keep pace with the sector’s rapid expansion. While larger operators invest heavily in cybersecurity, smaller operators often treat it as a regulatory checkbox, creating a patchwork ecosystem with weak links. Cultural pressures to prioritize speed over security exacerbate the issue, with leaders deprioritizing controls in favor of rapid market expansion. This "ship now, harden later" mentality, as described by XGENIA CEO Mark Flores Martin, accumulates "security debt," leaving systems vulnerable.

Third-party risks further compound the problem. Operators rely on an extensive network of suppliers payment processors, game studios, KYC providers each representing a potential entry point. The 2024 Merkur breach in Germany, traced to a vulnerability in platform provider The Mill Adventure, exposed data from 800,000 users, highlighting the dangers of insecure APIs, overprivileged access, and unpatched software. Regulators, including Germany’s LDI NRW, have flagged insecure APIs as a recurring weakness, enabling attackers to access user data or exploit technical details for deeper infiltration.

Credential-based attacks remain a persistent threat. Phishing, password reuse, and stolen credentials allow attackers to bypass defenses without needing to "break in," as Kuehl notes. Multi-factor authentication (MFA) and continuous monitoring could mitigate risks, but adoption remains inconsistent. Detection delays worsen breaches, with prolonged undetected access enabling attackers to escalate privileges and exfiltrate data.

Regulatory frameworks like GDPR have improved breach response but fall short in prevention. Enforcement is slow, and the lack of sector-specific cybersecurity standards leaves operators with vague compliance requirements. The EU’s NIS2 Directive may tighten obligations, but fragmented jurisdictions and talent shortages with millions of unfilled cybersecurity roles globally hinder progress.

Emerging AI-driven threats pose new challenges. "Agentic AI attacks" can autonomously identify and exploit vulnerabilities at scale, while behavioral analytics and automation offer defensive potential if paired with strong foundational practices. Experts warn that AI amplifies existing weaknesses rather than compensating for them.

The stakes extend beyond fines and operational disruptions. Trust, the cornerstone of player relationships, erodes with each breach. Transparency and timely communication are critical, yet many operators treat incidents as PR crises rather than operational failures. Regulators emphasize the need for clear disclosure, even when not legally required, to help users mitigate risks.

As regulatory scrutiny intensifies and threats evolve, the iGaming industry’s ability to protect player data will determine its long-term viability. Without treating cybersecurity as a core operational risk, vulnerabilities will persist, leaving the odds of a breach uncertain.

Source: https://igamingbusiness.com/tech-innovation/player-data-leaks-inside-igamings-cyber-crisis/

MERKUR GAMING cybersecurity rating report: https://www.rankiteo.com/company/merkur-gaming

"id": "MER1774614662",
"linkid": "merkur-gaming",
"type": "Breach",
"date": "2/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': '800,000',
                        'industry': 'iGaming',
                        'location': 'Germany',
                        'name': 'Merkur',
                        'type': 'iGaming Operator'},
                       {'industry': 'iGaming',
                        'name': 'The Mill Adventure',
                        'type': 'Platform Provider'}],
 'attack_vector': ['Phishing',
                   'Stolen Credentials',
                   'Insecure APIs',
                   'Overprivileged Access',
                   'Unpatched Software'],
 'data_breach': {'data_exfiltration': 'Enabled by prolonged undetected access',
                 'number_of_records_exposed': '800,000 (Merkur breach)',
                 'personally_identifiable_information': 'Yes',
                 'sensitivity_of_data': 'High (complete digital profiles)',
                 'type_of_data_compromised': ['Identity Documents',
                                              'Payment Credentials',
                                              'Behavioral Patterns',
                                              'Geolocation Data']},
 'description': 'The iGaming sector is grappling with a surge in cyberattacks, '
                'exposing vulnerabilities in an industry that handles vast '
                'amounts of sensitive player data. Since February 2025, cyber '
                'incidents targeting online and land-based casino operators '
                'have risen by 400%, signaling a shift from opportunistic '
                'attacks to systematic targeting.',
 'impact': {'brand_reputation_impact': 'Erosion of trust, treated as PR crises '
                                       'rather than operational failures',
            'data_compromised': ['Identity Documents',
                                 'Payment Credentials',
                                 'Behavioral Patterns',
                                 'Geolocation Data'],
            'identity_theft_risk': 'High, due to complete digital profiles '
                                   'exposed in breaches',
            'operational_impact': 'Prolonged undetected access enabling '
                                  'privilege escalation and data exfiltration',
            'payment_information_risk': 'High, due to payment credentials '
                                        'exposure'},
 'lessons_learned': 'Cybersecurity maturity has not kept pace with industry '
                    'expansion. Smaller operators treat security as a '
                    'regulatory checkbox, creating weak links. Third-party '
                    'risks and insecure APIs are recurring vulnerabilities. '
                    'Credential-based attacks remain persistent due to '
                    'inconsistent MFA adoption. Detection delays worsen '
                    'breaches. Regulatory frameworks like GDPR improve '
                    'response but fall short in prevention. AI-driven threats '
                    'amplify existing weaknesses.',
 'motivation': ['Financial Fraud', 'Identity Theft', 'Data Exfiltration'],
 'post_incident_analysis': {'corrective_actions': ['Prioritize cybersecurity '
                                                   'as a core operational risk',
                                                   'Implement MFA and '
                                                   'continuous monitoring',
                                                   'Strengthen third-party '
                                                   'security assessments',
                                                   'Patch vulnerabilities '
                                                   'promptly',
                                                   'Develop sector-specific '
                                                   'standards',
                                                   'Address talent shortages'],
                            'root_causes': ["Security debt from 'ship now, "
                                            "harden later' mentality",
                                            'Inconsistent MFA adoption',
                                            'Third-party vulnerabilities '
                                            '(e.g., insecure APIs, '
                                            'overprivileged access)',
                                            'Detection delays enabling '
                                            'prolonged access',
                                            'Lack of sector-specific '
                                            'cybersecurity standards',
                                            'Talent shortages in '
                                            'cybersecurity']},
 'recommendations': ['Treat cybersecurity as a core operational risk',
                     'Implement multi-factor authentication (MFA) consistently',
                     'Enhance third-party security assessments',
                     'Patch software vulnerabilities promptly',
                     'Adopt continuous monitoring and behavioral analytics',
                     'Improve transparency and timely communication during '
                     'breaches',
                     'Develop sector-specific cybersecurity standards',
                     'Address talent shortages in cybersecurity',
                     'Prepare for AI-driven threats with strong foundational '
                     'practices'],
 'references': [{'source': 'Cris Kuehl, Chief Data Officer at Continent 8 '
                           'Technologies'},
                {'source': 'Mark Flores Martin, CEO at XGENIA'},
                {'source': 'Germany’s LDI NRW (Regulator)'},
                {'source': 'Merkur Breach (2024)'},
                {'source': 'EU’s NIS2 Directive'}],
 'regulatory_compliance': {'regulations_violated': ['GDPR'],
                           'regulatory_notifications': 'Required under GDPR, '
                                                       'but enforcement is '
                                                       'slow'},
 'response': {'communication_strategy': 'Transparency and timely communication '
                                        'critical, but often treated as PR '
                                        'crises',
              'enhanced_monitoring': 'Continuous monitoring recommended but '
                                     'adoption inconsistent'},
 'stakeholder_advisories': 'Regulators emphasize clear disclosure of breaches, '
                           'even when not legally required, to help users '
                           'mitigate risks.',
 'title': 'Surge in Cyberattacks Targeting iGaming Industry',
 'type': ['Data Breach', 'Credential-based Attack', 'Third-party Breach'],
 'vulnerability_exploited': ['Insecure APIs',
                             'Overprivileged Access',
                             'Unpatched Software',
                             'Lack of MFA',
                             'Weak Third-party Security']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.