Wynn Resorts — ShinyHunters Oracle PeopleSoft breach
ShinyHunters exploited an unpatched Oracle PeopleSoft flaw at Wynn Resorts in 2025, exfiltrating 800,000 employee records and demanding $1.5M — confirmed months later when the listing went public.
- Target
- Wynn Resorts — ShinyHunters Oracle PeopleSoft breach
- Date public
- 24 February 2026
- Sector
- Consumer Goods
- Attack type
- Vulnerability Exploit
- Threat actor
- ShinyHunters
- Severity
- Medium
- Region
- United States
ShinyHunters is a prolific hacking group known for stealing large datasets and extorting companies with the threat of public release. In September 2025 they broke into Wynn Resorts — the Las Vegas casino and hotel group — by exploiting a vulnerability in Oracle PeopleSoft, the HR and payroll management software that Wynn uses to manage its workforce. The stolen data was all employee information: full names, Social Security numbers, dates of birth, salaries, employment start dates, phone numbers. About 800,000 records. No guest data, no casino operations, no financial systems. ShinyHunters posted Wynn on their leak site in February 2026 and demanded 22.34 BTC — roughly $1.5 million — for non-disclosure. The listing was later removed, and Wynn stated that the attackers had confirmed deletion of the data, without saying whether any payment was made. Wynn disclosed the breach publicly on 24 February 2026 and confirmed it to staff. Two federal lawsuits followed. The incident is one of the first significant US corporate breaches to be disclosed under Nevada's updated data-breach notification law, which had taken effect in 2024, and illustrates the ongoing risk posed by unpatched enterprise HR systems accessible from the corporate network.
What happened
On 24 February 2026, Wynn Resorts publicly confirmed that ShinyHunters had breached its corporate systems and exfiltrated approximately 800,000 employee records. The breach had occurred in September 2025, roughly five months before the public disclosure — a period during which Wynn investigated the incident before ShinyHunters listed the company on their data-extortion leak site in mid-February 2026 with a demand for 22.34 BTC (approximately $1.5 million at prevailing prices).
The data exposed was confined to employee personally identifiable information held in Wynn’s HR and payroll systems: full names, Social Security numbers, dates of birth, phone numbers, salaries, and employment start dates. Casino operations, guest data, payment systems, and physical hotel and gaming infrastructure were not affected. ShinyHunters’ listing was subsequently removed from the leak site, and Wynn issued a statement indicating that the attackers had confirmed deletion of the stolen data, without disclosing whether any payment was made.
The initial access vector, according to reporting at the time of disclosure, was an unpatched vulnerability in Oracle PeopleSoft — the enterprise HR and payroll platform Wynn used to manage its large workforce. ShinyHunters combined the PeopleSoft vulnerability with a compromised employee credential to gain access to the HR system. The attackers maintained access to Wynn’s environment for several months before exfiltrating and then advertising the stolen data.
Two federal class-action lawsuits were filed against Wynn Resorts following the breach notification. Nevada’s updated data-breach notification law, which had taken effect in 2024, required Wynn to notify affected employees within a specific window and to report to the Nevada Attorney General.
How it worked
Oracle PeopleSoft is a widely-deployed enterprise application suite used by large organisations for HR, payroll, and financial management. It has been the subject of multiple critical vulnerability disclosures over the years; Oracle’s regular patch cycles address newly discovered flaws, but the complexity and operational sensitivity of PeopleSoft deployments means that patching is frequently delayed by organisations that are concerned about disrupting payroll or HR operations during the patching process.
ShinyHunters, based on reporting about the Wynn breach, used a known but unpatched PeopleSoft vulnerability as the entry point. The specific CVE was not confirmed in public disclosures at the time of the incident. The attack chain combined the PeopleSoft vulnerability with a compromised employee credential — consistent with ShinyHunters’ known methodology of combining credential harvesting (via phishing or infostealer malware) with application-layer exploitation to achieve initial access with reduced risk of triggering network-perimeter defences.
With access to the PeopleSoft environment, the attacker had access to the HR database — the system of record for every Wynn employee’s personal and payroll information. The data extracted represents the standard HR-system dataset: everything necessary to identify, contact, and impersonate each affected employee, and to conduct synthetic identity fraud using the Social Security numbers and dates of birth included in payroll records.
ShinyHunters is a prolific data-breach-and-extortion group with a consistent pattern: identify organisations with valuable data, exfiltrate it, post to their leak site with a demand, and negotiate. The group is notable for the breadth of its targeting — it has conducted breaches across healthcare, hospitality, retail, and technology sectors — and for the consistent reliance on a combination of credential theft and known vulnerability exploitation rather than complex zero-day development. Its operations reflect the threat landscape faced by mid-to-large organisations across all sectors: known vulnerabilities in widely-deployed enterprise software that have not been patched, plus credential theft as the enabling initial-access layer.
Timeline
- Before September 2025 — ShinyHunters operators identify the unpatched Oracle PeopleSoft vulnerability in Wynn’s environment; obtain a valid employee credential, likely through phishing or infostealer malware.
- September 2025 — Attackers gain access to Wynn’s PeopleSoft HR system; exfiltrate approximately 800,000 employee records. Access maintained for multiple months.
- February 2026 — ShinyHunters posts Wynn Resorts on their data-extortion leak site, demanding 22.34 BTC (~$1.5 million) for non-disclosure.
- 24 February 2026 — Wynn Resorts publicly confirms the breach; notifies affected employees and files with the Nevada Attorney General under updated state breach-notification requirements.
- Late February – March 2026 — ShinyHunters removes the Wynn listing from the leak site; Wynn states attackers confirmed deletion without disclosing whether payment was made.
- 2026 — Two federal class-action lawsuits filed against Wynn Resorts on behalf of affected employees.
What defenders should learn
The Wynn PeopleSoft breach is a useful instance of an increasingly common attack pattern: exploitation of a known vulnerability in an enterprise application that manages high-value personal data, combined with credential access. The specific lesson for PeopleSoft — and for enterprise HR applications generally — is that they hold the most complete personal dataset an organisation maintains about its workforce, and their security posture should reflect that sensitivity.
Enterprise HR platforms are frequently deprioritised in patching cycles for operational reasons: payroll is a high-stakes, time-sensitive business process, and organisations are reluctant to patch the system that pays their employees without extensive testing windows. This reluctance is understandable but must be balanced against the consequence of a breach. The dataset held by a PeopleSoft HR system — Social Security numbers, dates of birth, salary information, bank account details for payroll direct deposit — is the kind of dataset that enables identity fraud, tax fraud, account takeover, and targeted phishing for every affected individual. Patching delays for systems of this sensitivity should be treated as risk decisions requiring explicit board-level awareness, not as routine IT scheduling.
Credential hygiene is the second lesson. ShinyHunters combined the PeopleSoft vulnerability with a compromised employee credential. Phishing-resistant MFA — hardware keys or authenticator apps rather than SMS — on all accounts with access to HR systems eliminates the credential layer of this attack pattern. Many enterprise HR systems still rely on password-plus-SMS authentication; this is an inadequate control for systems containing the data Wynn’s HR system held.
The five-month dwell time — September 2025 entry, February 2026 disclosure — indicates that Wynn’s monitoring did not detect the access during the period between initial intrusion and ShinyHunters’ public leak-site posting. Detecting data exfiltration from enterprise applications requires monitoring that specifically looks for unusual query volumes, off-hours access, bulk data exports, and access to the system from unusual IP addresses or devices. These signals are available in enterprise application audit logs if the logs are being collected, retained, and monitored with appropriate alerting thresholds.
Controls that would have helped
Defender controls catalogued in the Controls Desk that would have changed the outcome of this incident, or limited its blast radius. Sourced from regulator and framework guidance — never vendors.
- Phishing-resistant MFA on every privileged account Hardware keys or platform authenticators on admin, cloud-root, HR-system, CRM and customer-data accounts. SMS one-time codes do not count as MFA against a serious adversary.
- Just-in-time privilege elevation, not standing admin Standing admin rights on a privileged account give the attacker the same window the legitimate admin has. Just-in-time elevation collapses that window to minutes.
- Centralised log collection with bulk-export anomaly alerting The most common dwell-time signal in the catalogue is a bulk-query or bulk-export pattern that nobody alerted on. Collect the logs, retain them, and alert when they tell you what's happening.
Sources
- Wynn Resorts — data breach notification to employees // primary
- BleepingComputer — Wynn Resorts confirms employee data breach after extortion threat // reporting
- The Register — ShinyHunters demands $1.5M not to leak Wynn Resorts employee data // reporting
- SecurityWeek — Wynn Resorts confirms data breach after hackers remove it from leak site // reporting