Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Tracking & Law Enforcement

Casino Loses $32 Million After Poker Player Hacks Surveillance Cameras

A casino in Melbourne, Australia is hoping to recuperate their losses, after a high-stakes card player scammed them out of millions of dollars before being caught. The scam took advantage of the Crown Towers’ camera system, which was compromised during the heist.

A casino in Melbourne, Australia is hoping to recuperate their losses, after a high-stakes card player scammed them out of millions of dollars before being caught. The scam took advantage of the Crown Towers’ camera system, which was compromised during the heist.

The player, whose name has not been released, has been described as a foreigner and was treated as a VIP player (whale) due to his high-volume playing habits. In a casino, a whale is a player who thinks nothing of betting and losing millions of dollars in a single hand. Often they are treated as royalty by the casino, which will trade freebies and comps to the player in exchange for them spending time (and money) at the tables.

In this case, the Crown casino security cameras were turned inward, and the high-stakes poker game wasn’t as risky when the unknown cheater’s crew used the HD images to read the other players’ cards and signal when to hold and when to fold. After eight hands, the player was busted, but not before $32 million was stolen.

It has been assumed that the cheater went back to his country when Crown served him with notice and busted him, however at that point the damage had been done. The Crown casino staffer assigned to the cheater was fired, and the casino is still investigating how the CCTV system was compromised. The Herald Sun, which broke the story, hinted that an insider provided remote access to the system, citing sources familiar with the investigation.

For their part, Crown casino is hopeful that the stolen funds can be recovered.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.