In this article, Evgeny Zaretskov, Group Chief Information Security Officer, SOFTSWISS addresses how iGaming operators are being robbed and why they are the prime targets for infostealers.
Article Chapters
ToggleImagine this: Your back-office admin account, the keys to your iGaming kingdom, sold for a mere $10 on a dark web forum.
The buyer? A cyber-criminal who didnโt need to breach your network โ they simply purchased your credentials from an infostealer log leaked weeks ago.
This isnโt a hypothetical scenario but a growing reality in todayโs digital landscape.
According to the Check Point Cyber Security Report 2025, 90% of breached companies had previous corporate credentials leaked in a stealer log, which is a stark reminder that once login details fall into the wrong hands, attackers gain an easy foothold.
For online casinos, sports betting platforms and other digital gambling entities, the threat isnโt just about stolen player data, itโs about cyber-criminals gaining control over the very systems that power your operations.
Infostealers are stealthy malware programs designed to exfiltrate sensitive data from infected endpoints โ laptops, desktops or mobile devices.
Unlike ransomware, which often announces itself with file encryption and demands for payment, infostealers operate discreetly.
They focus on:
Once harvested, these โdigital keysโ are often sold on dark web marketplaces or used immediately to breach corporate networks, posing a significant threat to iGaming operators who rely on continuous uptime and uncompromised trust.
Historically, cybersecurity efforts in the iGaming sector have cantered on safeguarding player information and payment transactions.
However, modern infostealer campaigns now set their sights on core back-office infrastructure.
A single compromised device, whether that be it a personal laptop used for remote admin tasks or an unsecured corporate endpoint, can lead to:
Unauthorized privileged application access
Operational downtime and ransomware threats
Exploiting crypto payment integrations
Damage to trust