{"id":1250,"date":"2026-02-15T12:45:15","date_gmt":"2026-02-15T18:45:15","guid":{"rendered":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/?p=1250"},"modified":"2026-02-15T12:45:15","modified_gmt":"2026-02-15T18:45:15","slug":"igt-hit-by-qilin-ransomware-las-vegas","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/blog\/igt-hit-by-qilin-ransomware-las-vegas\/","title":{"rendered":"The House Always Wins? Not Against Ransomware: IGT Hit by Qilin Group"},"content":{"rendered":"<p>&nbsp;<\/p>\n<article><!-- Header Block --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"40\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td>\n<h1 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 2.2em;font-weight: 500;margin: 0 0 20px 0;line-height: 1.3\">The House Always Wins? Not Against Ransomware: IGT Hit by Qilin Group<\/h1>\n<p style=\"color: #d0dadf;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;margin: 0;font-style: italic;border-left: 4px solid #ef3f37;padding-left: 20px;line-height: 1.6\">21,000 files leaked from gaming giant &#8211; Las Vegas casino supply chain at critical risk<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Critical Alert Banner --><\/p>\n<table style=\"border: 3px solid #002f44\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#ef3f37\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">\ud83c\udfb0 CRITICAL ALERT: Gaming Supply Chain Breach<\/h3>\n<p style=\"margin: 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong>International Game Technology (IGT)<\/strong> &#8211; the cornerstone vendor for Las Vegas casino floors and lottery systems &#8211; has been compromised by Qilin ransomware. <strong>10GB of data (21,000+ files)<\/strong> published on dark web after failed ransom negotiations. <strong>If your casino uses IGT systems, your data may be exposed.<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Executive Summary --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">The Breach: When the House Loses<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">In the high-stakes world of gaming, <strong>International Game Technology (IGT)<\/strong> is usually the one dealing the cards. The company powers slot machines, lottery systems, and gaming platforms across Las Vegas casinos from MGM Grand to Caesars Palace, Red Rock to The Venetian.<\/p>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">However, as of <strong style=\"color: #ef3f37\">February 12, 2026<\/strong>, the house has lost a major hand. After a total breakdown in ransom negotiations, the <strong>Qilin (Agenda) ransomware group<\/strong> published <strong style=\"color: #ef3f37\">10GB of data<\/strong>\u2014totaling over <strong>21,000 sensitive files<\/strong>\u2014allegedly stolen from the gaming giant.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Impact Box --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 5px solid #ef3f37\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.4em;font-weight: 900;margin: 0 0 15px 0\">Is This Critical for Las Vegas?<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\"><strong style=\"color: #ef3f37\">Absolutely.<\/strong> For Las Vegas businesses, IGT is a cornerstone vendor for casino floors and lottery systems. This leak isn&#8217;t just a corporate headline; it&#8217;s a <strong>direct threat to the integrity of the local gaming supply chain<\/strong>. If you operate slots, sports betting kiosks, or lottery terminals powered by IGT, your vendor connection may have exposed sensitive operational data, employee credentials, or customer information.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- What Was Leaked Section --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">What Was Leaked: The Data Inventory<\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #ef9b37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 20px 0\">Confirmed Data Exposure:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"12\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"5%\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>Volume:<\/strong> 10.1 GB total data size, organized into 21,000+ individual files<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>File Types:<\/strong> Corporate documents, technical specifications, internal communications, employee data, vendor contracts, system architecture diagrams<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>Potential PII:<\/strong> Employee personally identifiable information (names, addresses, SSNs), vendor contact details, casino operator credentials<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>Intellectual Property:<\/strong> Gaming system designs, slot machine configurations, lottery platform specifications, proprietary algorithms<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>Partner Exposure:<\/strong> Casino operator integration details, third-party vendor relationships, service account credentials for IGT partner portals<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>Distribution:<\/strong> Data mirrored across multiple dark web repositories, TOR sites, and underground forums &#8211; publicly accessible to cybercriminals worldwide<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- Technical Details Section --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">Technical Details: The Qilin Arsenal<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">The Qilin group (also known as Agenda ransomware) utilizes a sophisticated <strong>&#8220;Double Extortion&#8221;<\/strong> model. Below are the technical signatures associated with their recent campaign against IGT:<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Attack Chain --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 20px 0\">Qilin Attack Methodology:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td style=\"border-left: 5px solid #ef3f37;padding: 20px;margin-bottom: 15px\" bgcolor=\"white\"><strong style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\ud83d\udeaa Initial Access: Exploit Chain<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44\">Qilin likely utilized vulnerabilities in <strong>unpatched VPN or RDP gateways<\/strong> for initial access. This matches <strong>MITRE ATT&amp;CK technique T1133 (External Remote Services)<\/strong>. Common entry vectors include Citrix NetScaler, Fortinet FortiGate, and Cisco VPN vulnerabilities. IGT&#8217;s global infrastructure with remote office connections presented multiple attack surfaces.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"15\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #ef9b37;padding: 20px\" bgcolor=\"white\"><strong style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\u2699\ufe0f Rust-Based Payload<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44\">Qilin&#8217;s malware is written in <strong style=\"color: #ef9b37\">Rust programming language<\/strong>, allowing it to bypass legacy antivirus signatures and target both <strong>Windows and Linux\/VMware ESXi servers<\/strong> with high efficiency. Rust malware is compiled for each target environment, making detection extremely difficult. The cross-platform capability means Qilin can encrypt slot machine backend servers (often Linux-based) and Windows domain controllers simultaneously.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"15\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #2fb17e;padding: 20px\" bgcolor=\"white\"><strong style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\ud83d\udce4 Double Extortion Model<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44\"><strong>Step 1:<\/strong> Data exfiltration before encryption &#8211; 10.1 GB of sensitive files copied to attacker infrastructure. <strong>Step 2:<\/strong> Network encryption &#8211; production systems locked with strong encryption. <strong>Step 3:<\/strong> Ransom demand &#8211; pay to decrypt AND prevent data publication. <strong>Step 4:<\/strong> When IGT refused final payment, Qilin published all stolen data publicly as &#8220;proof&#8221; to future victims that they follow through on threats.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"15\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #ef3f37;padding: 20px\" bgcolor=\"white\"><strong style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\ud83c\udf10 Dark Web Publication<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44\">The 10.1 GB dataset was mirrored across dark web repositories once IGT refused the final ransom demand. Qilin operates a &#8220;leak site&#8221; on TOR where they showcase victims and publish stolen data. The IGT data is now <strong>permanently available to cybercriminals<\/strong> for credential harvesting, competitive intelligence, and secondary attacks against IGT&#8217;s casino partners.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Technical Specifications --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #ef9b37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 20px 0\">Qilin Ransomware Technical Profile:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"10\">\n<tbody>\n<tr>\n<td style=\"color: #ef3f37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.1em;font-weight: 900;vertical-align: top\" width=\"30%\">Programming Language:<\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">Rust (cross-platform, low detection rates)<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" height=\"10\"><\/td>\n<\/tr>\n<tr>\n<td style=\"color: #ef3f37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.1em;font-weight: 900;vertical-align: top\">Target Platforms:<\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">Windows, Linux, VMware ESXi hypervisors<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" height=\"10\"><\/td>\n<\/tr>\n<tr>\n<td style=\"color: #ef3f37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.1em;font-weight: 900;vertical-align: top\">Encryption Method:<\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">AES-256 symmetric encryption with RSA-4096 key protection<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" height=\"10\"><\/td>\n<\/tr>\n<tr>\n<td style=\"color: #ef3f37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.1em;font-weight: 900;vertical-align: top\">Exfiltration Tools:<\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">Rclone, Mega.nz, custom upload utilities<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" height=\"10\"><\/td>\n<\/tr>\n<tr>\n<td style=\"color: #ef3f37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.1em;font-weight: 900;vertical-align: top\">Privilege Escalation:<\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">Exploits Active Directory misconfigurations, stolen credentials<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" height=\"10\"><\/td>\n<\/tr>\n<tr>\n<td style=\"color: #ef3f37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.1em;font-weight: 900;vertical-align: top\">Ransom Payment:<\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">Bitcoin, Monero (cryptocurrency only)<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" height=\"10\"><\/td>\n<\/tr>\n<tr>\n<td style=\"color: #ef3f37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.1em;font-weight: 900;vertical-align: top\">Typical Dwell Time:<\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">30-60 days (reconnaissance before encryption)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- Supply Chain Risk Section --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">The Risk: Why Las Vegas Casino CEOs Must Act<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">In our 24\/7 hospitality economy, a breach at a Tier-1 vendor like IGT creates a <strong style=\"color: #ef3f37\">Supply Chain Contagion<\/strong>. This isn&#8217;t just IGT&#8217;s problem\u2014it&#8217;s yours.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Risk Blocks --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef3f37\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">\ud83d\udd17 Supply Chain Attack Vector<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">If you are a <strong>vendor, partner, or operator using IGT-affiliated systems<\/strong>, your corporate data or employee PII may be sitting in this public dump. This incident <strong>bypasses your perimeter<\/strong> and hits you through a &#8220;trusted&#8221; connection. IGT&#8217;s customer portal credentials, VPN access tokens, and API keys may all be exposed, allowing attackers to pivot into your casino network using legitimate IGT credentials.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef9b37\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">\ud83c\udfb0 Gaming Floor Operations Risk<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">IGT powers thousands of slot machines across Las Vegas. The leaked technical specifications could reveal <strong>slot machine configurations, payout algorithms, and backend server architectures<\/strong>. This intellectual property in the wrong hands could enable gaming fraud, machine manipulation, or targeted attacks against specific casino floors. Nevada Gaming Control Board compliance may be at risk if slot system integrity is compromised.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #2fb17e\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">\ud83d\udcb3 Player Data Exposure<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">IGT&#8217;s sports betting platforms and player loyalty systems process millions of customer transactions. If the breach included integration documentation with casino operators, <strong>player account structures, database schemas, or API authentication methods<\/strong> may be exposed. This creates a roadmap for attackers to target downstream casino customer databases.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Las Vegas Specific Impact --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #ef9b37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 20px 0\">Las Vegas Gaming Ecosystem Vulnerability:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"12\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"5%\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>Strip Properties:<\/strong> Major casinos on The Strip rely heavily on IGT for slot floors, lottery kiosks, and sports betting systems &#8211; single vendor concentration creates systemic risk<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>Tribal Gaming:<\/strong> Nevada tribal casinos operating IGT equipment may face unique compliance challenges given sovereign jurisdiction requirements<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>Nevada Lottery:<\/strong> State lottery systems powered by IGT could expose player information and revenue tracking data<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>Regulatory Scrutiny:<\/strong> Nevada Gaming Control Board will likely require breach notifications and security posture reviews from all IGT customers<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37;font-size: 1.4em\">\u25cf<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong>Competitive Intelligence:<\/strong> Rival gaming equipment manufacturers could gain unfair advantage from leaked proprietary technology and designs<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- Mitigation Plan --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">The 3-Step Mitigation Plan for IGT Customers<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">If your casino or gaming operation uses IGT systems, implement these emergency measures immediately:<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 1 --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #2fb17e\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"80\">\n<div style=\"background-color: #2fb17e;color: white;width: 60px;height: 60px;border-radius: 50%;align-items: center;justify-content: center;font-family: 'Avenir', Arial, sans-serif;font-size: 2em;font-weight: 900;text-align: center;line-height: 60px\">1<\/div>\n<\/td>\n<td style=\"padding-left: 20px\">\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">Force Password Resets on All IGT Integrations<\/h3>\n<p style=\"margin: 0 0 15px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #2fb17e\">Immediate Action:<\/strong> Immediately rotate all service account credentials that interact with IGT systems, Brightstar portals, IGT customer support logins, API keys, VPN access tokens, and any shared authentication mechanisms.<\/p>\n<p style=\"margin: 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #2fb17e\">Assumption:<\/strong> Assume that any credential used to access IGT systems in the last 90 days may be compromised. Change everything. Use strong, unique passwords and enable Multi-Factor Authentication (MFA) on all accounts. Document all changes for Gaming Control Board audit compliance.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 2 --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef9b37\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"80\">\n<div style=\"background-color: #ef9b37;color: white;width: 60px;height: 60px;border-radius: 50%;align-items: center;justify-content: center;font-family: 'Avenir', Arial, sans-serif;font-size: 2em;font-weight: 900;text-align: center;line-height: 60px\">2<\/div>\n<\/td>\n<td style=\"padding-left: 20px\">\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">Audit Identity &amp; Access Logs<\/h3>\n<p style=\"margin: 0 0 15px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef9b37\">Detection:<\/strong> Review Active Directory logs, VPN access records, and security information and event management (SIEM) data for unusual login patterns from remote employees or unknown IP addresses. Qilin often harvests credentials from these leaks for secondary attacks months later.<\/p>\n<p style=\"margin: 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef9b37\">Focus Areas:<\/strong> Look for after-hours logins, geographic anomalies (employee credentials used from foreign countries), multiple failed authentication attempts followed by success, and access to systems the user doesn&#8217;t normally touch. Any IGT-related credentials appearing in the leaked dataset should trigger immediate investigation.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 3 --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef3f37\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"80\">\n<div style=\"background-color: #ef3f37;color: white;width: 60px;height: 60px;border-radius: 50%;align-items: center;justify-content: center;font-family: 'Avenir', Arial, sans-serif;font-size: 2em;font-weight: 900;text-align: center;line-height: 60px\">3<\/div>\n<\/td>\n<td style=\"padding-left: 20px\">\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">Comprehensive Vendor Risk Review<\/h3>\n<p style=\"margin: 0 0 15px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef3f37\">Strategic Assessment:<\/strong> Re-verify the security posture of your entire digital supply chain using the <strong>NIST Cybersecurity Framework<\/strong>. Don&#8217;t just focus on IGT\u2014audit all critical vendors (payment processors, property management systems, surveillance providers).<\/p>\n<p style=\"margin: 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef3f37\">Action Items:<\/strong> Request SOC 2 Type II reports from all vendors, verify they have cyber insurance coverage, confirm incident response procedures are documented, and establish clear breach notification timelines. For IGT specifically, request confirmation that your data was NOT included in the leaked dataset and demand evidence of remediation measures taken post-breach.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- CMIT Solutions Protection --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">How CMIT Solutions of Las Vegas Protects Gaming Businesses<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">At <strong style=\"color: #ef3f37\">CMIT Solutions<\/strong>, we help Las Vegas gaming and hospitality businesses navigate these vendor-driven crises. We provide <strong>proactive monitoring and incident response<\/strong> to ensure that when a major player like IGT gets hit, your business stays in the game.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Protection Services --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #ef9b37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 20px 0\">Gaming Industry Security Services:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"5%\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">Vendor Risk Management:<\/strong> Continuous assessment of your critical suppliers (IGT, Konami, Aristocrat, payment processors) with automated threat intelligence monitoring for breaches<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">24\/7 SOC Monitoring:<\/strong> US-based Security Operations Center watches for supply chain compromises, credential stuffing attacks using leaked credentials, and lateral movement from vendor connections<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">Dark Web Monitoring:<\/strong> Proactive scanning of dark web leak sites, underground forums, and ransomware group TOR pages for your company data or vendor breach exposure<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">Network Segmentation:<\/strong> Isolate gaming floor systems (slots, table games, sports betting) from corporate networks to contain vendor-originated breaches<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">Ransomware Defense:<\/strong> EDR with behavioral detection, immutable backups, and tested disaster recovery procedures designed for 24\/7 casino operations<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">Gaming Control Board Compliance:<\/strong> Documentation and security controls aligned with Nevada Gaming Control Board Regulation 5.170 and Minimum Internal Control Standards (MICS)<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">Incident Response Planning:<\/strong> Pre-established breach response playbooks specific to gaming operations with regulatory notification procedures and business continuity safeguards<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Assessment CTA --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border: 3px solid #ef3f37\" align=\"center\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 15px 0\">\ud83c\udfb0 Do You Use IGT Systems?<\/h3>\n<p style=\"margin: 0 0 20px 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;line-height: 1.7;color: #002f44\">Don&#8217;t wait to find out if your data was in the breach. Get an emergency vendor risk assessment and credential audit in 24 hours.<\/p>\n<p style=\"margin: 0\"><a style=\"background-color: #ef3f37;color: white;padding: 18px 40px;text-decoration: none;border-radius: 50px;font-family: 'Avenir', Arial, sans-serif;font-weight: bold;font-size: 1.2em\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/contact-us\/\">Request Emergency Security Assessment<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- Main CTA Section --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"45\" bgcolor=\"#ef3f37\">\n<tbody>\n<tr>\n<td align=\"center\">\n<h2 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 2.2em;font-weight: 900;margin: 0 0 20px 0\">Protect Your Casino from Supply Chain Attacks<\/h2>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin: 0 0 15px 0;line-height: 1.6\">When your vendors get breached, your business is at risk. Get comprehensive gaming industry cybersecurity from Las Vegas experts.<\/p>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;margin: 0 0 25px 0;font-weight: 600\">CMIT Solutions: Trusted by Las Vegas Casinos, Gaming Operators, and Hospitality Groups<\/p>\n<table style=\"margin: 25px auto\" border=\"0\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td style=\"border-radius: 50px;padding: 5px 20px\" bgcolor=\"#002f44\">\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: bold;color: white\">\ud83d\udcde <a style=\"color: white;text-decoration: none\" href=\"tel:702-725-2877\">702-725-2877<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"margin: 25px 0\"><a style=\"background-color: #002f44;color: white;padding: 18px 40px;text-decoration: none;border-radius: 50px;font-family: 'Avenir', Arial, sans-serif;font-weight: bold;font-size: 1.2em\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/contact-us\/\">Request Gaming Security Assessment<\/a><\/p>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1em;margin: 25px 0 0 0\"><a style=\"color: white;text-decoration: underline\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\">cmitsolutions.com\/lasvegas-nv-1206<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Key Takeaways --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin-top: 0\">Key Takeaways for Gaming Operators:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"8\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"3%\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>IGT ransomware attack<\/strong> &#8211; Qilin group published 10GB (21,000 files) after failed ransom negotiations on February 12, 2026<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Supply chain contagion risk<\/strong> &#8211; IGT customers&#8217; data, credentials, and system documentation may be exposed in leak<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Las Vegas gaming floor impact<\/strong> &#8211; Slot machines, lottery systems, sports betting platforms across The Strip powered by IGT<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Qilin double extortion<\/strong> &#8211; Rust-based malware targets Windows, Linux, ESXi with data exfiltration before encryption<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Rotate all IGT credentials immediately<\/strong> &#8211; Service accounts, portal logins, API keys, VPN tokens<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Audit access logs for anomalies<\/strong> &#8211; Look for credential abuse using leaked data in secondary attacks<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Comprehensive vendor risk review<\/strong> &#8211; Re-verify security posture using NIST Cybersecurity Framework<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>CMIT Solutions provides vendor risk management<\/strong> and 24\/7 monitoring for Las Vegas gaming operations<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Source Attribution --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"20\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.3em;font-weight: 900;margin: 0 0 10px 0\">Sources &amp; Additional Reading<\/h3>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 0.95em;color: #9ba8b1;margin: 0;font-style: italic\"><strong>Primary Sources:<\/strong><br \/>\n\u2022 SC World: <a style=\"color: #002f44;text-decoration: underline\" href=\"https:\/\/www.scworld.com\/brief\/qilin-ransomware-claims-international-game-technology-hack\" target=\"_blank\" rel=\"noopener noreferrer\">Qilin Ransomware Claims International Game Technology Hack<\/a><br \/>\n\u2022 BlackFog: <a style=\"color: #002f44;text-decoration: underline\" href=\"https:\/\/www.blackfog.com\/qilin-ransomware-analysis-impact-and-defense-2025\/\" target=\"_blank\" rel=\"noopener noreferrer\">Qilin Ransomware Analysis: Impact and Defense 2025<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/article>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; The House Always Wins? Not Against Ransomware: IGT Hit by Qilin&#8230;<\/p>\n","protected":false},"author":1008,"featured_media":1251,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts\/1250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/users\/1008"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/comments?post=1250"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts\/1250\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/media\/1251"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/media?parent=1250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/categories?post=1250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/tags?post=1250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}