{"id":45899,"date":"2022-03-24T22:00:00","date_gmt":"2022-03-24T22:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/edge-articles\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud"},"modified":"2022-03-24T22:00:00","modified_gmt":"2022-03-24T22:00:00","slug":"how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/","title":{"rendered":"How Casinos Can Prevent Loyalty Incentive and Account Takeover Fraud"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9cc2ff6411a05bf5\/60d958da22d24e38a3846949\/gambling.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Cybercriminals aren&#8217;t picky about their targets \u2014 they go where the money is. And they are paying attention to the gaming industry, which makes a lot of money delivering different forms of entertainment.<\/p>\n<p>The commercial gaming industry appears to be roaring back from pandemic lows, particularly in the online gaming sector. The U.S. commercial gaming industry generated $53 billion in revenue, a 76.7% increase from 2020 and a 21.4% increase from 2019, according to <a href=\"https:\/\/www.americangaming.org\/new\/2021-commercial-gaming-revenue-shatters-industry-record-reaches-53b\/\" target=\"_blank\" rel=\"noopener\">the American Gaming Association&#8217;s Commercial Gaming Revenue Tracker<\/a>. Online gambling had a particularly strong year, as the segment generated $3.71 billion, up 138.9% in 2020 and 614% in 2019.<\/p>\n<p>Security at a casino should involve more than protecting the vault and cage where the money is kept or installing cameras to catch burglars and fraudsters in the act. While casinos typically have lots of cash on the premises, it is rare that they are victims of Hollywood-esque heists, says Justin Wray, director of services at Core BTS, an IT consulting firm. More often, these facilities are victims of <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/fin10-threat-actors-hack-and-extort-canadian-mining-casino-industries\" target=\"_blank\" rel=\"noopener\">common phishing attacks or hacks<\/a>.<\/p>\n<p>&#8220;If you work for a casino\u2026they&#8217;re familiar with this security culture from a physical sense. Take that and apply that to the digital landscape,&#8221; Wray says. &#8220;Have staff members thoroughly trained on the tactics and techniques that [fraudsters] are using to trick them into doing things, because that&#8217;s the No. 1 method that the adversaries use.&#8221;<\/p>\n<p>Anti-phishing software is useful, but it&#8217;s also important to have security awareness training for casino staffers so that they know the signs that they are being phished, Wray says. Casino IT and security teams also have to secure their internal networks from hacking attempts, account takeover, and fraud.<\/p>\n<p><strong>Spotting In-Person Gambling Vulnerabilities<\/strong><br \/>When it comes to protecting casinos&#8217; in-person operations, IT and cybersecurity professionals must keep their security measures up to date, says Wray. Some organizations may fail to update their cybersecurity measures as risks evolve over time, he adds.<\/p>\n<p>Among the usual targets for online fraudsters hitting physical casinos are ATMs, gaming machines, and ticket machines for redeeming winnings, he says. To secure a physical casino, IT and cybersecurity professionals should take the basic step of segmenting the organization&#8217;s internal networks, he says, separating the Internet access for the backend departments such as the HR and finance teams from the gaming systems, the guests, and point-of-sale systems.<\/p>\n<p>&#8220;These are all the separate environments from a networking perspective, so that if one of those is compromised, they&#8217;re not all compromised,&#8221; Wray says. &#8220;That&#8217;s a very basic, fundamental security approach. But it&#8217;s something that&#8217;s often overlooked.&#8221;<\/p>\n<p>To spot these issues, casinos have two options, depending on their resources: hire a team of internal cybersecurity professionals to safeguard the organization around the clock or commission a third-party firm to monitor their operations, Wray says. The option you choose, he explains, depends on the funding you have to analyze the data the organization collects and evaluate any alerts you receive across various authentication logs, network logs, and intrusion detection systems you have in place.<\/p>\n<p><strong>Filtering Out Online Gambling Fraudsters<\/strong><br \/>Over the past few years, casinos have been expanding their operations beyond the brick-and-mortar to the lucrative world of online gambling. The COVID-19 pandemic has encouraged that shift.<\/p>\n<p>IT and security teams must also apply security measures to <a href=\"https:\/\/www.darkreading.com\/analytics\/pandemic-pushes-bot-operators-to-redirect-efforts\" target=\"_blank\" rel=\"noopener\">safeguard their operations against online fraudsters<\/a>, says Kimberly Sutherland, vice president of fraud and identity &amp; market strategy at LexisNexis Risk Solutions, a risk management firm. Among the potential targets for cybercriminals are legitimate accounts, which can be exploited in account takeovers, and loyalty incentives programs, she says.<\/p>\n<p>To incentivize new customers, some casinos offer loyalty perks to customers, but cybercriminals can exploit these incentives when signing up to get more credits, she explains. If, for example, a casino offers $10 deposited into new users&#8217; accounts upon joining, online fraudsters can write a script to &#8220;not open one account, but open 100,000 accounts,&#8221; Sutherland says. If multiple new accounts are opened with a different name but using the same address, or if multiple accounts are associated with one device, that&#8217;s a sign that the accounts might be illegitimate, she says.<\/p>\n<p>&#8220;We try to help to identify identity anomalies or when the velocity of an identity element has been used too many times &#8230; so that way, at least the business will have the ability to identify that, and they can make the ultimate decision as to whether they approve or deny,&#8221; Sutherland says.<\/p>\n<p>When it comes to onboarding online gambling customers, casinos try to strike a balance between creating a seamless sign-up experience and screening out potential fraudsters, Sutherland says. Among the telltale signs IT and cybersecurity teams should be looking for to spot cybercriminals are a suspicious location \u2014 which is especially important for the regionally regulated casino industry \u2014 an unusual phone number, or any email address that&#8217;s associated with multiple accounts, she explains.<\/p>\n<p>There are passive ways to verify new customer identities so that casinos&#8217; IT and cybersecurity teams aren&#8217;t relying solely on passwords, Sutherland says. Behavioral biometrics such as whether a customer types their password and phone number or copy-and-pastes it from a document could tip off when a fraudster is trying to log into a legitimate account. Another sign of suspicious activity is a recently swapped SIM card or a forwarded phone number, she adds. Organizations can use a one-time password sent via SMS text to spot whether a SIM card or device has changed before verifying the device, Sutherland explains. Most major mobile carriers offer real-time gateways to let companies inquire about whether a SIM card has recently changed, and software is available to check whether a SIM card has recently changed, she says.<\/p>\n<p>Casinos&#8217; IT and cybersecurity teams can use biometrics stored on devices to authenticate users&#8217; identities, such as a face or fingerprint ID, Sutherland says. There&#8217;s software available that prompts users to unlock their phones using those biometric markers to double-check their identities, she adds. <\/p>\n<p>&#8220;With this significant increase in digital customers, a lot of people are not necessarily tech savvy. So we saw a lot of new-to-digital individuals in the last two years,&#8221; Sutherland says. &#8220;[It&#8217;s the] first time we&#8217;ve seen that device before, or the age of the population that is online is starting to really diversify significantly as well. So there&#8217;s a lot of older adults. There&#8217;s a lot of younger adults. All of those things change the way that cybersecurity teams have to operate.&#8221;<\/p>\n<p>Going forward, the primary way that consumers will blend the in-person and online gambling experience is via mobile devices, because that&#8217;s the device that they&#8217;ll have with them wherever they go, Sutherland foresees. She advises casinos to harness and verify the mobile data they collect to reduce their cybersecurity risk.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/edge-articles\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As casinos go digital, their loyalty programs and authentic accounts are at risk.Read More <a href=\"https:\/\/www.darkreading.com\/edge-articles\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-45899","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Casinos Can Prevent Loyalty Incentive and Account Takeover Fraud 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Casinos Can Prevent Loyalty Incentive and Account Takeover Fraud 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-24T22:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9cc2ff6411a05bf5\/60d958da22d24e38a3846949\/gambling.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How Casinos Can Prevent Loyalty Incentive and Account Takeover Fraud\",\"datePublished\":\"2022-03-24T22:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\\\/\"},\"wordCount\":1142,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt9cc2ff6411a05bf5\\\/60d958da22d24e38a3846949\\\/gambling.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\\\/\",\"name\":\"How Casinos Can Prevent Loyalty Incentive and Account Takeover Fraud 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt9cc2ff6411a05bf5\\\/60d958da22d24e38a3846949\\\/gambling.jpg\",\"datePublished\":\"2022-03-24T22:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt9cc2ff6411a05bf5\\\/60d958da22d24e38a3846949\\\/gambling.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt9cc2ff6411a05bf5\\\/60d958da22d24e38a3846949\\\/gambling.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Casinos Can Prevent Loyalty Incentive and Account Takeover Fraud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Casinos Can Prevent Loyalty Incentive and Account Takeover Fraud 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/","og_locale":"en_US","og_type":"article","og_title":"How Casinos Can Prevent Loyalty Incentive and Account Takeover Fraud 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-24T22:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9cc2ff6411a05bf5\/60d958da22d24e38a3846949\/gambling.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How Casinos Can Prevent Loyalty Incentive and Account Takeover Fraud","datePublished":"2022-03-24T22:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/"},"wordCount":1142,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9cc2ff6411a05bf5\/60d958da22d24e38a3846949\/gambling.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/","url":"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/","name":"How Casinos Can Prevent Loyalty Incentive and Account Takeover Fraud 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9cc2ff6411a05bf5\/60d958da22d24e38a3846949\/gambling.jpg","datePublished":"2022-03-24T22:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9cc2ff6411a05bf5\/60d958da22d24e38a3846949\/gambling.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9cc2ff6411a05bf5\/60d958da22d24e38a3846949\/gambling.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-casinos-can-prevent-loyalty-incentive-and-account-takeover-fraud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"How Casinos Can Prevent Loyalty Incentive and Account Takeover Fraud"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45899","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45899"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45899\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45899"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}