MGM’s casinos in Las Vegas continued to be affected by “cybersecurity issue” on Friday — five days after getting hacked — with many slot machines silenced while guests squawked about broken elevators and poor service.
One person staying at MGM Resorts-owned Aria said the hotel was handing out so-called “guest recovery voucher to any hotel guest who complains about mainly anything in any respect this weekend,” in line with a post on social media platform X.
The $25 voucher says the hotel “sincerely apologizes if any a part of your visit has been lower than exceptional.”
One other user on the positioning formerly often called Twitter posted a photo showing a case of water in an elevator.
“Front desk mentioned a number of the elevators were randomly getting stuck,” the user captioned the post.
It was unclear which of the 12 MGM-operated hotels on the Las Vegas Strip this particular user was staying at.
![Clips posted to social media showed casino floors in Las Vegas looking uncharacteristically dark -- a sign that MGM has not reached an agreement with the ransomware group behind the attack, which began on Sunday.](https://nypost.com/wp-content/uploads/sites/2/2023/09/NYPICHPDPICT000039536227.jpg?w=1024)
![MGM Resorts International operates 31 hotels -- 12 of which are located on the Las Vegas Strip.](https://nypost.com/wp-content/uploads/sites/2/2023/09/NYPICHPDPICT000039529006.jpg?w=1024)
Meanwhile, a video shared of Aria’s casino showed dozens of gaming machines with blacked-out screens displaying an “out of service” message, while over within the lobby, an extended line stretched on the reception desk.
One other clip showed the Aria slots malfunctioning, with screens flickering in a really apparent software issue.
“The Aria slot machines are extra hacked today,” the user captioned the post.
MGM has remained vague concerning the nature of the hack — which reportedly affected its hotels in Las Vegas and 7 other states — though assured guests that “the overwhelming majority of our property offerings currently remain operational,” and the hotel was still accepting reservations “through third-party booking sites.”
![Many slot machines displayed](https://nypost.com/wp-content/uploads/sites/2/2023/09/NYPICHPDPICT000039625086.jpg?w=574)
An update shared to the corporate website said that as of Friday, MGM Resorts was still being affected by a cybersecurity issue.
A gambler who won on a working Bellagio slot machine showed that winnings are only being paid out by hand, with an MGM staffer doling out the money.
Besides eye-watering financial losses and offline slot machines, other reports over the past few days included guests getting locked out of their rooms, hotel phones not working and MGM’s company website crashing.
![Staffers at Aria were handing out $25 vouchers that could be used on food or drinks to placate guests.](https://nypost.com/wp-content/uploads/sites/2/2023/09/NYPICHPDPICT000039625366.jpg?w=1024)
In accordance with digital security watchdog site Cybernews, the hackers behind the breach — which the outlet identified because the ALPHV/BlackCat (ALPHV) ransomware group — issued a press release around 8 p.m. on Thursday threatening “additional attacks” if their ransom demands are usually not met.
MGM has yet to say whether it plans to comply with the hackers.
Representatives for MGM didn’t immediately reply to The Post’s request for comment.
Shares of MGM Resorts International were down nearly 2%, to $40.97, on Friday, as the corporate continued grappling with its cybersecurity woes.
![Because company computers were also affected by the cyberattack, check-in lines grew painstakingly long.](https://nypost.com/wp-content/uploads/sites/2/2023/09/NYPICHPDPICT000039625083.jpg?w=574)
Meanwhile, Caesars Entertainment on Thursday reportedly paid roughly $15 million in an try to placate hackers who threatened to leak the sensitive customer data stolen during a summer cyberattack.
The Las Vegas casino giant’s payout was roughly half of the $30 million that the hackers had demanded, in line with The Wall Street Journal.
Caesars admitted that the hackers breached its systems through a “social engineering attack on an outsourced IT support vendor,” according to a regulatory filing.
The hackers stole a duplicate of the Caesars’ loyalty program database, including the driving force’s license numbers and Social Security numbers “for a big number” of shoppers.
Caesars didn’t discover the culprits behind the cyberattack, which reportedly began around Aug. 27 with the assistance of a gaggle called Scattered Spider or UNC 3944.