MGA Confirms System Breach as Security Researcher Claims Responsibility and Shares Data
The Malta Gaming Authority is managing the fallout from a confirmed cybersecurity incident after German IT security researcher Lilith Wittmann publicly claimed responsibility for unauthorised access to one of its systems. In a development that moves the story well beyond standard breach protocol, Wittmann has stated she has already shared obtained data with media organisations and authorities.
The MGA confirmed earlier this week that it had identified unauthorised access affecting one of its systems. Containment and mitigation measures were implemented immediately, and an internal investigation is underway.
While the regulator has not disclosed which systems were affected or the nature of any compromised data, it indicated early on that the activity appeared linked to “an individual presenting themselves as a security researcher,” a description consistent with Wittmann’s subsequent public statements.
Public Claims and Broader Allegations
In a post on X, Wittmann addressed the MGA directly, confirming her involvement and stating that data obtained during the breach had been shared with media partners and regulatory authorities. She went further, making allegations against the regulator itself, claiming to expose what she characterised as “organised crime enablement schemes” masked by the appearance of legitimate public service.
These statements shift the narrative considerably.
What might have remained a technical security incident now carries allegations that, if substantiated, could have real implications for the regulator’s standing. Wittmann also published similar statements on LinkedIn, though the post was later removed by the platform for policy violations, a detail that underscores the sensitivity surrounding the case and the challenges platforms face when content involves alleged misconduct and potentially unlawfully obtained data.
Track Record of High-Profile Disclosures
Wittmann is a Berlin-based IT security researcher and member of the Chaos Computer Club, Europe’s largest hacker association. She has built a reputation for exposing vulnerabilities in both public institutions and private companies, often sparking legal and political debate in the process.
In 2021, she uncovered a vulnerability in a German political party’s campaign app that exposed data from tens of thousands of users. The case led to a criminal complaint, which was subsequently dropped following public backlash.
More recently, she has turned her attention to security issues within the iGaming sector.
In March of last year, she accessed personal data from more than one million online casino players after exploiting weaknesses in software provided by Malta-based company The Mill Adventure. The exposed data reportedly included names, email addresses, credit card details, postal addresses and session data, affecting brands such as Slotmagie.de, Crazybuzzer.de and Merkurbets.de.
A recurring theme in Wittmann’s disclosures is the apparent ease with which she claims to gain access to sensitive systems. Worth knowing: this raises questions about whether these incidents represent isolated failures or symptoms of a broader security problem across the sector.
MGA Response and Legal Framework
In a follow-up statement published on 20 March, the MGA addressed the public claims made in connection with the incident. The authority condemned any unauthorised access to its systems, as well as the extraction, handling or dissemination of data obtained through such activity, describing the conduct as unacceptable and incompatible with lawful engagement with public institutions.
The regulator also pushed back against the broader allegations linked to the case, stating that such claims are “unsubstantiated” and do not reflect how the authority operates. The MGA reiterated that it functions within a “robust legal and regulatory framework” and carries out its statutory responsibilities with “integrity, independence and accountability.”
Wittmann has acknowledged the potential legal consequences of her actions, stating she could face up to 10 years in prison if extradited to Malta. She has defended her actions as being in the public interest, arguing that the information obtained is valuable for public discourse.
Broader Industry Questions
The situation highlights a familiar tension in cybersecurity: when does exposing vulnerabilities cross the line into criminal activity?
For an industry that relies heavily on regulatory trust and data security, this is not a trivial incident.
The case raises several immediate questions. How transparent should regulators be following breaches? Are critical systems and third-party providers sufficiently secure? Where is the practical line between ethical hacking and criminal behaviour?
It also puts the MGA, long viewed as a benchmark regulator in the iGaming space, under a level of public scrutiny it rarely faces. Key details remain unknown, including the full scope of the breach and whether sensitive licensee or player data has been compromised.
What is clear is that this is no longer just a technical issue. With public claims, legal risk and reputational questions now in play, the story is likely to develop further in the coming days. The outcome may well set precedents for how regulators respond to security incidents and how the industry balances transparency with operational security.