Threat Intelligence

Supply Chain Attacks in iGaming: What Every Operator Must Learn from the Fast Track Breach

In October 2025, hackers didn't need to attack 100 iGaming operators individually. They attacked one company — Fast Track, a Malta-based CRM provider — and got them all simultaneously. Player passports. Transaction histories. Betting patterns. KYC documents. All from a single vendor breach. This is the supply chain attack model, and it's the most efficient attack strategy in modern cybercrime.

One supply chain attack (Fast Track) simultaneously exposed players at 100+ iGaming operators.

What Is a Supply Chain Attack?

A supply chain attack targets a trusted third-party vendor to gain access to their customers' data or systems. Rather than attacking each target individually, attackers compromise the single point that has privileged access to many targets simultaneously. In software supply chains, this means compromising a widely-used library or service. In iGaming, it means compromising a CRM, PAM, payment processor, or game studio that serves hundreds of operators.

The Fast Track Breach — What We Know

Fast Track described the October 2025 incident as a "highly sophisticated cyberattack." The data exposed included full player names, email addresses, physical addresses, phone numbers, complete transaction histories, betting patterns, customer support logs, KYC documents (passports, driving licences), and partial payment card data. The crypto casino Shuffle.com was among confirmed affected operators. Fast Track held SOC 2 Type 2 certification at the time — demonstrating that certification is not a guarantee of security.

Why iGaming Is Uniquely Vulnerable to Supply Chain Attacks

iGaming operators grant vendors unusually deep access. A CRM provider has read/write access to your entire player database. A PAM provider controls account balances. A game content aggregator runs JavaScript inside your platform. An affiliate tracking provider touches your acquisition data. This level of integration means that when a vendor is compromised, the attacker inherits all the access the vendor had — often with no detection at the operator level.

Frequently Asked Questions

How can we detect if our vendor has been compromised?

Panorays continuously monitors the external attack surfaces of all your vendors, detecting anomalies that may indicate a breach before the vendor discloses it. You shouldn't have to wait for a vendor press release to know their security has failed.

What should we do immediately after a vendor breach notification?

Isolate the affected integration, conduct a data mapping exercise to understand what data the vendor held, assess GDPR notification obligations, notify the IDPC if player data was exposed, notify affected players, and engage your incident response process.

Does DORA require us to have a response plan for vendor breaches?

Yes. DORA requires documented third-party ICT risk management including incident response procedures for critical vendor failures.

Monitor your vendors continuously with Panorays

Kyanite Blue specialises in cybersecurity for iGaming operators. MGA-licensed operators across Malta trust our stack.

Get in touch

Featured Product

Panorays

Learn more

Ready to secure your iGaming operation?

MGA-licensed operators across Malta trust Kyanite Blue.