Aftermath · Issue 001

The Fish Tank

A casino breached through its lobby fish tank. Ten gigabytes out before anyone noticed.

Grand casino lobby with floor-to-ceiling aquarium
01 / 08

The casino wanted an impression. Floor-to-ceiling glass, exotic fish from six continents, water held at exactly the right temperature by a sensor bolted to the frame. The aquarium was the first thing guests saw when they walked in.

The sensor had a manufacturer's default password. No one had changed it.

Most networks get breached through email — a click on the wrong link, a password harvested from a forum dump. This one got breached through a fish tank. Not as a metaphor. As a technical fact, documented in a security conference presentation, reported by every major newspaper, and still happening in variations across the industry every year.

Casino floor connected by glowing gold threads
02 / 08

The thermometer was supposed to be isolated. That's what smart building systems always promise — the HVAC talks to the HVAC network, the aquarium controller talks to the aquarium network, the casino floor talks to the casino floor network. Each segment walled off from the others.

The map was never complete. Someone added a connection nobody documented. At some point, the segments stopped being separate.

Networks accumulate connections the way old buildings accumulate additions — at some point, nobody has the original blueprint.

Mechanical fish with glowing red eye in dark water
03 / 08

They moved slowly. That's the detail that gets compressed out of the summary — the speed wasn't the point. The patience was.

From inside the thermometer, they could see more of the network than the thermometer was supposed to see. They used it the way a careful visitor uses an unfamiliar building: walking the corridors, testing door handles, learning what was where and when anyone was watching.

Nobody noticed. Why would they? The temperature readings kept coming in at normal intervals. The fish kept swimming. The guests kept losing money. Everything looked exactly like it was supposed to look.

Server room with one glowing server
04 / 08

There was one server that mattered. Behind a key-card door, in a room built for it, was the database.

It held everything the casino knew about its highest-value guests — the ones who flew in on private planes and requested the same suite every visit and whose losses were large enough to warrant personal attention from management. Names. Contact details. Credit limits. Patterns.

They found it. They weren't supposed to be anywhere near it. The thermometer was in the lobby. The database was in the data center. The network made them neighbors.

Open vault door glowing gold, empty inside, cyberpunk server room
05 / 08

Ten gigabytes. Small enough to move without tripping alarms. Large enough to hold the complete record of people who had trusted a casino with their most sensitive financial information.

They moved it quietly, through the thermometer's outbound connection, in pieces, at a pace that looked like normal device traffic. No alarms. No flags. The data center never knew the door had been opened.

The vault was still glowing when they left. Nobody had noticed.

World map with gold thread arcing to Finland
06 / 08

The data went to a server in Finland. Not Finland for any strategic reason — attackers rent infrastructure from data centers using aliases and prepaid credentials. The country is incidental.

What mattered was that a device in the lobby of a North American casino was sending gigabytes of data to an IP address in Scandinavia. Darktrace, the security firm monitoring the casino's network, flagged the anomaly.

Not because anyone had written a rule for this. No such rule existed. But the behavior deviated from the device's established baseline, and the system noticed the difference.

Security analyst at monitor with gold anomaly
07 / 08

The analyst ran the query again. Same result.

The thermometer had been active for days, sending small packets at irregular intervals — the kind of traffic pattern designed to look like routine telemetry. Except the destination was a foreign server. Except the cumulative volume was ten gigabytes. Except no environmental sensor had any business doing either of those things.

This is what modern detection actually looks like. Not a signature matching a known threat. A system establishing what normal looks like for every device on the network, and then noticing, quietly, when something stops being normal.

Casino aquarium with surveillance cameras overhead
08 / 08

They removed the thermometer. They patched the misconfigured network segment. They updated vendor contracts to require baseline security standards for any IoT device on the network. They added monitoring to the smart building infrastructure. They wrote a report.

The high-roller database was gone. The people whose names and limits and habits were in it had no way of knowing their information had left the building. In 2017, in most jurisdictions, there was no legal obligation to tell them.

The aquarium is still there. The fish are still swimming. There are cameras now. On the water, on the room, on the wires behind the walls. Everything has eyes on it.

End of story