The Malta Gaming Authority (MGA) is facing increased scrutiny after confirming unauthorised access to one of its systems, with German security researcher Lilith Wittmann publicly claiming responsibility for the breach. While the regulator acknowledged the incident and launched an internal investigation, it has firmly rejected the broader allegations linked to the case as “unsubstantiated”.
The situation has moved beyond a technical incident, raising questions about regulatory transparency, cybersecurity resilience, and the role of ethical hacking in the iGaming sector.

MGA Confirms Unauthorised Access and Ongoing Investigation
The MGA confirmed that it had identified unauthorised access that affected part of its IT environment, triggering immediate containment and mitigation protocols.
According to the authority, the incident is being treated with seriousness, with internal investigations and technical reviews ongoing to determine the scope of the breach and any potential impact. At this stage, the regulator has not disclosed which systems were affected or confirmed whether sensitive data was accessed.
Separate reporting indicates that core regulatory systems and databases have not shown evidence of compromise, though investigations remain ongoing.
Hacker Claims Responsibility and Makes Serious Allegations
The case escalated after Lilith Wittmann, a Berlin-based security researcher, publicly claimed that data obtained during the breach had been shared with media and authorities, while also making broader allegations about the MGA’s role in the industry, claims that have not been independently verified.
Wittmann also suggested she could release additional data if legal action were pursued against her, adding a layer of legal and reputational risk to the incident.
MGA Rejects Claims and Defends Regulatory Integrity
In its official response, the MGA strongly condemned the unauthorised access and pushed back against the narrative surrounding the breach. The authority stated that:
The MGA condemns any unauthorised access to its systems and any extraction, handling or dissemination of data obtained through such activity. Such conduct is unacceptable and incompatible with lawful engagement with public institutions and established governance frameworks. The Authority operates within a robust legal and regulatory framework and carries out its statutory functions with integrity, independence and accountability. Allegations made in the context of unauthorised system access are unsubstantiated and do not undermine the MGA’s role as a regulator committed to transparency, due process and the rule of law.
The incident highlights broader concerns about cybersecurity resilience within regulatory bodies, particularly in jurisdictions like Malta that play a central role in the global iGaming ecosystem.
Even without confirmed data loss, breaches involving regulators can have wider implications, including:
- Reduced trust among operators, partners and financial institutions
- Increased scrutiny from international regulators
- Heightened expectations for transparency in incident reporting
The situation reinforces the importance of robust cybersecurity infrastructure and crisis communication strategies in maintaining regulatory credibility.
Ethical Hacking vs Criminal Activity: A Growing Debate
The case also feeds into an ongoing debate in cybersecurity:
Where is the line between ethical hacking and illegal intrusion?
While some researchers argue that exposing vulnerabilities serves the public interest, regulators maintain that unauthorised access without responsible disclosure cannot be justified, particularly when it involves public institutions or sensitive systems.
This tension is increasingly relevant in sectors like iGaming, where data sensitivity, financial flows and regulatory oversight intersect.
What Happens Next for the MGA and the Industry
The MGA is expected to continue its investigation and may provide further updates once technical analysis is complete. Key questions remain:
- What systems were accessed and to what extent?
- Was any data extracted or shared?
- Will regulatory or legal action follow?
As the story develops, the focus will likely shift toward evidence, verification of claims, and regulatory response measures.