MGA breach claim escalates as German researcher threatens data release and Malta vows legal response

The Malta Gaming Authority is investigating unauthorised access to one of its systems after German security researcher Lilith Wittmann claimed responsibility, accused the regulator of enabling organised crime, and threatened to release a wider archive of gambling related data if enforcement action is pursued.
Liam O'Brien
• The Malta Gaming Authority disclosed on 17 March that it identified unauthorised access within one of its systems and activated incident response measures.
• German security researcher Lilith Wittmann later claimed responsibility publicly and said data had been shared with media partners and authorities.
• Wittmann accused the regulator of enabling organised crime schemes, an allegation the MGA has rejected as unsubstantiated.
• The regulator has condemned any extraction or dissemination of data and says it is working with technical teams and relevant authorities to establish the full facts.
• The episode has raised immediate questions for Malta’s licensing ecosystem, including potential exposure of compliance materials and the likely legal path involving cross-border cooperation.
The Malta Gaming Authority has been forced into an uncomfortably public crisis after a German security researcher claimed responsibility for a system breach and framed the incident as the start of a wider disclosure campaign targeting Malta’s online gambling ecosystem.
On 17 March, the MGA published a short statement confirming it had identified a breach within one of its systems and immediately activated internal response protocols. It said containment and mitigation measures had been implemented as a precaution, investigations were ongoing, and updates to impacted entities would follow in due course. The regulator did not identify the alleged intruder, did not describe what systems were affected, and did not specify what categories of data might have been accessed.
That controlled message did not hold for long. In public posts that circulated widely across the industry, Lilith Wittmann, a Berlin-based security researcher, claimed she was responsible for the unauthorised access. She addressed the regulator directly, writing that she had hacked the MGA and that the data obtained had been shared with media partners and authorities. She then escalated the claim into a broader accusation, stating that she intended to expose what she described as organised crime enablement schemes and questioning the regulator’s presentation of itself as a legitimate public service.
Wittmann also issued a pointed warning about legal consequences. She said she hoped German authorities would not extradite her to Malta and claimed she could face up to ten years' imprisonment for hacking a public service. She added that any police action from Malta would trigger the immediate release of her full archive of gambling-related data. The framing was not responsible disclosure. It was a public challenge, coupled with a threat to publish more material if enforcement accelerates.
The MGA has since responded more directly, confirming it is aware of public statements from an individual claiming responsibility for unauthorised access and making allegations and threats in that context. The regulator said it condemns any unauthorised access to its systems and any extraction, handling or dissemination of data obtained through such activity, describing such conduct as unacceptable and incompatible with lawful engagement with public institutions and established governance frameworks.
In the same response, the MGA sought to protect the legitimacy of its role. It said it operates within a robust legal and regulatory framework and carries out its statutory functions with integrity, independence and accountability. It described the allegations made in the context of unauthorised system access as unsubstantiated and said they do not undermine its commitment to transparency, due process and the rule of law. It reiterated that it is treating the matter with the utmost seriousness and continues to work with technical teams and relevant authorities to assess the situation.
The central uncertainty remains the scope of what was accessed. Wittmann has asserted that she is holding sensitive material. Some coverage has suggested this could include operator compliance files and player records, although the MGA has not confirmed what data, if any, has been extracted. That lack of detail is now a risk in itself. Malta’s gaming sector is a major national industry, and the MGA is the licensing gatekeeper for a large community of operators that depend on the authority’s credibility when dealing with banks, partners, and regulators in other jurisdictions.
Wittmann’s profile adds fuel to the story. She is known in German cybersecurity circles and has previously exposed weaknesses in high visibility systems. She has also targeted the gambling sector before, including a March 2025 incident in Germany involving security concerns around Merkur-related systems, where she claimed she identified an insecure interface that exposed large volumes of player information. That track record is one reason her claims are being watched closely, even as the most serious allegation, that a national regulator enabled organised crime, remains unproven in public.
The legal path from here is complex and politically sensitive. Malta’s authorities will be assessing whether criminal thresholds are met and whether to pursue cross-border action. Within the European Union, legal cooperation mechanisms can move quickly, but practical outcomes depend on prosecutorial appetite, the precise allegations, and how German authorities interpret the conduct and the public interest arguments Wittmann has attached to it. Meanwhile, the risk of further disclosure remains an active pressure point, given her explicit threat to release a larger archive if enforcement is pursued.
For the MGA, the crisis has shifted from a contained technical incident to a credibility test in full view of the industry it regulates. For operators, it is now a question of operational exposure and reputational spillover, not only whether sensitive information has been accessed, but how quickly Malta, Germany, and the wider regulatory community respond once the factual picture is established.
This is the worst possible shape of cyber incident for a regulator: a breach with limited confirmed detail, followed by a named claimant who controls the narrative through public threats. Even if the technical impact ultimately proves narrow, the perception risk is already wide. A regulator’s authority is built on trust, and trust erodes quickly when a third party credibly suggests the regulator cannot safeguard the data it holds.
Wittmann’s posture is also a strategic escalation. By pairing a political allegation with a conditional threat of publication, she is attempting to deter enforcement and force institutions into a defensive stance. That does not mean her organised crime claim is true, but it does change the incentives for everyone involved. Malta cannot ignore the threat because silence invites suspicion. Germany cannot treat it as a routine cyber case because the public framing turns it into a debate about whistleblowing, proportionality, and cross-border justice.
The industry impact will hinge on two things: what data was accessed and how fast the MGA provides clarity to affected licence holders and counterpart regulators. If any sensitive compliance materials, ownership information, or player records were exposed, the consequences extend beyond embarrassment into regulatory notifications, contractual disputes, and potential secondary enforcement in other jurisdictions. The MGA’s next statements will need to move beyond incident language and into verifiable facts, because the longer the information vacuum persists, the more the story will be written by the person threatening to fill it.
Enjoyed this article? Share it: