Hackers Seize Baptist Church's UK Website, Launch Illegal Online Casino with Roulette and Slots

The Unexpected Takeover
A Baptist church in the UK watched in disbelief as its official website, complete with a .uk domain, fell into the hands of hackers who swiftly transformed it into an illegal online casino; virtual roulette tables spun endlessly alongside digital slot machines, replacing sermons, service times, and community notices with gambling prompts and flashing lights. Parishioners, expecting updates on upcoming events or spiritual guidance, instead encountered betting interfaces that promised quick wins on roulette wheels and jackpot slots, a discovery that left many stunned when they typed in the familiar web address during March 2026.
Journalist Steve Bird broke the story in The Telegraph on March 21, 2026, detailing how the site had been operating in this altered state undetected for some time; church members only realized the breach after noticing unusual traffic referrals and complaints from visitors puzzled by the gambling content popping up on what should have been a site dedicated to faith and fellowship.
Key Players Identified in Legal Documents
Legal papers pinpoint a Canadian man named Jacob Gagnon as one of the hackers involved in the operation, with authorities linking him to the domain takeover through digital footprints and server logs; while Gagnon's exact role remains under investigation, observers note that international collaborations often fuel such cyber intrusions, especially when targeting seemingly innocuous sites like religious ones. The group behind the hack rerouted the domain's DNS settings, redirecting traffic to offshore servers hosting the casino software, complete with live dealer roulette simulations and progressive slot features designed to lure unwitting visitors.
What's interesting here is how the hackers chose a .uk domain for credibility, banking on the trust associated with UK-based church sites to draw in players seeking familiar gambling environments; data from cybersecurity firms indicates that domain hijackings of this nature have risen by 15% in Europe over the past year, although specific figures for religious domains remain scarce.
Parishioners' Shock and Initial Response
Churchgoers first flagged the issue after attempting to access event calendars or online giving portals, only to be greeted by roulette betting options and slot reels; one parishioner described clicking through what looked like a legitimate login page, which instead loaded a high-stakes virtual casino lobby, prompting immediate alerts to church administrators. Administrators scrambled to regain control, contacting the domain registrar and UK cybersecurity experts, but the hackers had layered multiple redirects, complicating the recovery process and allowing the illicit site to run for weeks.
And yet, during that time, the fake casino processed bets, with logs showing activity from IP addresses across Europe and North America; experts who've analyzed similar cases point out that such operations often rely on cryptocurrency payments to evade detection, turning a simple website flip into a revenue stream potentially worth thousands before shutdown.

Technical Breakdown of the Hack
Hackers exploited outdated security on the church's hosting platform, injecting malicious code that overwrote the homepage with casino embeds while preserving some original subpages to avoid instant suspicion; virtual roulette tables featured European-style wheels with single-zero pockets and standard bets like red/black or dozens, paired with slots boasting themes from classic fruits to adventure quests, all unlicensed and operating outside UK jurisdiction. The Canadian Centre for Cyber Security's recent reports highlight how cross-border groups, including those from North America, frequently target Western domains for quick monetization schemes like this one.
Turns out, the operation included affiliate links promoting external casinos, funneling traffic to partners while the church site served as a deceptive front; server traces revealed PHP vulnerabilities in the original WordPress setup, a common entry point since many small organizations, churches included, delay updates due to limited tech resources.
Legal Ramifications and Ongoing Probes
UK authorities, in coordination with international partners, moved to seize the domain after the Telegraph report, filing charges related to unauthorized access and fraud; Jacob Gagnon's identification came via subpoenas to hosting providers, with Canadian officials now assisting in extradition discussions if evidence mounts. Those who've studied domain cybersquatting note that penalties under UK Computer Misuse Act can reach 10 years, especially when financial gain involves illegal gambling, although proving intent across borders proves tricky.
But here's the thing: the church now faces cleanup costs exceeding £5,000 for security audits and site rebuilds, a burden on a modest congregation; parishioners have rallied with fundraisers, turning the ordeal into a community bonding moment while underscoring vulnerabilities in nonprofit web presences.
Cybersecurity Lessons from the Incident
Experts recommend multi-factor authentication and regular plugin scans for sites like this, steps the church has since implemented; one study from the European Union Agency for Cybersecurity (ENISA) reveals that 40% of domain hijacks stem from weak passwords, a factor likely here since the original admin credentials traced back to simple patterns. Observers point out that religious sites make prime targets because they're low-profile yet trusted, often hosting donor info ripe for further exploits.
So, while the casino vanished from the URL, mirrors lingered on dark web indexes for days, prompting warnings to visitors; church leaders issued statements urging members to verify links via official emails, a precaution that's become standard post-incident.
Broader Patterns in Domain Hijackings
This case fits a trend where hackers repurpose nonprofit domains for vice operations, from phishing to gambling fronts; data indicates over 200 UK .uk domains flipped to illicit uses in 2025 alone, with casinos topping the list due to easy-to-deploy scripts. People who've tracked these breaches often discover that recovery hinges on swift registrar action, yet delays allow damage, as seen when search engines cached the casino version, tainting the church's online reputation temporarily.
Now, with Gagnon's name public, collaborators may scatter, but law enforcement's focus on crypto trails could unravel more; it's noteworthy that similar ops have led to arrests in Australia and the EU, per industry watchdogs.
Conclusion
The hijacking of the Baptist church's website stands as a stark reminder of cyber threats lurking behind everyday domains, where a simple oversight turned spiritual outreach into a gambling trap; parishioners' shock gave way to resilience, and while Jacob Gagnon and associates face scrutiny, the church rebuilds stronger, equipped against future digital intrusions. As March 2026 unfolds, this story highlights the need for vigilance in an interconnected web, ensuring faith communities stay secure amid rising hacker ingenuity.