Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Data of Over Half a Billion Ticketmaster Customers  on Center Stage After Data Breach
Facebook   X   LinkedIn   Email

Data of Over Half a Billion Ticketmaster Customers on Center Stage After Data Breach

June 17, 2024

In late May 2024, Ticketmaster experienced a significant data breach that compromised the personal information of approximately 560 million customers. The breach was discovered on May 20, 2024, when Live Nation, Ticketmaster's parent company, detected unauthorized activity in a third-party cloud database, reportedly provided by the company Snowflake. While the attack occurred on May 20, it’s believed the attackers actually began their attack in mid-April. The breach was publicly acknowledged on May 27, 2024, after a threat actor known as ShinyHunters began selling the stolen data on the dark web for $500,000.

The data, amounting to 1.3 terabytes, includes names, addresses, email addresses, phone numbers, and partial credit card information, as well as details of ticket sales and transactions dating back to 2011. Although full payment card details were not exposed, the breach poses significant risks for social engineering and phishing attacks.

In a conversation with ShinyHunters, reporters from BleepingComputer found out that the group was interested in finding buyers for the data. They also said they believed one of the buyers that approached them was Ticketmaster.

The attackers mentioned they accessed the Ticketmaster data by stealing credentials from an employee of Snowflake. They then used that information to get into the employee’s ServiceNow account which ultimately allowed them to create session tokens and access customer accounts. Those were used to download data.

Ticketmaster is cooperating with law enforcement and has initiated an investigation to mitigate risks and inform affected customers and regulatory authorities. This incident highlights the vulnerabilities in cloud-based storage solutions and the need for robust security measures?. The responsibility for vetting third-party providers falls on the organizations using them. However, employees also bear responsibility for being on the lookout for attempted phishing attacks.

ShinyHunters also mentioned to BleepingComputer they used the same strategy to steal data from many other companies including Anheuser-Busch, State Farm, Allstate, and Nieman Marcus. They are known to gain access to accounts with stolen credentials via Microsoft Office 365 and GitHub, as well as others.

In addition to phishing attacks, those with Ticketmaster accounts should consider adding multifactor authentication (MFA) protection on their mobile accounts to prevent against SIM swaps. This happens when an attacker convinces a cellular provider to change a customer’s phone number to a new device controlled by the attacker. Typically, this is a PIN set up with the provider.

Phishing ID Tips:

  • Unexpected links and attachments
  • Messages from unknown senders
  • Generic greetings
  • Misspelled words
  • Incorrect grammar
  • Blurred graphics and logos
  • Sense of urgency to take an action

Long Past AT&T Data Breach Data Resurfaces Giving Away Sensitive Data on 71 Million Customers

Identity Theft

Long Past AT&T Data Breach Data Resurfaces Giving Away Sensitive Data on 71 Million Customers

AT&T customers heed this warning! At the very least, listen up if you were an AT&T customer way back in 2021, or prior to it. You see, that’s when a threat actor going by the name of ShinyHunters posted to an online forum (RaidForums) that they had acquired sensitive information on 71 million AT&T customers. They declared they were posting it up for sale at a whopping $1 million. What can someone do with all of the information? As you may guess, it can all be used for text phishing; otherwise known as smishing. READ FULL STORY

Ways To See If Your Data Has Been Stolen

Education

Ways To See If Your Data Has Been Stolen

With all the data breaches, whether by intrusion or accident lately, it’s likely your information was exposed somehow to someone you didn’t intend. After all, the marketing company Exactis, exposed hundreds of traits on us in 350 million records. Yahoo let out email addresses and passwords on billions of people, and of course who can forget the massive breach of Equifax just last year. There is a lot of information that gets leaked on us and the more the bad actors have on us, the more targeted their phishing campaigns can be. Checking on whether or not your data is available in the underground can help you mitigate any fraud or identity theft. READ FULL STORY

BOLO for These Most Dangerous Email Attachments

Scams & Phishing

BOLO for These Most Dangerous Email Attachments

Keeping a lookout for suspicious emails has become a daily consequence of our cyber lives. Phishing emails are notorious for having malicious attachments and opening them is a sure way to compromise your device and its data. These attachments are full of malware, ready and waiting to infect your system with a simple click. Make no mistake, any attachment in a questionable email can be dangerous. However, researchers at F-Secure found that some of this year’s biggest email spam campaigns used particular types of malicious attachments more than others. READ FULL STORY

A Whale of a Hack-Targeting High-Level Execs Through Azure

Scams & Phishing

A Whale of a Hack-Targeting High-Level Execs Through Azure

According to Proofpoint, a recent phishing campaign exploits Microsoft Azure, a cloud computing platform specializing in the business community. Data privacy, collaboration, and disaster recovery are just a few benefits of using this cloud. As such, hackers are using Azure to phish a range of high-ranking employees and whales, from CEO's and Vice Presidents to Finance and Account Managers. There's an ongoing malicious campaign targeting them. READ FULL STORY

Crypto Wallets Hacked Through Windows Vulnerability

Mobile Security

Crypto Wallets Hacked Through Windows Vulnerability

The security of crypto wallets has been a question mark for some time. And now, there's a Windows vulnerability leaving users infected with a previously unknown infostealer that's draining crypto wallets. It's called Phemedrone Stealer and malicious campaigns are exploiting this Windows vulnerability to steal crypto wallet contents and other sensitive information from victims. The attackers use malicious .url files to download and exploit the vulnerability that bypasses checks and warnings from Microsoft Defender. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...