{"id":24586,"date":"2024-05-30T03:10:38","date_gmt":"2024-05-30T11:10:38","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/05\/30\/news-18316\/"},"modified":"2024-05-30T03:10:38","modified_gmt":"2024-05-30T11:10:38","slug":"news-18316","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/05\/30\/news-18316\/","title":{"rendered":"The Ticketmaster &#8220;breach&#8221;\u2014what you need to know"},"content":{"rendered":"\n<p>Earlier this week, a cybercriminal group <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/05\/data-leak-site-breachforums-is-back-boasting-live-nation-ticketmaster-user-data-but-is-it-a-trap\">posted an alleged database<\/a> up for sale online which, it says, contains customer and card details of 560 million Live Nation\/Ticketmaster users.<\/p>\n<p>The data was offered for sale on one forum under the name &#8220;Shiny Hunters&#8221;. ShinyHunters is the online handle for a group of notorious cybercriminals associated with numerous data breaches, including the <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/04\/att-confirms-73-million-people-affected-by-data-breach\">recent AT&amp;T breach<\/a>. <\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"817\" height=\"588\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/05\/Administrator_post.jpg?w=817\" alt=\"ShinyHunter offering Live Nation \/ TciketMaster data for sale\" class=\"wp-image-111139\" \/><figcaption class=\"wp-element-caption\"><em>Post on BreachForums by ShinyHunters<\/em><\/figcaption><\/figure>\n<p>The post says:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cLive Nation \/ Ticketmaster<\/p>\n<p>Data includes<\/p>\n<p>560 million customer full details (name, address, email, phone)<\/p>\n<p>Ticket sales, event information, order details<\/p>\n<p>CC detail \u2013 customer last 4 of card, expiration date<\/p>\n<p>Customer fraud details<\/p>\n<p>Much more<\/p>\n<p>Price is $500k USD. One time sale.\u201d<\/p>\n<\/blockquote>\n<p>The same data set was offered for sale in an almost identical post on another forum by someone using the handle SpidermanData. This could be the same person or a member of the ShinyHunters group.<\/p>\n<p>According to <a href=\"https:\/\/www.abc.net.au\/news\/2024-05-30\/ticketmaster-data-breach-how-to-check-if-you-have-been-hacked\/103912494\">news outlet ABC<\/a>, the Australian\u00a0Department of Home Affairs said it is aware of a cyber incident impacting Ticketmaster customers and is \u201cworking with Ticketmaster to understand the incident.\u201d<\/p>\n<p>Some researchers expressed their doubts about the validity of the data set:<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/1f6a8.png\" alt=\"\ud83d\udea8\" class=\"wp-smiley\" style=\"height: 1em;max-height: 1em\" \/><img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/1f6a8.png\" alt=\"\ud83d\udea8\" class=\"wp-smiley\" style=\"height: 1em;max-height: 1em\" \/>Thoughts on the alleged Ticketmaster Data Breach <img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/1f6a8.png\" alt=\"\ud83d\udea8\" class=\"wp-smiley\" style=\"height: 1em;max-height: 1em\" \/><img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/1f6a8.png\" alt=\"\ud83d\udea8\" class=\"wp-smiley\" style=\"height: 1em;max-height: 1em\" \/><\/p>\n<p>TLDR: Alert not Alarmed<\/p>\n<p>The Ticketmaster data breach claim has provided BreachForums with the quick attention they need to boost their user numbers and reputation. <\/p>\n<p>The claim has possibly been over-stated to boost\u2026 <a href=\"https:\/\/t.co\/WJsFkBfQbw\">pic.twitter.com\/WJsFkBfQbw<\/a><\/p>\n<p>&mdash; CyberKnow (@Cyberknow20) <a href=\"https:\/\/twitter.com\/Cyberknow20\/status\/1795667145235595332?ref_src=twsrc%5Etfw\">May 29, 2024<\/a><\/p><\/blockquote><\/div>\n<\/figure>\n<p>While others judged it looks legitimate based on conversations with involved individuals, and studying samples of the data set:<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\" style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Today we spoke with multiple individuals privy to and involved in the alleged TicketMaster breach.<\/p>\n<p>Sometime in April an unidentified Threat Group was able to get access to TicketMaster AWS instances by pivoting from a Managed Service Provider. The TicketMaster breach was not\u2026<\/p>\n<p>&mdash; vx-underground (@vxunderground) <a href=\"https:\/\/twitter.com\/vxunderground\/status\/1796063116574314642?ref_src=twsrc%5Etfw\">May 30, 2024<\/a><\/p><\/blockquote><\/div>\n<\/figure>\n<p>Whether or not the data is real remains to be seen. However, there&#8217;s no doubt that scammers will use this opportunity to make a quick profit.<\/p>\n<p>Ticketmaster users will need to be on their guard. Read our tips below for some helpful advice on what to do in the event of a data breach.<\/p>\n<p>You can also check what personal information of yours has already been exposed online with our Digital Footprint portal. Just enter your email address (it\u2019s best to submit the one you most frequently use) to our\u00a0<a href=\"https:\/\/www.malwarebytes.com\/digital-footprint\">free Digital Footprint scan<\/a>\u00a0and we\u2019ll give you a report.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-7ba16f0b-04e8-4679-9512-2f21a0971dcf\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/digital-footprint?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2c_pro_acq_fy25dfplaunch_171269600960&amp;utm_content=V1\"><\/a><a href=\"https:\/\/www.malwarebytes.com\/digital-footprint\">SCAN NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>All parties involved have refrained from any further comments. We\u2019ll keep you posted.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-protecting-yourself-from-a-data-breach\">Protecting yourself from a data breach<\/h2>\n<p>There are some actions you can take if you are, or suspect you may have been, the <a href=\"https:\/\/www.malwarebytes.com\/blog\/personal\/2023\/09\/involved-in-a-data-breach-heres-what-you-need-to-know\">victim of a data breach<\/a>.<\/p>\n<ul>\n<li><strong>Check the vendor&#8217;s advice.<\/strong> Every breach is different, so check with the vendor to find out what&#8217;s happened, and follow any specific advice they offer.<\/li>\n<li><strong>Change your password.<\/strong> You can make a stolen password useless to thieves by changing it. Choose a&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.malwarebytes.com\/computer\/how-to-create-a-strong-password\" target=\"_blank\">strong password<\/a>&nbsp;that you don&#8217;t use for anything else. Better yet, let a&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.malwarebytes.com\/what-is-password-manager\" target=\"_blank\">password manager<\/a>&nbsp;choose one for you.<\/li>\n<li><strong>Enable two-factor authentication (2FA).<\/strong> If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\" target=\"_blank\">two-factor authentication (2FA)<\/a>&nbsp;can be phished just as easily as a password. 2FA that relies on a FIDO2 device can\u2019t be phished.<\/li>\n<li><strong>Watch out for fake vendors.<\/strong> The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims, and verify any contacts using a different communication channel.<\/li>\n<li><strong>Take your time.<\/strong> Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.<\/li>\n<li><strong>Set up identity monitoring.<\/strong> <a href=\"https:\/\/go.cyrus.app\/MN4j\/tuo2plua\" target=\"_blank\" rel=\"noreferrer noopener\">Identity monitoring<\/a> alerts you if your personal information is found being traded illegally online, and helps you recover after.<\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n<p><strong>We don&#8217;t just report on threats &#8211; we help safeguard your entire digital identit<\/strong>y<\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Protect your\u2014and your family&#8217;s\u2014personal information by using <a href=\"https:\/\/www.malwarebytes.com\/identity-theft-protection\">identity protection<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/05\/the-ticketmaster-breach-what-you-need-to-know\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A database has been put up for sale that allegedly contains the data of 560 million Ticketmaster users. But is it real? <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11172,3921,31476,32,5897,27267,18888],"class_list":["post-24586","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-data-breach","tag-identity-theft","tag-live-nation","tag-news","tag-privacy","tag-shinyhunters","tag-ticketmaster"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24586"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24586\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24586"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}