Oasis Ticket Sales Scams: How to Stay Safe
During our weekly meetings with the banking industry and Police Scotland, we continue to see a significant increase in ticket scams over the last three…
In May 2024, Ticketmaster, a subsidiary of Live Nation, confirmed a significant data breach that potentially impacted 560 million users. The breach involved unauthorised access to an internal database within a third-party cloud environment, identified on May 20th. Following this, on May 27th, a criminal group known as ShinyHunters offered the stolen data for sale on the dark web, demanding $500,000 for 1.3TB of data. This database reportedly includes names, addresses, emails, phone numbers, partial credit card details, and ticketing order information.
The breach was linked to a compromised employee account at Snowflake, a cloud storage company used by Ticketmaster. The attackers reportedly bypassed Okta’s secure authentication by using stolen credentials to access a Snowflake employee’s ServiceNow account. This allowed them to generate session tokens to exfiltrate data from multiple Snowflake customers.
Snowflake, in collaboration with cybersecurity firms CrowdStrike and Mandiant, is investigating the incident. While Snowflake disputes the hacker’s claims and suggests the breach resulted from industry-wide identity-based attacks using stolen credentials, it acknowledges increased threat activity targeting its customers.
The TTPs used in this breach highlight several key strategies:
To protect against similar breaches, businesses and individuals can implement the following measures:
If you suspect your information was compromised in the Ticketmaster breach, take the following steps: