- Why the iPad Mini 7 is the ultraportable tablet to beat this holiday travel season - and it's $50 off
- The best iPads for college: Expert tested and reviewed
- One of the best mid-range sports watches I've tested is on sale for Black Friday
- This monster 240W charger has features I've never seen on other accessories (and get $60 off this Black Friday)
- I tested the world's fastest SSD and the results will make power users cry (and now you can save over $50)
Threat Actor Leaks 30,000+ Print-at-Home Tickets
A threat actor continued their extortion campaign against Ticketmaster on Monday by claiming to leak over 30,000 print-at-home tickets stolen from the vendor.
“Sp1d3rHunters” advertised the data dump on an underground forum yesterday, alongside a four-step guide for users to make their own printable barcode tickets. They claimed to have tickets for gigs by Stevie Nicks, Pearl Jam, Foo Fighters, Red Hot Chili Peppers, and many more artists.
The threat actor warned Ticketmaster: “You now have to reset 30K more tickets. Pay us $2m or we will leak the mail and e-ticket barcodes for all your events.”
The leak came just days after the same actor leaked 170,000 tickets to Taylor Swift’s much-hyped Eras Tour.
The ticketing giant had responded to that effort by claiming its own SafeTix technology automatically refreshes the barcodes on these digital tickets, rendering efforts to clone and sell them useless.
Sp1d3rHunters hit back with its latest posting.
“Ticketmaster lies to the public and says barcodes cannot be used. Tickets database includes both online and physical ticket types,” it claimed. “Physical ticket types are Ticketfast, e-ticket, and mail. These are printed and cannot be automatically refreshed.”
The breach itself appears to be traced back to a compromise of Ticketmaster’s Snowflake account, which led to the exposure of data on an estimated 560 million customers.
According to Mandiant, which is investigating the attack, around 165 Snowflake clients had accounts hijacked during that campaign, with threat group ShinyHunters obtaining logins from info-stealer malware and logs.
The incidents led to renewed calls for organizations to follow best practice login security, and ensure they have multi-factor authentication (MFA) switched on for any sensitive online accounts.
The threat actors have apparently also tried to extort other corporate victims of the same campaign, including Neiman Marcus, Santander and the Los Angeles Unified School District.
Read more on Snowfkake breach: Threat Actor Breaches Snowflake Customers, Victims Extorted.