Topics

Latest

AI

Amazon

Article image

Image Credits:Fairfax Media / Getty Images

Apps

Biotech & Health

mood

People queuing up at Ticketek in central Sydney on 17 January 2005.

Image Credits:Fairfax Media / Getty Images

Cloud Computing

Commerce

Crypto

Enterprise

EVs

Fintech

fund raise

gadget

stake

Google

Government & Policy

ironware

Instagram

layoff

Media & Entertainment

Meta

Microsoft

privateness

Robotics

security measures

societal

Space

Startups

TikTok

Transportation

speculation

More from TechCrunch

case

Startup Battlefield

StrictlyVC

newssheet

Podcasts

TV

Partner Content

TechCrunch Brand Studio

Crunchboard

adjoin Us

A cyberpunk is advertising customer data point allegedly steal from the Australia - base live consequence and ticket company TEG on a well - known hacking assembly .

On Thursday , a hacker put up for sale the aver steal data from TEG , claim to have information of 30 million users , including the full name , gender , date of birth , username , hash countersign and email address .

In late May , TEG - owned ticketing company Ticketekdisclosed a data breachaffecting Australian customers ’ data , “ which is stored in a cloud - based weapons platform , host by a reputable , global third political party supplier . ”

The ship’s company say that “ no Ticketek customer news report has been compromised , ” thanks to the encryption methods used to lay in their passwords . TEG conceded , however , that “ customer name , date of birth and email addresses may have been impacted ” — information that would line up with that advertised on the chop forum .

The hack include a sample of the alleged steal data in their post . TechCrunch substantiate that at least some of the datum put out on the meeting place appear licit by attempting to sign up for new chronicle using the bring out email addresses . In a act of subject , Ticketek ’s website gave an error , paint a picture the email computer address are already in use .

When reached by email , a spokesperson for TEG did not notice by press time .

On its official site , Ticketek articulate the company “ sells over 23 million ticket to more than 20,000 events each yr . ”

Join us at TechCrunch Sessions: AI

Exhibit at TechCrunch Sessions: AI

While Ticketek did not name the “ cloud - base platform , host by a reputable , global third political party supplier , ” there is evidence that suggests it could be Snowflake , which has beenat the center of a recent serial publication of data theftsaffecting several of its client , includingTicketmaster , Santander Bankand others .

A now - delete post on Snowflake ’s websitefrom January 2023 was titled : “ TEG Personalises Live Entertainment Experiences with Snowflake . ” In 2022 , consult caller Altispublished a sheath studydetailing how the company , working with TEG , “ built a modern information platform for ingesting streaming data into Snowflake . ”

When reached for input on the Ticketek rupture , snow bunting spokesperson Danica Stanczak did not answer our specific interrogative sentence , and instead touch to the company ’s public assertion . In it , Snowflake chief information security officer Brad Jones said that the company has not “ key grounds propose this activity was make by a vulnerability , misconfiguration , or breach of Snowflake ’s weapons platform . ”

Snowflake ’s spokesperson declined to substantiate or abnegate whether TEG or Ticketek is a Snowflake customer .

Snowflake cater companies all over the world with services that facilitate its customers put in information in the cloud . Cybersecurity firm Mandiant , owned by Google , said in the beginning this month thatcybercriminals have stolen a “ pregnant mass of data ” from several Snowflake customers . Mandiant is working with Snowflake to investigate the data breach , and disclosed in a blog post that the two companies have notified around 165 Snowflake customers .

flake has blamed the chop campaign on its customers for not using multi - factor authentication , which allowed hackers to use passwords “ antecedently buy or obtained through infostealing malware . ”