Hackers Leaking Taylor Swift Tickets? Don’t Get Your Hopes Up


Proton, the corporate behind Proton Mail, launched an end-to-end encrypted various to Google Docs, in search of to compete with the cloud large on privateness. We broke down how Apple is taking an identical method with its implementation of AI, utilizing a system it calls Private Cloud Compute in its new Apple Intelligence options.

In different information, we dug into how the US bans on TikTok and Kaspersky software program, regardless of their nationwide safety justifications, pose a risk to web freedom. We went inside a crash course for US diplomats on cybersecurity, privateness, surveillance, and different digital threats. And we revealed an in-depth investigation into the origins of the world’s hottest 3D-printed gun, which revealed that its creator was a self-described “incel” with fantasies of right-wing terror.

But that’s not all. Each week, we spherical up the safety information we didn’t cowl in depth ourselves. Click the headlines to learn the complete tales, and keep protected on the market.

The large hack towards Ticketmaster could have taken one other twist. In June, felony hackers claimed that they had stolen 560 million folks’s data from the ticketing firm owned by Live Nation. The firm has since confirmed a breach, saying its data was taken from its Snowflake account. (More than 165 Snowflake prospects have been impacted by assaults on the cloud storage firm that exploited a scarcity of multi-factor authentication and stolen login particulars).

Now in a put up on cybercrime market BreachForums, a hacker going by the identify of Sp1d3rHunters is threatening to publish extra knowledge from Ticketmaster. The account claims to be sharing 170,000 ticket barcodes for upcoming Taylor Swift gigs within the US throughout October and November. The hacker demanded Ticketmaster “pay us $2million USD” or it should leak “680 million” customers’ data and publish tens of millions extra occasion barcodes, together with for concert events by artists resembling Pink and Sting, and sporting occasions resembling NFL video games and F1 races.

The claims seem like doubtful, nonetheless, as Ticketmaster’s barcodes aren’t static, in line with the corporate. “Ticketmaster’s SafeTix expertise protects tickets by mechanically refreshing a brand new and distinctive barcode each few seconds so it can’t be stolen or copied,” a Ticketmaster spokesperson tells WIRED in a press release. The spokesperson provides that the corporate has not paid any ransom or engaged with the hackers’ calls for.

Hacker teams are identified to lie, exaggerate, and overinflate their claims as they attempt to get victims to pay. The 680 million prospects that Sp1d3rHunters claimed to have knowledge on is increased than the unique determine supplied when the Ticketmaster breach was first claimed, and neither quantity has been confirmed. Even if victims do determine to pay, hackers can nonetheless maintain the information and attempt to extort corporations for a second time.

Despite the breach at Ticketmaster initially being publicized in June, the corporate has solely just lately begun emailing prospects alerting them to the incident, which occurred between April 2 and May 18 this yr. The firm says the database accessed could embrace emails, cellphone numbers, encrypted bank card data, and different private data.

In current years, there’s been a pointy uptick in cybercriminals deploying infostealers. This malware can seize all the login and monetary particulars that somebody enters on their machine, which hackers then promote to others who wish to exploit the knowledge.

Cybersecurity researchers at Recorded Future have now revealed proof-of-concept findings displaying these stolen login particulars can be utilized to probably monitor down folks visiting dark-web baby sexual abuse materials (CSAM) websites. Within infostealer logs, the researchers say they have been capable of finding 1000’s of login particulars for identified CSAM web sites, which they may then cross-reference with different particulars and determine the potential real-world names related to the abusive web site logins. The researchers reported particulars of people to legislation enforcement.



Source hyperlink

Leave a Reply

Your email address will not be published. Required fields are marked *