Data breaches faced by the Entertainment Industry

11 December, 2024 | Miscelanea

Ticketmaster’s parent company, Live Nation, has confirmed “unauthorised activity” in its database after hackers claimed to have stolen personal details of 560 million customers. The hacker group ShinyHunters says the stolen data includes names, addresses, phone numbers, and partial credit card details from Ticketmaster users worldwide. They are reportedly demanding a $500,000 ransom to prevent the data from being sold to other parties.

Regulatory Filing and Investigations

In a filing to the US Securities and Exchange Commission, Live Nation disclosed that on May 27, “a criminal threat actor offered what it alleged to be Company user data for sale via the dark web,” and that it was investigating. The exact number of affected customers remains unconfirmed by Live Nation. The breach was first made public by the hackers, who posted an advert for the data on Wednesday evening. Ticketmaster refused to confirm the breach to reporters or customers immediately, instead notifying shareholders late on Friday. The Australian government and the FBI are collaborating with Ticketmaster to address the issue, although the FBI has not officially commented.

Potential Impact and Historical Context

Live Nation’s filing stated it is working to “mitigate risk” to its customers and notifying users about the unauthorized access. They also noted that the incident has not had a material impact on their overall business operations or financial condition. Despite this, experts warn that the breach could be one of the most significant in history due to the number of global victims. Researchers are also cautioning that this breach might be part of a larger hacking campaign involving the cloud service provider Snowflake, which is used by many large firms to store data. Snowflake has notified customers of increased cyber threat activity targeting some accounts, although they have not identified any breach within their platform.

Broader Hacking Campaign and Related Incidents

In a related incident, Santander confirmed that data from an estimated 30 million customers had been stolen and was being sold by the same group behind the Ticketmaster hack. This suggests a broader series of interconnected cyberattacks, with many more possibly becoming public soon. An advert with data samples allegedly obtained in the breach has been posted on BreachForums, a dark web platform for buying and selling stolen data. ShinyHunters has been linked to several high-profile data breaches, including a 2021 breach involving 70 million customers of US telecom firm AT&T and a breach affecting nearly 200,000 Pizza Hut customers in Australia in 2022. Despite efforts by the FBI to shut down such forums, they continue to reappear.

Previous Security Issues and Legal Challenges

The regulatory filing appears to confirm ShinyHunters’ claim of responsibility for the theft, which reportedly includes 1.3 terabytes of data from 560 million Ticketmaster customers. This incident follows other security issues for Ticketmaster, including a $10 million fine in 2020 for hacking into a competitor’s systems and a cyberattack in November that disrupted ticket sales for Taylor Swift’s tour. Live Nation is also facing a lawsuit from the US Department of Justice accusing it of monopolistic practices in the live music industry. Amidst these challenges, experts advise affected customers to remain vigilant against potential identity theft and scams. They recommend practices such as safe password hygiene, two-factor authentication, monitoring credit card statements, keeping an eye on Ticketmaster accounts, and potentially freezing credit reports.

Conclusion

To protect users from data breaches, it is crucial to implement multi-factor authentication (MFA), as it’s done with RELIANOID ADC, regularly update passwords, and ensure data encryption both at rest and in transit. Regular security audits and vulnerability assessments should be conducted, and users must receive security awareness training. Deploying intrusion detection systems (IDS) and establishing a Security Operations Center (SOC) can help monitor and respond to threats effectively. Additionally, maintaining robust backup and disaster recovery plans, along with employing advanced security technologies like AI and machine learning for threat detection, will further enhance data protection.

SHARE ON:

Related Blogs

Posted by reluser | 28 August 2025
June, July and August 2025 underscored the critical role of fast, coordinated incident response as cyberattacks disrupted companies across industries—from food supply chains and airlines to insurers and consumer brands.…
98 LikesComments Off on Incident Response in 2025: Lessons from June–August
Posted by reluser | 27 August 2025
Japan has taken a landmark step in modernizing its cybersecurity posture with the enactment of the Active Cyberdefence Law (ACD). This legislation marks a significant evolution in the country’s approach…
88 LikesComments Off on Japan’s Active Cyberdefence Law Ushers in a New Era of Cybersecurity
Posted by reluser | 21 August 2025
Why High Availability for Skype for Business is Crucial for Enterprises and How RELIANOID Can Help with Its Solutions In today's fast-paced digital world, communication plays a vital role in…
121 LikesComments Off on Load Balancing and High Availability of Skype for Business