Hackers leaking Taylor Swift tickets? Don’t keep your hopes up
Trending Now

Hackers leaking Taylor Swift tickets? Don’t keep your hopes up


Proton, the company behind Proton Mail, Google launches end-to-end encrypted option for Docsis trying to compete with the cloud giant on privacy. We reported on how Apple is taking a similar approach with its implementation of AI, using a system it calls Private cloud compute Apple has said this in its new Apple Intelligence features.

In other news, we examined how the US banned TikTok and Kaspersky software despite national security justification, Posing a threat to internet freedom. We went inside a room Crash course for US diplomats on cybersecurity, privacy, surveillance and other digital threats. And we published an in-depth investigation into the origins of the world’s most popular 3D-printed gun, which revealed its creator was a A self-proclaimed “incel” with right-wing terror fantasies,

But that’s not all. Every week, we highlight safety news that we haven’t covered in-depth ourselves. Click on the headlines to read the full news and stay safe.

Huge Hack against Ticketmaster There may have been another twist to the case. In June, criminal hackers claimed they had stolen information on 560 million people from the ticketing company owned by Live Nation. The company has since confirmed the breach, and said its information was stolen from its account. Snowflake Account. (The attacks on the cloud storage company affected more than 165 Snowflake customers, who Lack of multi-factor authentication and theft of login details,

Now in a post on cybercrime marketplace BreachForums, a hacker going by the name Sp1d3rHunters is threatening to publish more data from Ticketmaster. Claims to share account 170,000 ticket barcodes for Taylor Swift’s upcoming shows in the US during October and November The hacker demanded Ticketmaster “pay us $2 million USD” or else it would leak the information of “680 million” users and publish millions more event barcodes, including concerts by artists such as Pink and Sting and sporting events such as NFL games and F1 races.

However, according to the company, these claims appear to be dubious, as Ticketmaster’s barcodes are not static. “Ticketmaster’s Safetix technology protects tickets by automatically refreshing a new and unique barcode every few seconds so it cannot be stolen or copied,” a Ticketmaster spokesperson told WIRED in a statement. The spokesperson further added that the company has not paid any ransom or heeded the hackers’ demands.

Hacker groups are known to lie, exaggerate, and exaggerate their claims as they try to extract money from victims. Sp1d3rHunters has claimed to have data on 680 million customers, which is higher than the original figure given when the Ticketmaster breach was claimed, and none of these numbers have been confirmed. Even if victims decide to pay, the hackers may still keep the data and try to destroy it. Extortion from companies for the second time,

The Ticketmaster breach was originally reported in June, but the company has yet to comment on it. only recently The company has started sending emails to customers alerting them about the incident, which took place between April 2 and May 18 this year. They say The databases accessed may include emails, phone numbers, encrypted credit card information, and other personal information.

In recent years, there has been a rapid increase in the use of information stealing tools by cybercriminals. This malware can steal all the logins and financial details entered by a person on their machine, which the hackers then sell to those who want to exploit this information.

Cybersecurity researchers at Recorded Future have now published Proof-of-concept findings These stolen login details can be used to show Potentially tracking people who visit the dark web Child sexual abuse material (CSAM) sites. The researchers say that within the InfoStealer logs they were able to find thousands of login details for known CSAM websites, which they could cross-reference with other details and identify potential real-world names associated with the offending website logins. The researchers reported the individuals’ details to law enforcement.

Leave a Reply

Your email address will not be published. Required fields are marked *