Saturday, June 22, 2024
6.7 C
Johannesburg

TEG’s Ticketing Ticking Time Bomb: 30 Million Records Hacked


TEG’s Catastrophic Failure: 30 Million Users’ Data Sold on Dark Web, Hacker Exposes Company’s Despicable Security

In a shocking turn of events, a hacker has publicly exposed the personal data of 30 million users from Australia-based live events and ticketing company TEG, including names, dates of birth, email addresses, and hashed passwords. The data was allegedly stolen from TEG’s cloud-based platform, hosted by Snowflake, a company known for its questionable security practices.

TEG’s Lack of Transparency

Despite the company’s claims that no customer accounts were compromised, the hacker’s sample data appears to be legitimate, with many email addresses already in use. TEG’s response to the breach has been criticized for its lack of transparency, with the company refusing to comment on the incident.

Snowflake’s Role in the Breach

The data breach is linked to Snowflake, a cloud-based data warehousing company that has been plagued by security issues. The company’s customers, including Ticketmaster and Santander Bank, have been affected by data thefts. Snowflake’s spokesperson, Danica Stanczak, refused to confirm or deny whether TEG or Ticketek is a Snowflake customer, further fueling concerns about the company’s security practices.

Cybersecurity Experts Weigh In

Cybersecurity firm Mandiant, owned by Google, has confirmed that hackers have stolen a "significant volume of data" from several Snowflake customers. The company has blamed the hacking campaign on its customers for not using multi-factor authentication, but experts argue that this is just a smokescreen to deflect attention from Snowflake’s own security failures.

The Consequences

The data breach has far-reaching implications for TEG’s customers, who may be at risk of identity theft and other forms of cybercrime. The incident also raises questions about Snowflake’s security practices and its ability to protect its customers’ data.

What’s Next?

As the investigation into the breach continues, it remains to be seen what actions will be taken to prevent similar incidents in the future. In the meantime, TEG’s customers are left to wonder how their personal data was compromised and what steps the company will take to prevent future breaches.

Contact Us

If you have any information about this incident or other breaches related to Snowflake, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase, and Wire @lorenzofb, or email lorenzo@techcrunch.com. You can also contact TechCrunch via SecureDrop.



Source link

Hot this week

The Algorithm’s Obsession: You’re the Product

Here is the rewritten content in a provocative...

The Multicloud Mirage: Where Configuration Chaos Reigns

Here is the rewritten content in a provocative...

California’s Landline Law: AT&T’s Unwelcome Gift

AT&T's Landline Service Grab: California Regulators Slam the...

Industrial Rebellion: AI Insurgents Rise to Overthrow Human Mediocrity

Here is a rewritten version of the content...

Altron Unleashes Chaos on Grassroots Football with Sponsorship

Society in Crisis: Altron Documents Solutions Bankrolls Elitist...

Topics

The Algorithm’s Obsession: You’re the Product

Here is the rewritten content in a provocative...

The Multicloud Mirage: Where Configuration Chaos Reigns

Here is the rewritten content in a provocative...

California’s Landline Law: AT&T’s Unwelcome Gift

AT&T's Landline Service Grab: California Regulators Slam the...

Altron Unleashes Chaos on Grassroots Football with Sponsorship

Society in Crisis: Altron Documents Solutions Bankrolls Elitist...

Apple Watch for the Rest of Us: Scoring the Steal

The Apple Watch Series 9 Deals That Will...

Loans for the Lazy: MICOT SETA Hands Out Easy Money

The Media, Information and Communication Technologies Sector Education...

Fisker’s Empire Up in Flames: Fire Sale Looms

Here is the rewritten content in a provocative...
spot_img

Related Articles

Popular Categories

spot_imgspot_img