Over 600,000 US Routers Went Offline after Mysterious Cyberattack – Active IOCs
June 3, 2024Multiple IBM Security Verify Access Vulnerabilities
June 3, 2024Over 600,000 US Routers Went Offline after Mysterious Cyberattack – Active IOCs
June 3, 2024Multiple IBM Security Verify Access Vulnerabilities
June 3, 2024Severity
High
Analysis Summary
Live Nation has verified that Ticketmaster experienced a data breach following the theft of their data from an unidentified third-party cloud database provider—likely Snowflake.
To determine what happened, Live Nation Entertainment, Inc. hired top forensic investigators after discovering unauthorized activity in a third-party cloud database environment containing company data on May 20, 2024, mostly from its Ticketmaster LLC subsidiary. A threat actor listed the company’s purported user data for sale on the dark web on May 27, 2024.
To reduce risks to the users, the company has alerted law enforcement and is assisting them. In addition, they are alerting users and regulatory bodies as necessary of unauthorized access to personal data. Although over 560 million Ticketmaster users' data was allegedly exposed as a result of the breach, the company says it does not think the incident will materially affect its financial situation or overall business operations.
This disclosure follows attempts by a threat actor to sell the stolen Ticketmaster data for $500,000 on a data leak forum. 1.3 terabytes of data, comprising 560 million customers' ticket sales, orders, and event information, are purportedly contained in the allegedly stolen databases. The data includes consumers' complete details, such as names, home and email addresses, and phone numbers.
The threat actors claim that many people are considering purchasing the data. They thought that Ticketmaster itself was one of the purchasers who had approached them. The threat actors indicated they couldn't comment on how they stole the data. Recently, new details about how the threat actors obtained access to the Ticketmaster database and potentially a large number of other consumers' data were made public.
One of the threat actors responsible for the attack claimed they had stolen the data from cloud storage provider Snowflake and were also behind previous data breaches at Ticketmaster and Santander. The attacker also claims that they gained access to a Snowflake employee's ServiceNow account by using credentials that they obtained using information-stealing malware. From there, they were able to steal data from the company. Unexpired auth tokens that might be used to generate session tokens and get access to client accounts to retrieve data were included.
According to the threat actor, they stole data from Anheuser-Busch, State Farm, Mitsubishi, Progressive, Neiman Marcus, Allstate, and Advance Auto Parts among other organizations using this technique. However, these claims were refuted by Progressive and Mitsubishi, who said that there is no proof of a data or system breach.
According to Snowflake, the recent breaches were brought on by weakly secured user accounts that did not have multi-factor authentication activated and whose credentials were stolen. The company stated that although the attacks started in mid-April, customer data wasn't obtained until May 23. Rather than refuting the threat actor’s allegations that they had compromised an employee’s account, Snowflake indicated they had nothing more to say.
Impact
- Unauthorized Access
- Sensitive Information Theft
- Exposure of Sensitive Data
- Reputational Damage
Indicators of Compromise
IP
- 104.223.91.28
- 45.86.221.146
- 185.156.46.144
- 169.150.223.208
- 162.33.177.32
- 45.155.91.99
- 185.204.1.178
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Regularly change passwords for all accounts and use strong, unique passwords for sensitive accounts.
- Implement multi-factor authentication (MFA) on all accounts to add an extra layer of security to login processes.
- Consider the use of phishing-resistant authenticators to further enhance security. These types of authenticators are designed to resist phishing attempts and provide additional protection against social engineering attacks.
- Regularly monitor network activity for any unusual behavior, as this may indicate that a cyberattack is underway.
- Organizations need to stay vigilant and follow best practices for cybersecurity to protect their systems and data from potential threats. This includes regularly updating software and implementing strong access controls and monitoring tools.
- Develop a comprehensive incident response plan to respond effectively in case of a security breach or data leakage.
- Maintain regular backups of critical data and systems to ensure data recovery in case of a security incident.
- Adhere to security best practices, including the principle of least privilege, and ensure that users and applications have only the necessary permissions.
- Establish a robust patch management process to ensure that security patches are evaluated, tested, and applied promptly.
- Conduct security audits and assessments to evaluate the overall security posture of your systems and networks.
- Implement network segmentation to contain and isolate potential threats to limit their impact on critical systems.
- Never trust or open links and attachments received from unknown sources/senders.