www.malwarebytes.com
Open in
urlscan Pro
192.0.66.233
Public Scan
Submitted URL: https://clicks.malwarebytes.com/u/click?_t=24fabbbc5c2c43578ed8469e4f452569&_m=9c1b57e21c0846a98abdfc45e06e28df&_e=7P2TybMn9Jgli...
Effective URL: https://www.malwarebytes.com/blog/news/2024/05/the-ticketmaster-breach-what-you-need-to-know?utm_source=iterable&utm_medium=e...
Submission: On May 30 via manual from BR — Scanned from DE
Effective URL: https://www.malwarebytes.com/blog/news/2024/05/the-ticketmaster-breach-what-you-need-to-know?utm_source=iterable&utm_medium=e...
Submission: On May 30 via manual from BR — Scanned from DE
Form analysis
5 forms found in the DOMGET https://www.malwarebytes.com/
<form role="search" method="get" class="search-form" action="https://www.malwarebytes.com/">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Type to search..." value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
GET https://www.malwarebytes.com/
<form role="search" method="get" class="search-form" action="https://www.malwarebytes.com/">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Type to search..." value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
GET https://www.malwarebytes.com/blog/
<form role="search" method="get" class="search-form" action="https://www.malwarebytes.com/blog/">
<div class="labs-sub-nav__searchbar-wrap">
<input class="labs-sub-nav__search-input" type="text" name="s" placeholder="Search Labs">
<button class="labs-sub-nav__search-button" id="cta-labs-rightrail-search-submit-en" aria-label="Search in Malwarebytes">
<svg xmlns="http://www.w3.org/2000/svg" width="35px" height="35px" viewBox="0 0 24 24" fill="none">
<g clip-path="url(#clip0_15_152)">
<rect width="24" height="24" fill="none"></rect>
<circle cx="10.5" cy="10.5" r="6.5" stroke="#0d3ecc" stroke-linejoin="round"></circle>
<path d="M19.6464 20.3536C19.8417 20.5488 20.1583 20.5488 20.3536 20.3536C20.5488 20.1583 20.5488 19.8417 20.3536 19.6464L19.6464 20.3536ZM20.3536 19.6464L15.3536 14.6464L14.6464 15.3536L19.6464 20.3536L20.3536 19.6464Z" fill="#0d3ecc">
</path>
</g>
<defs>
<clipPath id="clip0_15_152">
<rect width="24" height="24" fill="#0d3ecc"></rect>
</clipPath>
</defs>
</svg>
</button>
</div>
</form>
GET https://www.malwarebytes.com/digital-footprint-app
<form style="margin-bottom: 32px; border-radius: 1em; padding: 24px 16px; background-color: #18181a; background-image: radial-gradient(#525252 1.5px,transparent 0); background-size: 20px 20px;" id="form" method="GET"
action="https://www.malwarebytes.com/digital-footprint-app" target="_blank" __bizdiag="96619420" __biza="WJ__" vwo-element-id="1713202132545" vwo-op-1713202348479="">
<h2 style="margin: 0 8px 0 8px; color: #fff; font-family: Poppins,sans-serif; font-size: 24px; margin-bottom: 24px" class="vwo_1712655349804 vwo_1712757835977" dir="ltr"> <img class="mb-logo"
src="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/src/digital-footprint/dist/assets/mb-logo.svg" alt="malwarebytes logo" style="height: 18px"> <br>Digital Footprint Portal </h2>
<p style="color: #fff; margin-left: 8px; margin-right: 8px" class="vwo_1712654910657 vwo_1712655348228 vwo_1712655373236">Enter your email to see if your personal data has been exposed. </p>
<div style="display: flex; justify-content: flex-end; flex-wrap: wrap;" class="vwo_1712617537229">
<div style="margin: 0 8px 16px 8px; flex-grow: 1; display: flex; padding: 24px 20px; align-items: center; gap: 12px; border-radius: 28px; border: 1px solid #fff; box-shadow: 0 1px 2px #0d10170f; height: 20px; background-color: #18181a;"
class="vwo_1712616680831 vwo_1712616818681 vwo_1712655073123"> <img
src="data:image/svg+xml,%3csvg%20width='20'%20height='20'%20viewBox='0%200%2020%2020'%20fill='none'%20xmlns='http://www.w3.org/2000/svg'%3e%3cpath%20d='M2.7978%203.49805H17.1978C18.1878%203.49805%2018.9978%204.25945%2018.9978%205.19004V15.342C18.9978%2016.2726%2018.1878%2017.034%2017.1978%2017.034H2.7978C1.8078%2017.034%200.997803%2016.2726%200.997803%2015.342V5.19004C0.997803%204.25945%201.8078%203.49805%202.7978%203.49805Z'%20stroke='white'%20stroke-linecap='round'%20stroke-linejoin='round'/%3e%3cpath%20d='M18.9978%205.18848L9.99779%2011.1105L0.997803%205.18848'%20stroke='white'%20stroke-linecap='round'%20stroke-linejoin='round'/%3e%3c/svg%3e"
alt="email icon"> <input style="margin: 0; width: 100%; background-color: #18181a; border: none; outline: none; color: #fff; font-size: 20px; font-style: normal; font-weight: 300; line-height: 24px;" type="email" name="email"
autocomplete="off" placeholder="name@email.com" class="vwo_1712616897633 vwo_1712660000524"> </div> <input type="submit" value="Scan"
style="margin: 0 8px 0 8px; background: #0d3ecc; color: #fff; border: none; height: 50px; border-radius: 100px; padding: 14px 40px" class="vwo_1712660005400">
</div>
</form>
https://www.malwarebytes.com/newsletter/
<form action="https://www.malwarebytes.com/newsletter/" class="newsletter-form">
<div class="newsletter-form__inline">
<label>Email Address</label>
<input type="email" name="email" id="cta-footer-newsletter-input-email-en" placeholder="Email Address" required="" class="newsletter-form__email">
<input type="hidden" class="newsletter-form__pageurl" value="https://www.malwarebytes.com/blog/news/2024/05/the-ticketmaster-breach-what-you-need-to-know">
<input name="source" type="hidden" value="">
<input type="submit" value="Sign Up" class="newsletter-form__btn" id="cta-footer-newsletter-subscribe-email-en">
</div>
<div class="newsletter-form__validate hidden">
<span></span>
</div>
</form>
Text Content
Skip to content Search Search Malwarebytes.com Search for: * Contact Us * Personal Support * Business Support * Get a Quote * Contact Press * Submit Vulnerability * Company * About Malwarebytes * Careers * News & Press * Sign In * MyAccount sign in: manage your personal or Teams subscription > * Cloud Console sign in: manage your cloud business products > * Partner Portal sign in: management for Resellers and MSPs > * Personal < Personal Products * Malwarebytes Premium Security > * Malwarebytes Privacy VPN > * Malwarebytes Identity Theft Protection > * Malwarebytes Browser Guard > * Malwarebytes for Teams/small offices > * AdwCleaner for Windows > -------------------------------------------------------------------------------- Find the right product See our plans Infected already? Clean your device now Solutions * Free antivirus > * Free virus scan & removal > * Windows antivirus > * Mac antivirus > * Android antivirus > * iOS security > * Chromebook antivirus > * Digital Footprint Scan > See personal pricing Manage your subscription Visit our support page * Business < Business BUNDLES * ThreatDown Bundles * Protect your endpoints with powerfully simple and cost-effective bundles * Education Bundles * Secure your students and institution against cyberattacks TECHNOLOGY HIGHLIGHTS * Managed Detection & Response (MDR) * Deploy fully-managed threat monitoring, investigation, and remediation * Endpoint Detection & Response (EDR) * Prevent more attacks with security that catches what others miss * Explore our portfolio > Visualize and optimize your security posture in just minutes. Learn more about Security Advisor (available in every bundle). > * Pricing < Pricing Personal pricing Protect your personal devices and data Small office/home office pricing Protect your team’s devices and data Business pricing (5+ employees) Step up your corporate endpoint security. Save up to 45% * Partners < Partners Explore Partnerships Partner Solutions * Resellers * Managed Service Providers * Computer Repair * Technology Partners * Affiliate Partners Contact Us * Resources < Resources Learn About Cybersecurity * Antivirus * Malware * Ransomware Malwarebytes Labs – Blog * Glossary * Threat Center Business Resources * Reviews * Analyst Reports * Case Studies Press & News Reports The State of Malware 2023 Report Read report * Support < Support Technical Support * Personal Support * Business Support * Premium Services * Forums * Vulnerability Disclosure * Report a False Positive Featured Content * Activate Malwarebytes Privacy on Windows device. See Content Product Videos Free Download * Contact Us * < Contact Us * Personal Support * Business Support * Get a Quote * Contact Press * Submit Vulnerability * Company * < Company * About Malwarebytes * Careers * News & Press * Sign In * < Sign In * MyAccount sign in: manage your personal or Teams subscription > * Cloud Console sign in: manage your cloud business products > * Partner Portal sign in: management for Resellers and MSPs > Search Search Search Malwarebytes.com Search for: SUBSCRIBE rss News | Privacy THE TICKETMASTER “BREACH”—WHAT YOU NEED TO KNOW Posted: May 30, 2024 by Pieter Arntz DIGITAL FOOTPRINT PORTAL Enter your email to see if your personal data has been exposed. Earlier this week, a cybercriminal group posted an alleged database up for sale online which, it says, contains customer and card details of 560 million Live Nation/Ticketmaster users. The data was offered for sale on one forum under the name “Shiny Hunters”. ShinyHunters is the online handle for a group of notorious cybercriminals associated with numerous data breaches, including the recent AT&T breach. Post on BreachForums by ShinyHunters The post says: > “Live Nation / Ticketmaster > > Data includes > > 560 million customer full details (name, address, email, phone) > > Ticket sales, event information, order details > > CC detail – customer last 4 of card, expiration date > > Customer fraud details > > Much more > > Price is $500k USD. One time sale.” The same data set was offered for sale in an almost identical post on another forum by someone using the handle SpidermanData. This could be the same person or a member of the ShinyHunters group. According to news outlet ABC, the Australian Department of Home Affairs said it is aware of a cyber incident impacting Ticketmaster customers and is “working with Ticketmaster to understand the incident.” Some researchers expressed their doubts about the validity of the data set: While others judged it looks legitimate based on conversations with involved individuals, and studying samples of the data set: Whether or not the data is real remains to be seen. However, there’s no doubt that scammers will use this opportunity to make a quick profit. Ticketmaster users will need to be on their guard. Read our tips below for some helpful advice on what to do in the event of a data breach. You can also check what personal information of yours has already been exposed online with our Digital Footprint portal. Just enter your email address (it’s best to submit the one you most frequently use) to our free Digital Footprint scan and we’ll give you a report. SCAN NOW All parties involved have refrained from any further comments. We’ll keep you posted. PROTECTING YOURSELF FROM A DATA BREACH There are some actions you can take if you are, or suspect you may have been, the victim of a data breach. * Check the vendor’s advice. Every breach is different, so check with the vendor to find out what’s happened, and follow any specific advice they offer. * Change your password. You can make a stolen password useless to thieves by changing it. Choose a strong password that you don’t use for anything else. Better yet, let a password manager choose one for you. * Enable two-factor authentication (2FA). If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of two-factor authentication (2FA) can be phished just as easily as a password. 2FA that relies on a FIDO2 device can’t be phished. * Watch out for fake vendors. The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims, and verify any contacts using a different communication channel. * Take your time. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts. * Consider not storing your card details. It’s definitely more convenient to get sites to remember your card details for you, but we highly recommend not storing that information on websites. * Set up identity monitoring. Identity monitoring alerts you if your personal information is found being traded illegally online, and helps you recover after. -------------------------------------------------------------------------------- We don’t just report on threats – we help safeguard your entire digital identity Cybersecurity risks should never spread beyond a headline. Protect your—and your family’s—personal information by using identity protection. SHARE THIS ARTICLE RELATED ARTICLES News | Scams BEWARE OF SCAMMERS IMPERSONATING MALWAREBYTES May 30, 2024 - Scammers and other cybercriminals love to use our name to defraud their victims. Here's what to look out for. CONTINUE READING 0 Comments Android | News HOW TO TURN OFF LOCATION TRACKING ON ANDROID May 29, 2024 - This post explains how to disable various location services on Android devices. CONTINUE READING 0 Comments News DATA LEAK SITE BREACHFORUMS IS BACK, BOASTING LIVE NATION/TICKETMASTER USER DATA. BUT IS IT A TRAP? May 29, 2024 - The notorious BreachForums seem to have returned, but the question is: who's pulling the strings? CONTINUE READING 0 Comments Android | News PCTATTLETALE SPYWARE LEAKS DATABASE CONTAINING VICTIM SCREENSHOTS, GETS WEBSITE DEFACED May 28, 2024 - Stalkerware app pcTattleWare had its websites defaced and databases leaked after researchers found several security flaws. CONTINUE READING 0 Comments News A WEEK IN SECURITY (MAY 20 – MAY 26) May 27, 2024 - A list of topics we covered in the week of May 20 to May 26 of 2024 CONTINUE READING 0 Comments ABOUT THE AUTHOR Pieter Arntz Malware Intelligence Researcher Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books. Contributors Threat Center Podcast Glossary Scams Cyberprotection for every one. FOR PERSONAL * Windows Antivirus * Mac Antivirus * Android Antivirus * Free Antivirus * VPN App (All Devices) * Malwarebytes for iOS * SEE ALL COMPANY * About Us * Contact Us * Careers * News and Press * Blog * Scholarship * Forums FOR BUSINESS * Small Businesses * Mid-size business * Larger Enterprise * Endpoint Protection * Endpoint Detection & Response (EDR) * Managed Detection & Response (MDR) FOR PARTNERS * Managed Service Provider (MSP) Program * Resellers MY ACCOUNT Sign In SOLUTIONS * Digital Footprint Scan * Rootkit Scanner * Trojan Scanner * Virus Scanner * Spyware Scanner * Password Generator * Anti Ransomware Protection ADDRESS One Albert Quay 2nd Floor Cork T12 X8N6 Ireland 3979 Freedom Circle 12th Floor Santa Clara, CA 95054 LEARN * Malware * Hacking * Phishing * Ransomware * Computer Virus * Antivirus * What is VPN? * Twitter * Facebook * LinkedIn * Youtube * Instagram CYBERSECURITY INFO YOU CAN’T LIVE WITHOUT Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats. Email Address English * Legal * Privacy * Accessibility * Compliance Certificates * Vulnerability Disclosure * Terms of Service © 2024 All Rights Reserved Select your language * English * Deutsch * Español * Français * Italiano * Português (Portugal) * Português (Brasil) * Nederlands * Polski * Pусский * 日本語 * Svenska This site uses cookies in order to enhance site navigation, analyze site usage and marketing efforts. Please see our privacy policy for more information. Privacy Policy Cookies Settings Decline All Accept All Cookies PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Privacy Policy Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details PERFORMANCE AND FUNCTIONALITY Performance and Functionality These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details ANALYTICS Analytics These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details ADVERTISING Advertising These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Decline All Confirm My Choices