We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Hacker Claims Theft of 30M TEG Customer Records

Hacker Claims Theft of 30M TEG Customer Records
Keira Waddell Published on 27th June 2024 Senior Writer

A hacker using the alias “Sp1d3r” has claimed to have breached Ticketek Entertainment Group (TEG), compromising the personal data of approximately 30 million users. The stolen data has allegedly been posted for sale on the notorious BreachForums with an asking price of $30,000.

The hacker claims the breached database contains sensitive information such as full names, genders, business details, dates of birth, usernames, and hashed passwords. This assertion follows an earlier disclosure of a data breach by TEG on May 31, acknowledging a data breach that potentially exposed customer names, dates of birth, and email addresses. While TEG initially stated that no user accounts or payment information were compromised, they have yet to confirm or deny the hacker’s latest claims.

TEG is a prominent Australian ticketing and live entertainment company with a user base of around 30 million. The company’s platforms, including Ticketek, Eventopia, and Softix, serve millions of customers annually. Despite the potential scope of the breach, TEG has not provided specific details about the incident or the cloud service involved.

Evidence suggests a potential link to the Snowflake data theft campaign, which has impacted numerous organizations. The Snowflake campaign involved the exploitation of credentials obtained through infostealer malware, which were then used to target accounts with poor password hygiene. This campaign has been responsible for breaches in several major organizations, including Ticketmaster, Santander Bank, and others.

Cybersecurity firm Mandiant, owned by Google, has been investigating the broader impact of the Snowflake breaches, which affected approximately 165 organizations in total. The firm highlighted that many of the compromised credentials had been vulnerable for over four years.

Users affected by the TEG breach are advised to monitor their financial accounts, change passwords, and remain vigilant against phishing attempts.

About the Author

Keira is an experienced cybersecurity and tech writer dedicated to providing comprehensive insights on VPNs, online privacy, and internet censorship.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address