Ticketmaster Hacked: Live Nation Confirms Personal Data Stolen


Entertainment giant Live Nation has announced that its ticketing subsidiary Ticketmaster has been hacked.

Live Nation disclosed the data breach in a mandatory filing with government regulators late Friday after the markets had closed.

In its statement, Live Nation stated it had “identified unauthorized activity within a third-party cloud database environment containing Company data.”

The company did not disclose the name of the third-party cloud database. Amazon Web Services hosts much of Live Nation and Ticketmaster’s infrastructure, as per a previously available customer case study on Amazon’s website.

Live Nation reported that the breach occurred on May 20, and on May 27, a cybercriminal “offered what it alleged to be Company user data for sale via the dark web.” The company did not specify whose personal information was compromised, but it’s believed to relate to customers.

A spokesperson for Live Nation did not immediately respond to a request for comment from Truth Voices or in the previous few days. It’s unclear why it took over a week for the company to publicly disclose the breach.

Earlier this week, the administrator of a revived popular cybercrime forum called BreachForums claimed to be selling the personal information of 560 million customers, including alleged information of Ticketmaster customers, along with ticket sales and customer card information.

Until now, Live Nation had remained silent about the alleged data breach.

Truth Voices obtained a portion of the allegedly stolen data containing tens of thousands of records. Through a series of checks, Truth Voices verified on Friday that the records we checked belong to Ticketmaster customers.

Zack Whittaker
Zack Whittaker
Security Editor. Covers primarily cybersecurity and national security with a tech focus.

Latest stories


Related Articles

Leave a reply

Please enter your comment!
Please enter your name here
Captcha verification failed!
CAPTCHA user score failed. Please contact us!
Continue on app