ELEVATED RISK BREACH

Ticketek Data Breach


Status: Confirmed

29.2M+Records
May, 2024Breach
Jun, 2024Data Posted
7/10Severity
ModerateThreat Level

Breach Intelligence Summary


Entity: Ticketek · Actor: Play · Source: DataBreach.com / ObscureIQ intelligence

Attack: Social Engineering via Social engineering

Timeline: Breach (May, 2024) · Reported (Jun, 2024) · Leak (Jun, 2024)

Exposure: 29.2M+ records · Dates of birth, Email, Genders, Name, Names, Passwords, Salutations

Status: Confirmed · Risk: Moderate (Account takeover)

Summary

Ticketek Breach: Cloud Supplier Implicated Millions Exposed In late May 2024 Ticketek Australia a major player in the event ticketing world announced a significant data breach that exposed the personal information of potentially millions of its customers. The initial revelation pointed to a compromise within a cloud-based platform hosted by a “reputable global third-party supplier ” immediately highlighting the pervasive risks associated with third-party vendor security. While Ticketek itself wasn’t directly hacked the incident has thrown a harsh spotlight on the interconnectedness of digital services and the cascading impact when one link in the chain breaks. The critical moment of discovery appears to have been a notification from this third-party supplier. Subsequently a notorious threat actor known as ‘Sp1d3r’ listed a massive database purportedly from TEG Ticketek’s parent company for sale on a cybercrime forum. This leak which the hacker claimed contained data from up to 30 million TEG users – including names dates of birth email addresses and hashed passwords – is widely believed to originate from Ticketek. Investigations suggest a possible link to a broader campaign targeting users of Snowflake a cloud data warehousing firm although Ticketek has not officially confirmed this connection. The attackers seem to have exploited stolen customer credentials some possibly obtained years ago through unrelated malware campaigns to access the database. Ticketek owned by TEG Pty Ltd is a prominent ticketing company for entertainment and sporting events across Australia and New Zealand selling millions of tickets annually. Founded in 1990 it has a long history in the industry and manages ticketing for major venues. Breach Unveiled: A Timeline

Late May 2024:, Ticketek announces it has become aware of a cyber incident impacting Australian account holder information stored on a third-party cloud platform. Minister for Cyber Security Clare O’Neil describes it as “potentially affecting many Australians.” May 31 2024: Ticketek’s parent company TEG posts a confirmation of the incident. June 1 2024: Ticketek begins emailing Australian customers informing them that names dates of birth and email addresses were likely exposed. June 2024 (undisclosed date): A hacker ‘Sp1d3r’ advertises a database allegedly from TEG containing details of up to 30 million users for sale on a cybercrime forum for $45 000 (US$30 000). The hacker provides a sample of over 200 individuals’ data. June 19 2024: The NSW Government acknowledges the Ticketek data breach. June 24 2024: Reports emerge detailing the hacker’s attempt to sell the data with security firm HackManac suggesting a “probable Snowflake-related data breach.” June 28 2024: Ticketek provides an update stating it has sought and been granted an injunction to prevent the dissemination of the impacted data. Troy Hunt’s “Have I Been Pwned” platform lists 17.6 million unique email addresses linked to the breach. July 17 2024: The NSW Government provides an update on its assistance in the response to the breach. 2025.

Ticketek’s Response Under Scrutiny In the aftermath of the breach Ticketek initiated several actions. The company publicly acknowledged the incident and began notifying potentially affected individuals via email and through its website. Ticketek reassured customers that its own systems for password encryption and online payment processing were not compromised as these are separate and employ secure encryption methods. The company emphasized that it does not hold identity documents for its customers. An investigation was launched and Ticketek stated it was cooperating with authorities including the Australian Cyber Security Centre (ACSC) the Office of the Australian Information Commissioner (OAIC) and the National Office of Cyber Security. As part of its recent response Ticketek successfully sought an injunction to prevent any third party from accessing disseminating or publishing the exposed data. The company has also been urging customers to remain vigilant against potential scams and social engineering attempts as there are reports of third parties contacting customers about their compromised information. For ongoing support while a dedicated hotline is set to close in May 2025 an email address (cybersafe@ticketek.com.au) will remain available for inquiries related to the breach. The ongoing investigation will be crucial in determining the full scope of the exposed information and the long-term implications for affected individuals, potentially leading to discussions around a settlement or lawsuit if negligence is established.

About Ticketek

Ticketek is the organization affected by this breach. User data may have been generated through account creation, service usage, or business operations.

If you have interacted with Ticketek in any capacity, your data may be included in this breach.

Threat Actor: Play

This breach has been attributed to Play. The group is known for data theft campaigns targeting organizations through various intrusion methods.

Reported or suspected access method:
  • Social engineering

Breach Exploitation Status

Threat Activity:
Moderate
Signal
Status
Dark web marketplace listings
Detected
Credential stuffing list overlap
Detected
Phishing campaign relevance
Possible
Ransomware affiliate crossover
Unknown
Law enforcement investigation visibility
Unknown

Data Longevity:
1–3 years

Email addresses and usernames persist but credentials may rotate. Phishing risk remains elevated during this window.

Data Points Exposed

Data observed in the leaked dataset:
Dates of birth
Email
Genders
Name
Names
Passwords
Salutations
Not confirmed in dataset:
Social Security Numbers
Payment card data
Passport numbers

Dark Web Verification

Status: Confirmed

  • Dataset containing approximately 29.2M+ records has been identified in breach intelligence sources.
  • The data is indexed and searchable across breach notification platforms.

Impact

This breach carries moderate risk due to the nature of exposed data fields and the scale of affected records.

Primary downstream threats include:
  • Targeted phishing referencing Ticketek accounts or services
  • Credential stuffing against accounts sharing the same password
  • Age/DOB used to bypass identity verification questions
  • Data broker enrichment and resale

Recommendations for Impacted Individuals

If you believe your information may be included:

Check Your Exposure
If you are an ObscureIQ client, this breach has been indexed into your exposure profile.
Non-clients may request a breach impact review.
Expect Targeted Phishing
Watch for messages referencing:
Ticketek account updates
Password reset requests
Verify directly through official channels.
Secure Your Email and MFA
Enable MFA immediately on email first, then financial platforms.
Email compromise is often the first pivot point.
Rotate Reused Passwords
Change any credentials shared with your Ticketek account across other services.
Monitor Financial Accounts
Monitor accounts associated with your exposed email for unauthorized activity.
Suppress Personal Data
Remove exposed addresses, phone numbers, and enrichment data from broker networks and search engines.

Frequently Asked Questions

What happened in the Ticketek data breach?

In May, 2024, Ticketek experienced a data breach that resulted in the exposure of approximately 29.2M+ records containing personal information.

What data was exposed in the Ticketek breach?

The exposed data includes Dates of birth, Email, Genders, Name, Names, Passwords, Salutations.

How many records were affected in the Ticketek breach?

Approximately 29.2M+ records were affected based on current breach intelligence.

Is the Ticketek breach confirmed?

Yes. This breach is treated as confirmed based on data observed in breach intelligence platforms.

Is the Ticketek breach data being used by criminals?

Data circulation has been detected across breach-sharing channels. Downstream exploitation risk exists based on the nature of the exposed fields.

What should I do if I was affected by the Ticketek breach?

Rotate passwords associated with Ticketek, enable multi-factor authentication on email and financial accounts, and monitor for suspicious activity.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed. Free forever.

High-Risk? Get an Exposure Audit

Executives, public figures, and high-net-worth individuals face elevated risk. Our team provides full-spectrum exposure audits and threat monitoring.

Request Consultation

Corporate Accountability

Organizations that collect personal data have a duty to implement reasonable safeguards and to notify affected individuals when breaches occur.

Scope assessments may evolve as investigations continue. Users should not rely solely on early estimates when making risk decisions.

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Ticketek
  • Or simply concerned about credential reuse

We can confirm whether your information is circulating and evaluate downstream threat vectors.

Services
AuditsWipesThreat MonitoringTraining

Classification Tags

Social Engineering
Passwords
Email