Ticketek Data Breach
Status: Confirmed
Breach Intelligence Summary
Entity: Ticketek · Actor: Play · Source: DataBreach.com / ObscureIQ intelligence
Attack: Social Engineering via Social engineering
Timeline: Breach (May, 2024) · Reported (Jun, 2024) · Leak (Jun, 2024)
Exposure: 29.2M+ records · Dates of birth, Email, Genders, Name, Names, Passwords, Salutations
Status: Confirmed · Risk: Moderate (Account takeover)
Summary
Ticketek Breach: Cloud Supplier Implicated Millions Exposed In late May 2024 Ticketek Australia a major player in the event ticketing world announced a significant data breach that exposed the personal information of potentially millions of its customers. The initial revelation pointed to a compromise within a cloud-based platform hosted by a “reputable global third-party supplier ” immediately highlighting the pervasive risks associated with third-party vendor security. While Ticketek itself wasn’t directly hacked the incident has thrown a harsh spotlight on the interconnectedness of digital services and the cascading impact when one link in the chain breaks. The critical moment of discovery appears to have been a notification from this third-party supplier. Subsequently a notorious threat actor known as ‘Sp1d3r’ listed a massive database purportedly from TEG Ticketek’s parent company for sale on a cybercrime forum. This leak which the hacker claimed contained data from up to 30 million TEG users – including names dates of birth email addresses and hashed passwords – is widely believed to originate from Ticketek. Investigations suggest a possible link to a broader campaign targeting users of Snowflake a cloud data warehousing firm although Ticketek has not officially confirmed this connection. The attackers seem to have exploited stolen customer credentials some possibly obtained years ago through unrelated malware campaigns to access the database. Ticketek owned by TEG Pty Ltd is a prominent ticketing company for entertainment and sporting events across Australia and New Zealand selling millions of tickets annually. Founded in 1990 it has a long history in the industry and manages ticketing for major venues. Breach Unveiled: A Timeline
Late May 2024:, Ticketek announces it has become aware of a cyber incident impacting Australian account holder information stored on a third-party cloud platform. Minister for Cyber Security Clare O’Neil describes it as “potentially affecting many Australians.” May 31 2024: Ticketek’s parent company TEG posts a confirmation of the incident. June 1 2024: Ticketek begins emailing Australian customers informing them that names dates of birth and email addresses were likely exposed. June 2024 (undisclosed date): A hacker ‘Sp1d3r’ advertises a database allegedly from TEG containing details of up to 30 million users for sale on a cybercrime forum for $45 000 (US$30 000). The hacker provides a sample of over 200 individuals’ data. June 19 2024: The NSW Government acknowledges the Ticketek data breach. June 24 2024: Reports emerge detailing the hacker’s attempt to sell the data with security firm HackManac suggesting a “probable Snowflake-related data breach.” June 28 2024: Ticketek provides an update stating it has sought and been granted an injunction to prevent the dissemination of the impacted data. Troy Hunt’s “Have I Been Pwned” platform lists 17.6 million unique email addresses linked to the breach. July 17 2024: The NSW Government provides an update on its assistance in the response to the breach. 2025.
Ticketek’s Response Under Scrutiny In the aftermath of the breach Ticketek initiated several actions. The company publicly acknowledged the incident and began notifying potentially affected individuals via email and through its website. Ticketek reassured customers that its own systems for password encryption and online payment processing were not compromised as these are separate and employ secure encryption methods. The company emphasized that it does not hold identity documents for its customers. An investigation was launched and Ticketek stated it was cooperating with authorities including the Australian Cyber Security Centre (ACSC) the Office of the Australian Information Commissioner (OAIC) and the National Office of Cyber Security. As part of its recent response Ticketek successfully sought an injunction to prevent any third party from accessing disseminating or publishing the exposed data. The company has also been urging customers to remain vigilant against potential scams and social engineering attempts as there are reports of third parties contacting customers about their compromised information. For ongoing support while a dedicated hotline is set to close in May 2025 an email address (cybersafe@ticketek.com.au) will remain available for inquiries related to the breach. The ongoing investigation will be crucial in determining the full scope of the exposed information and the long-term implications for affected individuals, potentially leading to discussions around a settlement or lawsuit if negligence is established.
About Ticketek
Ticketek is the organization affected by this breach. User data may have been generated through account creation, service usage, or business operations.
If you have interacted with Ticketek in any capacity, your data may be included in this breach.
Threat Actor: Play
This breach has been attributed to Play. The group is known for data theft campaigns targeting organizations through various intrusion methods.
- Social engineering
Breach Exploitation Status
Moderate
Status
Detected
Detected
Possible
Unknown
Unknown
1–3 years
Email addresses and usernames persist but credentials may rotate. Phishing risk remains elevated during this window.
Data Points Exposed
Dark Web Verification
Status: Confirmed
- Dataset containing approximately 29.2M+ records has been identified in breach intelligence sources.
- The data is indexed and searchable across breach notification platforms.
Impact
This breach carries moderate risk due to the nature of exposed data fields and the scale of affected records.
- Targeted phishing referencing Ticketek accounts or services
- Credential stuffing against accounts sharing the same password
- Age/DOB used to bypass identity verification questions
- Data broker enrichment and resale
Recommendations for Impacted Individuals
If you believe your information may be included:
Non-clients may request a breach impact review.
Ticketek account updates
Password reset requests
Verify directly through official channels.
Email compromise is often the first pivot point.
Frequently Asked Questions
In May, 2024, Ticketek experienced a data breach that resulted in the exposure of approximately 29.2M+ records containing personal information.
The exposed data includes Dates of birth, Email, Genders, Name, Names, Passwords, Salutations.
Approximately 29.2M+ records were affected based on current breach intelligence.
Yes. This breach is treated as confirmed based on data observed in breach intelligence platforms.
Data circulation has been detected across breach-sharing channels. Downstream exploitation risk exists based on the nature of the exposed fields.
Rotate passwords associated with Ticketek, enable multi-factor authentication on email and financial accounts, and monitor for suspicious activity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed. Free forever.
High-Risk? Get an Exposure Audit
Executives, public figures, and high-net-worth individuals face elevated risk. Our team provides full-spectrum exposure audits and threat monitoring.
Corporate Accountability
Organizations that collect personal data have a duty to implement reasonable safeguards and to notify affected individuals when breaches occur.
Scope assessments may evolve as investigations continue. Users should not rely solely on early estimates when making risk decisions.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Ticketek
- Or simply concerned about credential reuse
We can confirm whether your information is circulating and evaluate downstream threat vectors.
