Hackers Steal Call and Text Records for “Nearly All” Users

0
[ad_1]

AT&T confirms a data breach exposing call and text records for “Nearly All” customers from May 2022 to October 2022. Investigations are underway and 1 arrest has already been made.

While users try to make sense of the Ticketmaster data breach, AT&T has revealed a massive breach. The data breach which occurred earlier this year impacted millions of AT&T customers, allowing hackers to access the call and text message information of around 109 million customers.

The breach, detected on April 19, 2024, exposed call and text message information, affecting “Nearly All” cellular, mobile virtual network operators, and landline customers. AT&T has over 109 million customers in the United States.

As per AT&T’s Form 8-k filing, the stolen data included call and text records of all AT&T mobile clients, customers of mobile virtual network operators, and landline customers who interacted with the numbers between May 1 to October 31, 2022, and January 2, 2023. Hackers gained access to telephone numbers, interactions, aggregate call duration, and cell site identification numbers. 

Data Breach Linked to Snowflake Flaw

AT&T has confirmed to Hackread.com that data was stolen from its Snowflake account in a wave of data theft attacks between April 14 and April 25, 2024, using compromised credentials.

For your information, Snowflake is a cloud-based database provider that allows customers to perform data warehousing and analytics on large volumes of data. The recent Snowflake vulnerability concerns revolve around a series of identity-based cyberattacks targeting Snowflake’s customer accounts, rather than a direct breach of Snowflake’s systems.

Since April 2024, there has been an increase in unauthorized access attempts using stolen credentials from various unrelated cyber incidents including the following:

and 100s of others…

What information was exposed?

  • Duration of the calls
  • Dates of the calls or texts
  • Phone numbers involved in the calls or texts

What information was not exposed?

  • Names
  • Addresses
  • Call/text timestamps
  • Content of calls/texts
  • Social Security numbers

This means while the breach is significant, hackers did not steal any sensitive information but they can correlate metadata to reveal identities.

1 Arrested

AT&T is working with law enforcement to investigate the data breach and apprehend those responsible, while one individual has already been arrested. The company has not yet provided any information on how the breach occurred.

However, it has implemented additional cybersecurity measures to prevent unauthorized access attempts and will notify affected customers soon. There is no evidence of the accessed data being publicly available.

AT&T was granted permission twice by the US Department of Justice to delay public notification of the data breach due to potential national security and public safety risks, which is the first such exception. The FBI and AT&T collaborated during the delay process to boost investigative equities and support AT&T’s incident response work.

“On May 9, 2024, and again on June 5, 2024, the U.S. Department of Justice determined that, under Item 1.05(c) of Form 8-K, a delay in providing public disclosure was warranted. AT&T is now timely filing this report. AT&T is working with law enforcement in its efforts to arrest those involved in the incident. Based on information available to AT&T, it understands that at least one person has been apprehended. As of the date of this filing, AT&T does not believe that the data is publicly available. “

AT&T

Jim Routh, Chief Trust Officer at cybersecurity company Saviynt commented on the AT&T data breach emphasising on overhalling the third-party data storage ecosystem. Though the data breach did not include customer credential information, it is another example of the need for enterprises to invest in redesigning third-party governance models specific to credential management.

Jason Soroko, Senior Vice President of Product at Sectigo, a Scottsdale, Arizona-based provider of comprehensive certificate lifecycle management (CLM), also commented urging Snowflake customers to implement multi-factor authentication (MFA) to protect their accounts from cyber attacks.

Companies using Snowflake should immediately implement multi-factor authentication (MFA) to enhance security and protect sensitive data as MFA provides an additional layer of defence against unauthorized access, significantly reducing the risk of breaches, explained Jason. This is true, not just for Snowflake, but anyone using a third-party service via an authenticated session, that authentication needs to be using a credential stronger than just username and password, he advised.

Nevertheless, this is not the first time that AT&T has been hit by a data breach. In August 2021, hackers sold an AT&T database containing 70 Social Security Numbers (SSNs) on a cybercrime forum. In April 2024, AT&T confirmed a massive data breach impacting a staggering 73 million (73,481,539) current and former customers when hackers leaked the trove of data on Breach Forums.

The company has also been criticized for its billing practices, with some customers accusing it of adding unauthorized charges to their bills. The latest data breach is likely to further erode trust in AT&T.

  1. Google Fi User Data Breached Through T-Mobile Hack
  2. Virgin Media & T-Mobile data breach exposes customers data
  3. AT&T Spies on Customer; Sells Data to the Government: Report
  4. 90GB of Data Posted on Hacker Forum Linked to T-Mobile Glitch
  5. Telecom giant behind routing SMS discloses 5-year-long data breach

[ad_2]
Source link

Dangerous monitoring tool mSpy suffers data breach, exposes customer details

0
[ad_1]

In a new episode of Spy vs Spy, the mobile monitoring app mSpy has suffered a data breach that exposed information about millions of its customers.

As Malwarebytes Labs has reported before, the types of companies that make mobile applications that enable users to non-consensually spy and monitor on other users are also—unsurprisingly—rather lax when it comes to their own security. This is the third known mSpy data breach since the company began in around 2010.

TechCrunch reports that in May 2024, unknown attackers stole millions of customer support tickets, including personal information, emails to support, and attachments, including personal documents.

The stolen support tickets date back to 2014, so that’s a decade’s worth of support tickets, reportedly millions of individual customer service tickets and their corresponding email addresses, as well as the contents of those emails.

Sold as a parental monitoring tool, mSpy touts itself as:

“a hugely powerful phone monitoring app which can report on almost every area of your kid’s online activities (and one or two of the offline ones, too).”

Parental monitoring apps present their own complications—particularly when they’re used non-consensually against children—as they can give parents a near-omniscient, unfiltered view into their children’s lives, granting them access to text messages, shared photos, web browsing activity, locations visited, and call logs. Without getting consent from a child, these surveillance capabilities represent serious invasions of privacy.

The same is true when these types of apps are used against adults, and while mSpy may advertise itself now as a tool for parental safety, that wasn’t the case when it was founded.

In fact, in the early 2010s, mSpy promoted its monitoring capabilities against adults, including both in an office environment and in romantic relationships. Looking back at a 2014 archive of mSpy’s website, the company claims that, with mSpy, employers can “make sure your employees’ time is not wasted on writing personal emails.” In an earlier archived version of mSpy’s website from 2012, the company touts that its app can help you “discover if your partner is cheating on you.”

At Malwarebytes, we prefer to refer to these types of apps as “stalkerware” and as one of the founding members of the Coalition Against Stalkerware, we advise strongly against using these apps.

The Coalition Against Stalkerware defines stalkerware as tools—software programs, apps and devices—that enable someone to secretly spy on another person’s private life via their mobile device. The abuser can remotely monitor the whole device including web searches, geolocation, text messages, photos, voice calls and much more. Such programs are easy to buy and install. They run hidden in the background, without the affected person knowing or giving their consent. Regardless of stalkerware’s availability, the abuser is accountable for using it as a tool and hence for committing this crime.

TechCrunch analyzed where mSpy’s contacting customers were located by extracting all of the location coordinates from the dataset and plotting the data in an offline mapping tool. The results show that mSpy’s customers are located all over the world, with large clusters across Europe, India, Japan, South America, the United Kingdom, and the US.

If you fear your data may have been exposed in this or any other breaches, Malwarebytes has a free tool for you to check how much of your personal data has been exposed online. Submit your email address (it’s best to give the one you most frequently use) to our free Digital Footprint scan and we’ll give you a report and recommendations.

If you are looking for a way to remove stalkerware from your device, you have come to the right place. You can keep these and other threats off your mobile devices by downloading Malwarebytes for iOS, and Malwarebytes for Android today.


Summer mega sale

Go into your vacation knowing you’re much more secure: This summer you can get a huge 50% off a Malwarebytes Standard subscription or Malwarebytes Identity bundle. Run, don’t walk!


[ad_2]
Source link

AT&T data breach exposed call and text records of “nearly all” customers

0
[ad_1]

AT&T has suffered a major data breach affecting “nearly all” of its cellular customers. Hackers broke into its system and stole records of calls and texts its mobile users made between May and October 2022. The stolen data also included those records from customers of mobile virtual network operators (MVNOs) that used AT&T’s network during that period, as well as AT&T landline customers who interacted with the exposed cellular numbers.

AT&T reports a data breach that exposed call and text records of its customers

Earlier this year, AT&T reluctantly admitted a 2021 data breach affecting 73 million customers. The massive breach exposed personal information, including names, addresses, phone numbers, email IDs, Social Security numbers, and dates of birth, of its users. The firm admitted the leak after a hacker tried selling the stolen data. If it wasn’t already a blow to its reputation, AT&T has suffered another major breach, putting more question marks on its security measures.

The cellular giant detected the latest data breach in April 2024 and publicly disclosed it in a regulatory filing early Friday. According to AT&T, a hacker gained unauthorized access to a workspace on a third-party cloud platform it uses and illegally downloaded customers’ call and text records. A company spokesperson told Bloomberg that the compromised cloud platform was Snowflake, a Montana-based cloud computing and data cloud provider.

While the stolen data doesn’t include the contents or time of the calls and messages, it is still one of the biggest breaches of private communications. AT&T also confirmed that the hacker didn’t obtain personal information such as names, Social Security numbers, or dates of birth. Unfortunately, many online tools can link a phone number to people’s identities. As such, this is a massive security threat to people who used AT&T’s wireless services during the specified period.

Well, not just AT&T mobile customers, but also those who used wireless services of MVNOs relying on its network. Boost Mobile, Boost Infinite, Cricket Wireless, TracFone, Black Wireless, FreeUp Mobile, H2O Wireless, Good2Go Mobile, Consumer Cellular, Jolt Mobile, Patriot Mobile, PureTalk, Naked Mobile, Allvoi, FreedomPop, Red Pocket, Straight Talk, Unreal Mobile, and Wing are among the MVNOs that have used AT&T wireless networks in recent years.

AT&T Landline users are also affected

While the breach primarily affected mobile users who made a call or sent a text message over AT&T networks between May and October 2022, the firm said the hacker also stole those records from January 2, 2023, for a “very small” number of customers. Additionally, all AT&T landline users who interacted with phone numbers leaked in this breach during the specified period are affected. The firm says the latest leak doesn’t have any connection with the previous leak.

AT&T has already closed off the illegal access point and is working with cybersecurity experts for further steps. The firm is also in contact with law enforcement and believes that the FBI has apprehended at least one person involved in the breach. There is no evidence that the hacker has publicly exposed the stolen information. AT&T didn’t specify if there has been any abuse of the compromised data. If you were an AT&T customer between 2022 and 2023, stay vigilant. You might want to be cautious about calls and messages from unknown numbers.


[ad_2]
Source link

The EU determines that X’s blue checkmarks are “deceptive”

0
[ad_1]

The EU has been investigating X (formerly Twitter) for some time now to check whether the company complies with its DSA (Digital Services Act). Part of the investigation has concluded with the organization determining that paid blue checkmarks are deceptive to users.

The investigation by an EU commission began on December 18, 2023. The organization was examining issues such as potential deceptive practices, transparency (especially in advertising), and data access for independent researchers. As a result, X is the first company officially accused of violating DSA legislation.

X’s blue checkmarks are deceptive for users, the EU says

The EU Commission found the blue checkmark verification system a deceptive practice, as it makes it difficult for X users to know whether an account is authentic or not. Currently, getting one only requires paying for a supported tier. The platform does not require any additional data. Therefore, the blue checkmark is more of a premium-tier “perk” than a real verification system. However, there are many users who associate it with account authenticity.

The investigation also found cases of profiles using the system to intentionally mislead people on X. So, the EU sees it as a problem that requires a short-term solution. The EU also concluded that X is not complying with its requirements on transparency in advertising and the availability of data to independent researchers either.

Following the conclusions of the investigation, X will have the opportunity to defend itself. However, if nothing changes after the defense, the company will be forced to make notable tweaks to the system. If it continues to violate the legislation, X could receive a fine of up to 6% of its gross revenue. Elon Musk’s company qualifies as a Very Large Online Platform under DSA guidelines. This is because it has more than 45 million monthly active users in EU member countries.

Other matters remain under investigation

The investigation started in 2013 also included other areas. For example, the distribution of illegal content or moderation on posts related to the war between Israel and Hamas. However, the EU confirmed that the investigation remains ongoing for those issues.

Lately, the EU has been actively investigating large companies for compliance with regulations such as the DSA or the DMA. Regarding the latter, Apple was charged for violations related to the App Store, while Google and Microsoft’s moves in the AI segment are under vigilance.


[ad_2]
Source link

“Nearly all” AT&T customers had phone records stolen in new data breach disclosure

0
[ad_1]

In a déjà-vu nightmare, US phone giant AT&T has notified customers that cybercriminals managed to download phone call and text message records of “nearly all of AT&T cellular customers from May 1, 2022 to October 31, 2022 as well as on January 2, 2023”.

In a filing with the Securities and Exchange Commission (SEC), AT&T said:

“On April 19, 2024, AT&T Inc. (“AT&T”) learned that a threat actor claimed to have unlawfully accessed and copied AT&T call logs.”

AT&T says the customer data was illegally downloaded from its workspace on a third-party cloud platform. This might be related to the Snowflake incidents we have seen several of by now.

In the statement, AT&T specifies which data it believes was stolen:

“The call and text records identify the phone numbers with which an AT&T number interacted during this period, including AT&T landline (home phone) customers. It also included counts of those calls or texts and total call durations for specific days or months.”

And which data is unlikely to be included:

“The downloaded data doesn’t include the content of any calls or texts. It doesn’t have the time stamps for the calls or texts. It also doesn’t have any details such as Social Security numbers, dates of birth, or other personally identifiable information.”

Even though the data doesn’t include customer names, there are many easy ways to find the name that’s associated with a phone number.

This is the second time AT&T has disclosed a security incident this year. Back in March, AT&T confirmed that 73 million people had been affected in a breach that people had been speculating about for some time.

Protecting yourself after a data breach

There are some actions you can take if you are, or suspect you may have been, the victim of a data breach.

  • Check the vendor’s advice. Every breach is different, so check with the vendor to find out what’s happened, and follow any specific advice they offer.
  • Change your password. You can make a stolen password useless to thieves by changing it. Choose a strong password that you don’t use for anything else. Better yet, let a password manager choose one for you.
  • Enable two-factor authentication (2FA). If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of two-factor authentication (2FA) can be phished just as easily as a password. 2FA that relies on a FIDO2 device can’t be phished.
  • Watch out for fake vendors. The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims, and verify the identity of anyone who contacts you using a different communication channel.
  • Take your time. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.
  • Consider not storing your card details. It’s definitely more convenient to get sites to remember your card details for you, but we highly recommend not storing that information on websites.
  • Set up identity monitoring. Identity monitoring alerts you if your personal information is found being traded illegally online, and helps you recover after.

Malwarebytes has a free tool for you to check how much of your personal data has been exposed online. Submit your email address (it’s best to give the one you most frequently use) to our free Digital Footprint scan and we’ll give you a report and recommendations.


Summer mega sale

Go into your vacation knowing you’re much more secure: This summer you can get a huge 50% off a Malwarebytes Standard subscription or Malwarebytes Identity bundle. Run, don’t walk!


[ad_2]
Source link

Samsung’s official cases for Galaxy Z Fold 6 & Flip 6 unveiled

0
[ad_1]

Samsung has introduced its official accessories for the Galaxy Z Fold 6 and Galaxy Z Flip 6. Both new foldables get four official protective cases and an anti-reflective screen film. Apart from the clear/transparent case, all others come in multiple colors. The company posted YouTube videos highlighting the key features of the new covers. Several third-party accessory makers have also launched protective cases and screen protectors for the duo.

Samsung launches official cases for the Galaxy Z Fold 6

Like its predecessors, the Galaxy Z Fold 6 supports S Pen (Fold Edition) but the stylus isn’t included in the retail box. It’s an optional accessory you can buy separately. This also means the device lacks a built-in silo to keep the S Pen. Thankfully, Samsung offers an S Pen Case with an integrated stylus slot. According to the company, this year’s version is slimmer and more portable than ever. It also comes with design improvements for easier S Pen access.

The Galaxy Z Fold 6’s S Pen Case is available in Navy, Pink, and Gray colors and bears an MSRP of $100. However, Samsung is currently selling it for just $50. It usually costs $75, so that’s a $25 saving right there. But if you won’t buy the S Pen or don’t need a case with an S Pen slot, Samsung’s Silicon Case gives you a kickstand and an easy-carrying grip. It has an MSRP of $85 and is currently priced at $64. It comes in White and Gray color variants.

Next up, we have the Kindsuit Case with a smooth textured finish. It’s a minimalist case with no add-ons or extra features. Samsung offers it in Gray and Brown/Tan colors. This case costs $67.50 (MSRP $90). Lastly, the Galaxy Z Fold 6 gets a Clear Case that is transparent by design so it doesn’t obfuscate the device’s original look. It has a raised camera border and a grip holder to keep the foldable in your hand. Its MSRP is $50 but Samsung sells it for $37.50.

The Galaxy Z Flip 6 gets a Flipsuit Case

Since the Galaxy Z Flip 6 doesn’t support S Pen, there is no S Pen Case for it. Instead, Samsung offers a Flipsuit Case with an interactive LED card that uses NFC for innovative sync of the phone’s back panel and cover screen. It costs $45 (MSRP $60). The Flip model’s Silicon Case is available in Gray, Navy, Blue, Yellow, and Mint colors, while the Kindsuit case comes in Gray, Yellow, and Mint shades. They cost $30 (MSRP $40) and $75 (MSRP $100).

The Galaxy Z Flip 6’s Clear Case costs $30 (MSRP $40). All of these accessories are available for pre-order through Samsung’s official website, though some color variants are out of stock. The company should soon restock them. Since the new foldables will be generally available starting July 24, Samsung will probably ship the covers before that. Several third-party accessory makers have also launched protective cases and screen protectors for the duo.

Buy the Samsung Galaxy Z Fold 6 (Samsung.com)

Buy the Samsung Galaxy Z Flip 6 (Samsung.com)


[ad_2]
Source link

Sony to rebrand IMX image sensors to LYTIA by 2026

0
[ad_1]

Sony may shift all its smartphone image sensors to the new LYTIA brand, including the existing IMX sensor lineup. According to a new report, the company is slowly doing away with the IMX brand for mobile image sensors. It has already rebranded some IMX sensors to LYTIA (LYT). It plans to completely shift to the LYT lineup by 2026.

Sony to move its IMX mobile image sensors to the LYTIA brand

Sony is one of the first names that comes to mind when talking about smartphone camera makers. The Japanese firm has been in this industry since 2003 and supplies image sensors to many smartphone companies. Its IMX sensors are found on flagship and mid-range smartphones. It is a leading player in the image sensor industry, alongside Samsung and a few others.

A few years ago, Sony introduced a new LYTIA line of mobile image sensors. The company said the new brand will “convey the worldview and value that its mobile image sensors provide to the world.” With LYTIA, it aims to “build on its history of contributing to smartphone photography and videography” and give more people access to creative imaging experiences “beyond imagination.”

Since then, Sony has gradually expanded the LYTIA lineup of mobile image sensors. It has launched new products across various categories, including a few flagship offerings. The OnePlus 12 uses the LYT-808 flagship sensor for its 50MP primary camera. Its 48MP ultrawide camera has Sony’s IMX581 sensor, while the 64MP 3x zoom camera uses OmniVision’s OV64B sensor.

According to tipster Yogesh Brar on X, the IMX lineup of Sony sensors will soon disappear. The Japanese firm is in the process of ending this branding for its image sensors. LYTIA will replace it across all segments. Not just new sensors, Sony plans to move its existing IMX solutions under the LYTIA brand. The 50MP IMX890 and IMX882 have already been rebranded as LYT-701 and LYT-600.

The rebranding will be completed in 2026

Sony plans to gradually rebrand all IMX sensors to LYT. This rebranding process will reportedly be completed in 2026. Realme has already confirmed that its upcoming Realme 13 Pro and 13 Pro+ will feature Sony’s rebranded LYT-701 and LYT-600 50MP sensors. The phones will arrive later this month. In the meantime, expect Sony LYTIA sensors on more phones.

The company should also soon announce new LYTIA image sensors. Its arch-rival Samsung recently unveiled a 200MP sensor and two 50MP sensors for flagship smartphones.


[ad_2]
Source link

Save $100 on the Apple Watch Series 9 with this Early Prime Day Deal

0
[ad_1]

Amazon is currently selling the newest Apple Watch Series 9 for just $299, which is going to save you $100 off of the regular price and make for a great early Prime Day Deal. Currently, the 41mm model is on sale for $299, with the 45mm for $329. That’s $100 off of each size. On top of that, the cellular models are also on sale, with the 41mm cellular being on sale for $399 and the 45mm cellular being on sale for $429.

This is the first time in a long time that we have seen all models of the Apple Watch Series 9 discounted. So if you’ve been on the fence about grabbing one, now is the time.

The Series 9 builds upon Apple’s already impressive health monitoring capabilities. With the introduction of more advanced sensors, users can expect even more precise readings on heart rate, blood oxygen levels, and sleep patterns. The addition of a new temperature sensor enhances its ability to monitor overall health, providing valuable data that could detect early signs of illness or stress. These features alone make the Series 9 a worthy investment for those conscious about their health and well-being.

Apple’s dedication to user experience shines through in the Series 9, with its faster processor ensuring that apps launch quickly and run smoothly. This seamless interaction, coupled with the latest watchOS, offers a range of new software features and improvements, enhancing productivity and allowing for greater customization.

Fitness enthusiasts will appreciate the expanded workout tracking capabilities, which now include more sports and activities. Whether you’re into high-intensity interval training, yoga, or outdoor adventures, the Series 9 has you covered, offering detailed analysis and personalized feedback to help you reach your fitness goals.

Moreover, the Apple Watch Series 9 boasts an even more durable design, making it suitable for all kinds of adventures. Its enhanced battery life also means you can go longer between charges, ensuring you stay connected and on top of your health and fitness without constant power-ups.

Finally, with its elegant design and customizable watch faces and bands, the Series 9 is not just a smartwatch; it’s a fashion statement that complements any style.

Buy at Amazon


[ad_2]
Source link

Hackers Leak 10M ‘Unrefreshable’ Ticket Barcodes

0
[ad_1]

The latest Ticketmaster leak impacts top celebrities and events including Taylor Swift, Jennifer Lopez, and Justin Timberlake concerts. Hackers claim barcodes can’t be refreshed, undermining security.

Ticketmaster hackers have released 10 million tickets, including barcodes for high-profile events featuring top celebrities like Taylor Swift, Jennifer Lopez, and Justin Timberlake. This latest attack directly challenges Ticketmaster’s “SafeTix” technology, which is designed to prevent ticket theft by continuously refreshing barcodes.

The hackers posted the data on Breach Forums early this morning, claiming that the barcodes cannot be refreshed, undermining Ticketmaster’s security measures specifically designed for mobile tickets.

According to threat actors behind the latest leak, the data includes mail and e-ticket event barcodes for hundreds of events, inviting users to print their own tickets from home without fear of the barcodes changing.

Top Events Affected:

As seen by the Hackread.com Research Team, the leaked data impacts the following celebrities and events:

  • Taylor Swift: 175,000 tickets
  • Jennifer Lopez: 143,000 tickets
  • Justin Timberlake: 205,000 tickets
  • Morgan Wallen: 350,000 tickets
  • Foo Fighters: 320,000 tickets
  • Kacey Musgraves: 205,000 tickets
  • P!NK: 170,000 tickets
  • Rolling Stones: 100,000 tickets
  • Pearl Jam: 100,000 tickets
  • Hozier: 400,000 tickets
Ticketmaster Data Breach: Hackers Leak 10 Million Ticketmaster Tickets
Threat actor publishing Ticketmaster data (Screenshot: Hackread.com)

Data Analysis

The ticket industry is a complicated one. Although Hackread.com has over a decade of experience in data breach analysis, things can be tricky sometimes. Therefore, we used ChatGPT-4o to analyze a small sample from the leak. Here’s what it found:

"The dataset appears to be a detailed extract of Ticketmaster ticket sales for an upcoming event featuring Jennifer Lopez. The data includes various details about the tickets, such as sales order ID, delivery type, event details, ticket barcode values, seat information, pricing, and venue information. Here’s a breakdown of the key columns and their meanings:

SALES_ORD_ID: Unique identifier for the sales order.
DELIVERY_TYPE_CD: Type of ticket delivery, e.g., "eTicket" or "Mail".
EVENT_ID: Unique identifier for the event.
EVENT_NAME: Name of the event (e.g., Jennifer Lopez: This Is Me...Live).
EVENT_LOCALDATE: Local date of the event.
EVENT_LOCALTIME: Local time of the event.
TKT_BARCODE_VAL: Barcode value for the ticket.
SECT_NAME: Name of the section where the seat is located.
ROW_NUM: Row number for the seat.
SEAT_NUM: Seat number.
SRC_EVENT_ID: Source event ID (not provided in this data).
TKT_FACE_VAL_AMT: Face value amount of the ticket.
EVENT_VENUE_NAME: Name of the venue (e.g., Scotiabank Arena).
EVENT_VENUE_CITY: City where the event is taking place (e.g., Toronto).
EVENT_VENUE_STATE: State or province where the event is taking place (e.g., Ontario).
EVENT_VENUE_COUNTRY: Country where the event is taking place (e.g., CA for Canada).
SERVICE_CHARGE_AMT: Service charge amount for the ticket.
HOST_SYS_CD: Host system code.
HOST_VAX_ACCT_NUM: Host VAX account number.
EXTENDED_TKT_TYPE_CD: Extended ticket type code.
BASE_TKT_TYPE_CD: Base ticket type code.
XNUM_CD: Extended number code.
VEN_ID: Venue ID.
QUALIFIER_NAME1: Qualifier name 1.
QUALIFIER_NAME2: Qualifier name 2.
QUALIFIER_NAME3: Qualifier name 3.
QUALIFIER_COMBO_ID: Qualifier combo ID.
CPN_CAT_ID: Coupon category ID.
CPN_PWD_PRIM_VAL: Coupon password primary value.
MEMBERDB_SALES_ORD_ID: Member database sales order ID.
ORD_CREATE_OPR_CD: Order create operator code.
SALES_PLATFORM_CD: Sales platform code.
EVENT_KEY: Event key.
EVENT_HEX: Event hexadecimal code.
EVENT_TIMEZONE: Timezone of the event.
EVENT_URL: URL of the event page on Ticketmaster.
EVENT_VENUE_KEY: Venue key.
EVENT_VENUE_POSTCODE: Venue postcode.
EVENT_VENUE_ADDR1: Venue address line 1.
EVENT_VENUE_ADDR2: Venue address line 2.
EVENT_VENUE_LONG: Longitude of the venue.
EVENT_VENUE_LAT: Latitude of the venue.

Key Points:

Event Information: All entries are for the event "Jennifer Lopez: This Is Me...Live" on August 2, 2024, at 8:00 PM, held at Scotiabank Arena in Toronto, Ontario, Canada.
Ticket Delivery Type: Tickets are either "eTicket" or "Mail".

Ticket Details: Includes section, row, and seat number, along with the barcode value.

Pricing: Face value and service charge amounts are included.

Venue Details: Information about the venue's name, city, state, country, postal code, and geographical coordinates.

Sales Platform: Tickets were sold through different platforms such as mobile, desktop, and webview.

MOST CRUCIAL:

The dataset includes critical details that could be used to create counterfeit tickets if it falls into the wrong hands. Here’s why:

Ticket Barcode Values: Each entry contains a unique TKT_BARCODE_VAL which is the barcode value for the ticket. This barcode is what gets scanned at the event venue to verify the ticket’s authenticity and entry validity.

Event Details: The dataset includes the exact date, time, and location of the event. This information is essential for generating a legitimate-looking ticket.

Seating Information: Detailed seating information (section, row, and seat number) is provided, which would allow for the creation of tickets that look real and are specific to certain seats.

Face Value and Service Charges: Knowing the exact face value and service charges helps to make the counterfeit ticket pricing appear genuine.

Venue Information: The venue’s name, address, and even geographical coordinates are available, which are typically included on a printed ticket.

URLs: The dataset includes URLs that could potentially be used to fetch additional event-specific information or resources to further validate the counterfeit ticket.

If someone has access to this dataset, they can potentially print their own tickets using the barcodes provided. The challenge for Ticketmaster would be to differentiate between legitimate and counterfeit tickets, especially if the barcodes are static and not refreshed regularly."

Ticketmaster Breach: Hackers Leak 10M 'Unrefreshable' Ticket Barcodes
Screenshot from the leaked data (Screenshot: Hackread.com)

Previous Leaks:

The latest leak is part of the hacking spree the threat actors unleashed against Ticketmaster back in May 2024 when the ShinyHunters hacking group claimed responsibility for stealing data from 560 million Ticketmaster users.

On July 8, 2024, hackers leaked 30,000 ticket barcodes for major events, including a DIY guide on how to create physical tickets from the leaked data. Earlier leaks on July 4 and 5, 2024 involved 44,000 and 170,000 ticket barcodes related to Taylor Swift’s The Eras Tour, respectively. In total, the hackers announced stealing a treasure trove of data including the following:

  • 980 million sales orders
  • 680 million order details
  • 1.2 billion party lookup records
  • 440 million unique email addresses
  • 4 million uncased and deduped records
  • 560 million AVS (Address Verification System) detail records
  • 400 million encrypted credit card details with partial information.

It is worth mentioning that ShinyHunters and Sp1d3rHunters are two different individuals but are affiliated with the group behind the Ticketmaster data breach.

Nevertheless, Ticketmaster faces increasing pressure to reinforce its security protocols and regain public trust. The company has yet to comment on the latest leak and its implications for the “SafeTix” technology. Stay tuned for further updates on this developing story.

  1. Alleged ShinyHunters Hacker Group Member Arrested
  2. Live Nation Confirms Massive Ticketmaster Data Breach
  3. TEG Ticket Vendor Breach: 30M User Records for Sale
  4. ShinyHunters Leak 33 Million Twilio Authy Phone Numbers
  5. AT&T breach ShinyHunters selling AT&T database with 70M SSN

[ad_2]
Source link

OnePlus COO talks about OnePlus Nord 4’s metal build, updates & more

0
[ad_1]

The OnePlus Nord 4 will launch on July 16, and the company’s COO, Kinder Liu, talked about the phone ahead of that date, its metal build, updates, and more. He did not reveal much, but he was interviewed by Digital Trends and did reveal some tidbits.

The OnePlus Nord 4 will deliver metal unibody build & offer 4 years of major OS updates

First and foremost, he said that the OnePlus Nord 4 will end up offering 4 years of major Android updates, and six years of security patches. That basically brings the phone on the same level as the OnePlus 11 and OnePlus 12 in terms of major OS updates. Both of those phones were promised to get four.

If we compare it to Samsung’s mid-rangers, the Galaxy A35 and A55, the OnePlus Nord 4 will get supported for one extra year. The Galaxy A55 could be one of its main competitors, which is why this comparison makes sense.

We also know what the OnePlus Nord 4 will look like, and that it will bring a metal unibody construction. Kinder Liu talked about that too a bit, as he was asked about it.

Liu explained why OnePlus went with a metal unibody build here

That construction has disappeared from the scene for a while. Kinder Liu went on to explain that it’s because of 5G, and the number of antennas required for it. The OnePlus Nord 4 has 50% smaller antennas, with strategic placement. That allowed OnePlus to proceed with the metal unibody build.

OnePlus’ COO said that a metal unibody build was chosen for “durability, beauty, permanence, and strength”. The last piece of information that he shared is that the OnePlus Nord 4 was tested by TÜV SÜD simulating 72 months of use. It was certified to stay fluent long after you start using it.

Everything will be revealed on July 16, so stay tuned for more information about OnePlus’ new mid-ranger.


[ad_2]
Source link