The listings featured on this site are from companies from which this site receives compensation and some are co-owned by our parent company. This influence: Rank and manner in which listings are presented.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Hacker Claims Theft of 30M TEG Customer Records

Hacker Claims Theft of 30M TEG Customer Records
Author Image Keira Waddell
Keira Waddell First published on June 27, 2024 Former Senior Writer

A hacker using the alias “Sp1d3r” has claimed to have breached Ticketek Entertainment Group (TEG), compromising the personal data of approximately 30 million users. The stolen data has allegedly been posted for sale on the notorious BreachForums with an asking price of $30,000.

The hacker claims the breached database contains sensitive information such as full names, genders, business details, dates of birth, usernames, and hashed passwords. This assertion follows an earlier disclosure of a data breach by TEG on May 31, acknowledging a data breach that potentially exposed customer names, dates of birth, and email addresses. While TEG initially stated that no user accounts or payment information were compromised, they have yet to confirm or deny the hacker’s latest claims.

TEG is a prominent Australian ticketing and live entertainment company with a user base of around 30 million. The company’s platforms, including Ticketek, Eventopia, and Softix, serve millions of customers annually. Despite the potential scope of the breach, TEG has not provided specific details about the incident or the cloud service involved.

Evidence suggests a potential link to the Snowflake data theft campaign, which has impacted numerous organizations. The Snowflake campaign involved the exploitation of credentials obtained through infostealer malware, which were then used to target accounts with poor password hygiene. This campaign has been responsible for breaches in several major organizations, including Ticketmaster, Santander Bank, and others.

Cybersecurity firm Mandiant, owned by Google, has been investigating the broader impact of the Snowflake breaches, which affected approximately 165 organizations in total. The firm highlighted that many of the compromised credentials had been vulnerable for over four years.

Users affected by the TEG breach are advised to monitor their financial accounts, change passwords, and remain vigilant against phishing attempts.

About the Author

  • Author Image Keira Waddell
  • Keira Waddell Former Senior Writer

Keira was a senior writer at The How To Guide. She is an experienced cybersecurity and tech writer dedicated to providing comprehensive insights on VPNs, online privacy, and internet censorship.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address