The Arkana Safety extortion gang briefly listed over the weekend what seemed to be newly stolen Ticketmaster knowledge however is as an alternative the information stolen through the 2024 Snowflake knowledge theft assaults.
The extortion group posted screenshots of the allegedly stolen knowledge, promoting over 569 GB of Ticketmaster knowledge on the market, inflicting hypothesis that this was a brand new breach.

Supply: BleepingComputer
Nonetheless, BleepingComputer has decided that the recordsdata proven within the Arkana publish match samples of Ticketmaster knowledge we beforehand noticed through the 2024 Snowflake knowledge theft assaults.
Moreover, one of many photos had the caption “rapeflaked copy 4 fast sale 1 purchaser,” which is a reference to a device named “RapeFlake.”
RapeFlake is a customized device created by the risk actors to carry out reconnaissance and exfiltrate knowledge from Snowflake’s databases.
As beforehand reported, the Snowflake assaults focused many organizations, together with Santander, Ticketmaster, AT&T, Advance Auto Elements, Neiman Marcus, Los Angeles Unified, Pure Storage, and Cylance. These assaults had been claimed by an extortion group often known as ShinyHunters.
These assaults had been carried out utilizing compromised Snowflake credentials stolen by infostealers, which had been then used to obtain firm knowledge to be used in extortion schemes.
Ticketmaster was among the many most generally extorted victims within the Snowflake assault, which led to the theft of private and ticketing info. After the information was supplied on the market on-line, the corporate confirmed the breach on the finish of Might and commenced notifying affected clients.
Following the preliminary leak, the risk actors ramped up their extortion makes an attempt by releasing what they claimed had been print-at-home tickets and even alleged Taylor Swift tickets in a collection of posts on a hacking discussion board.
Whereas Arkana didn’t specify the origin of the information, the usage of Snowflake references and the file names matching beforehand leaked recordsdata signifies that the group was making an attempt to resell previous stolen knowledge.
Whether or not or not Arkana beforehand bought this knowledge, whether or not the group is made up of risk actors who beforehand had the information, or whether or not they’re working with ShinyHunters to promote it’s unclear.
On June 9, the entry for the Ticketmaster knowledge had been faraway from the Arkana Safety knowledge leak web site.
The identify “ShinyHunters” has been linked to numerous breaches through the years, together with the huge PowerSchool knowledge breach the place knowledge was stolen for 62.4 million college students and 9.5 million academics for six,505 college districts throughout the U.S., Canada, and different nations.
Extra lately, Mandiant tied ShinyHunters to a current marketing campaign concentrating on Salesforce accounts, the place risk actors had been breaching accounts to steal buyer knowledge and extort firms.
As quite a few risk actors tied to ShinyHunters have been arrested over the previous three years [1, 2, 3], it’s unclear if that is the unique group or different risk actors claiming to be them to throw off regulation enforcement.
BleepingComputer contacted Arkana and Ticketmaster relating to the itemizing however didn’t obtain a response.

Patching used to imply complicated scripts, lengthy hours, and countless fireplace drills. Not anymore.
On this new information, Tines breaks down how fashionable IT orgs are leveling up with automation. Patch quicker, cut back overhead, and concentrate on strategic work — no complicated scripts required.

