April 30, 2022 at 8:34 AM
Hello BreachForums Community,
Today I have uploaded the Ticketfly (Partial) Database for you to download, thanks for reading and enjoy!
In May 2018, the website for the ticket distribution service Ticketfly was defaced by an attacker and was subsequently taken offline. The attacker allegedly requested a ransom to share details of the vulnerability with Ticketfly but did not receive a reply and subsequently posted the breached data online to a publicly accessible location. The data included over 26 million unique email addresses along with names, physical addresses and phone numbers. Whilst there were no passwords in the publicly leaked data, Ticketfly later issued an incident update and stated that "It is possible, however, that hashed values of password credentials could have been accessed".
This is the partial version with only 6 Million records. If you have the full version and want to provide it for the forums, please contact @pompompurin.
Compromised data: Email addresses, Names, Phone numbers, Physical addresses
Today I have uploaded the Ticketfly (Partial) Database for you to download, thanks for reading and enjoy!
In May 2018, the website for the ticket distribution service Ticketfly was defaced by an attacker and was subsequently taken offline. The attacker allegedly requested a ransom to share details of the vulnerability with Ticketfly but did not receive a reply and subsequently posted the breached data online to a publicly accessible location. The data included over 26 million unique email addresses along with names, physical addresses and phone numbers. Whilst there were no passwords in the publicly leaked data, Ticketfly later issued an incident update and stated that "It is possible, however, that hashed values of password credentials could have been accessed".
This is the partial version with only 6 Million records. If you have the full version and want to provide it for the forums, please contact @pompompurin.
Compromised data: Email addresses, Names, Phone numbers, Physical addresses
ContentsSpoiler
The .7z File's MD5 Hash is CC0B4A1679892D899B7DD5015CA70E06. In total, there are 6151436 records. The file is 865.9MB uncompressed and 141.32MB compressed.




