Security Market Segment LS
Saturday, 30 June 2018 05:44

UK researcher says one line of code caused Ticketmaster breach Featured


Well-known British security researcher Kevin Beaumont says the breach of the British operations of American multinational ticket sales and distribution company Ticketmaster, that has led to the possible leak of tens of thousands of credit card details, was caused by the incorrect placement of a single line of code.

As iTWire  reported, Ticketmaster UK blamed third-party supplier Inbenta Technologies for the incident. Inbenta, in turn, said that the breach had been caused by Ticketmaster directly applying a customised piece of JavaScript without notifying its (Inbenta's) team.

Beaumont said Inbenta was providing a chat bot for website developers "by providing a single line of HTML which calls a JavaScript from Inbenta’s Web server. JavaScript allows controlled code execution via a website, for example to redirect traffic from forms, or run a chatbot assistant".

He pointed out that while Inbenta had provided Ticketmaster a customised JavaScript one-liner, the ticketing company had placed this chatbot code on its payment processing website without informing Inbenta it had done so.

"This means that Inbenta’s webserver was placed in the middle of all Ticketmaster credit card transactions, with the ability to execute JavaScript code in customer browsers," Beaumont said.

This code had been altered by some malicious person back in February and the problems began at that point, he said.

"(Digital bank) Monzo provided a timeline around how they discovered fraudulently Mastercard transactions tied to Ticketmaster in April 2018, including a visit from Ticketmaster," Beaumont added.

"Ticketmaster’s statement, by contrast, says they discovered the issue in June 2018  –  I presume two months was taken to identify the issue being the Inbenta integration."

Beaumont sounded a warning over this kind of random use of JavaScript without knowing the implications. "...Web developers should be extremely careful what third-party JavaScript code is placed within the payment and personal information processes of their sites," he said.

"Businesses should make a risk assessment around this  –  not just due diligence, but seriously assess the risk and impact of a breach of a third party on their business.

"I’ll give you a spoiler: the risk is very real  –  this isn’t the first time this has happened, somebody who works for PCI (payment card industry) post-breach assessment told me that over 75% of all Web store breaches they assessed at large enterprises happened due to this reason, a massive increase. The impact is huge –  for example, attackers can read and store CCV numbers on cards via JavaScript, as they are ‘live’ in the customer Web browser."

Beaumont said that while companies were investing in PCI standards, compliance, risk, resourcing and encryption, attackers were looking for other links in the chain that they could exploit.

"Cracking AES encryption? Not happening soon," he said. "Breaking into the webserver of a chatbot provider? Yes, that is happening. As Inbenta point out in their incident report, a single line of HTML code in Ticketmaster’s website led to this issue.

"The canary is dead. Check your supply chain. Because attackers are."

Adenike Cosgrove, who is in charge of cyber security at security firm Proofpoint, told iTWire that the Ticketmaster incident was one of the first major international breaches of EU personal data reported after the GDPR enforcement date.

She said this made it "a case to watch with regard to consequences. Questions will be asked first and foremost about how sensitive personal data including payment information was shared, unencrypted, with a third-party application".

Damien Manuel, chairman of the lobby group Australian Information Security Association, commended Ticketmaster "for disclosing the data breach quickly and providing notification to affected customers encouraging them to be vigilant and check for fraudulent credit card transactions".

"This latest incident highlights the need for supply chain governance, as cyber criminals are now attacking the weakest points in the supply chain to gain access to data that can be monetised. The banking sector is very mature in this space and under APRA (Australian Prudential Regulation Authority) requirements, regular security audits are performed across the supply chain."


As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments