Monzo said that it “spotted signs” of the Ticketmaster customer hack back in early April but the ticketing website told the digital bank it had found no evidence of a breach.
Personal and payment information of customers was compromised, which potentially affects tens of thousands of UK customers and many others around the world after malicious software was placed on third-party customer support product Inbenta Technologies.
Information which may have been compromised includes: name, address, email address, telephone number, payment details and Ticketmaster login details. Inbenta’s product was running on Ticketmaster International, Ticketmaster UK, GETMEIN! and TicketWeb websites.
Ticketmaster says it took swift action to disable the Inbenta product and that all affected customers have been contacted and advised to change their passwords.
In a statement on its website, Monzo said it had replaced the bank cards of 6,000 of its customers who had used Ticketmaster as a precaution after investigating fraudulent activity on some accounts.
It said members of the Ticketmaster security team visited the Monzo office so it could share the information it had gathered but that “they [later] told us an internal investigation had found no evidence of a breach and that no other banks were reporting similar patterns”.
BusinessCloud has contacted Ticketmaster for comment.
Ticketmaster has now recommended that customers monitor their account statements for evidence of fraud or identity theft and contact their bank or credit card provider if they notice anything suspicious.
In a statement on a newly set-up website, Ticketmaster said less than five per cent of its global customer base had been affected but customers in North America were not among them. It said worried customers could email any questions to email@example.com.
“UK customers who purchased, or attempted to purchase, tickets between February and June 23, 2018 may be affected as well as international customers who purchased, or attempted to purchase, tickets between September 2017 and June 23, 2018,” the statement read.
“If you have not received an email, we do not believe you have been affected by this security incident based on our investigations.”
It continued: “Forensic teams and security experts are working around the clock to understand how the data was compromised. We are working with relevant authorities, as well as credit card companies and banks.”
The firm said it is offering impacted customers a free 12-month identity monitoring service with a leading provider, which is available here.
Interactive digital magazine below