Mystery database left open turns out to be massive Groupon fraud ticket fraud ring

We have a new twist on the “researchers find unprotected public-facing cloud-hosted database” story, as one recently uncovered archive turned out to be at the heart of a years-long fraud operation.

The team at VPNmentor said they were confused when first encountering the mystery database that contained details on scores of accounts from ticket purchasing sites. The profiles, all seemingly used for small, independent theaters and music venues, contained payment details for around 17 million ticket purchases.

“The breach seemed to give access to personal details of anyone purchasing tickets from a website using Neuroticket,” explained the VPNmentor team, headed up to Noam Rotem and Ran Locar, on Wednesday.

“Initially, we believed this vulnerability compromised customers on these websites.”

Even more curious, when the team tried to track down the owners of the exposed email addresses, they got few responses, indicating the vast majority were fake accounts.

When efforts to tie the records to a breach of Neuroticket, Ticketmaster, or Tickpick all resulted in dead ends, the team noticed that around 90 per cent of the records also referenced Groupon.

When the VPNmentor crew got in touch with Groupon, they had their breakthrough. It turns out the emails had all been used to purchase tickets for gigs, plays and concerts that were on offer through Groupon deals. What’s more, Groupon immediately recognized the purchases as being the work of a fraud ring it had been tracking since 2016.

The fraudsters in this case used an army of fake accounts and stolen credit card numbers to make bulk purchases of tickets being offered at a discount on Groupon. Those tickets were then resold by the fraudsters at full price (or at a markup) to turn a quick profit.

“Groupon had been able to close most of the accounts, but not all of them. The operation has remained resilient, despite excellent work by the company,” VPNmentor’s team said in their write-up.

“Groupon’s Chief Information Security Officer (CISO) estimates the number of fraudulent accounts in the network we helped uncover to be as high as 20,000.”

Hacker Grant West, 27

Cybercrook hands cops £923k in Bitcoin made from selling phished deets on the dark web

READ MORE

It gets even more bizarre. When combing through the records in the database, the VPNmentor crew found a note from another hacker who had stumbled on the exposed database.

“Claiming to have extracted information from the database, it demanded a ransom of $400 in Bitcoin, in exchange for not releasing the stolen data to the public and subsequently deleting it,” the team notes.

“It seems, at least one criminal hacker has already hacked the database. Not understanding what they discovered, they’re trying to extort its owners.”

UK-based bug hunter Oliver Hough also says he came upon the database a while ago, but was unable to connect the dots with Groupon.

The moral of the story is, as always, keep track of your cloud database instances and always make sure public access is disabled. ®

READ MORE HERE