Security Experts:

Connect with us

Hi, what are you looking for?



See Tickets Customer Payment Card Data Stolen by Web Skimmer

Ticketing services agency See Tickets is informing users that their payment card data was likely exposed after hackers injected skimmer code on its website.

Ticketing services agency See Tickets is informing users that their payment card data was likely exposed after hackers injected skimmer code on its website.

Owned by Vivendi SA, See Tickets provides ticketing services for comedy, festival, lifestyle, music, sport, and other types of events and operates several websites targeting both international and regional audiences in North America and Europe.

The skimmer attack was initially identified in April 2021 and was fully shut down in January 2022, the company notes in a data breach notification letter sent to potentially impacted users, a copy of which was submitted to the Montana Attorney General’s office.

Skimmer attacks rely on the injection of malicious JavaScript code into ecommerce websites, typically on checkout pages, to steal the information that the website’s users provide.

“See Tickets was alerted to activity indicating potential unauthorized access by a third party to certain event checkout pages on the See Tickets website in April 2021. Our response efforts had multiple phases and resulted in the complete shutdown of the unauthorized activity in early January 2022,” the company says.

Working together with American Express, Discover, MasterCard, Visa, and law enforcement, See Tickets determined that the cyberattack might have resulted in unauthorized access to the payment card information of some of its users.

“Affected information may include the data you provided when purchasing event tickets on the See Tickets website between June 25, 2019, and January 8, 2022,” See Tickets says.

Potentially affected data includes personally identifiable information such as names, addresses, and zip codes, along with payment card data (card numbers, expiration dates, and CVV numbers).

No bank account details, Social Security numbers, or state identification numbers were compromised, as the company does not store such data. See Tickets also notes that it has yet to determine the exact number of impacted users.

“While our investigation continues and we are not certain your information was affected, we are notifying you out of an abundance of caution based on available information,” See Tickets’ data breach notice reads.

Related: Web Skimmer Injected Into Hundreds of Magento-Powered Stores

Related: Target Open Sources Web Skimmer Detection Tool

Related: Skimmer Injected Into 100 Real Estate Websites via Cloud Video Platform

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.


The North Korean APT tracked as TA444 is either moonlighting from its previous primary purpose, expanding its attack repertoire, or is being impersonated by...


A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.