in the cyberattackAttack.Databreach. `` We realize the gravity of this decision , but the security of client and customer data is our top priority , '' a Ticketfly spokeswoman said in an email . The company 's pages have been down since 6 a.m . ET . A hacker who goes by `` IShAkDz '' has taken credit for the attack . Before Ticketfly took down its websites , the hacker left a taunting message across the service 's website : `` Your security down , I 'm not sorry . Next time I will publishAttack.Databreachdatabase . '' The hacker , who also left an e-mail address , appeared to have a database with more than 4,000 spreadsheets holding people 's information , including email addresses , phone numbers , names and addresses . In an email , the attacker told CNET that he or she contacted TicketFly about the potential exploit multiple times , but did n't hear back . The attacker demandedAttack.RansomTicketFly payAttack.Ransom1 bitcoin to fix the cyberattackAttack.Ransom, which is currently worth $ 7,544 . The Ticketfly spokeswoman did n't comment on the alleged hacker . Eventbrite , which owns Ticketfly , does n't have any issues on its website .
Ticketfly has been grounded . After a `` series of recent issues , '' the online ticketing service took down all its websites Thursday , saying it was `` the target of a cyber incident . '' `` Out of an abundance of caution , we have taken all Ticketfly systems temporarily offline as we continue to look into the issue , '' the company said across its many properties . Ticketfly did n't comment on whether any user information , such as credit card data , had been stolenAttack.Databreachin the cyberattackAttack.Databreach. `` We realize the gravity of this decision , but the security of client and customer data is our top priority , '' a Ticketfly spokeswoman said in an email . The company 's pages have been down since 6 a.m . ET . A hacker who goes by `` IShAkDz '' has taken credit for the attack . Before Ticketfly took down its websites , the hacker left a taunting message across the service 's website : `` Your security down , I 'm not sorry . Next time I will publishAttack.Databreachdatabase . '' The hacker , who also left an e-mail address , appeared to have a database with more than 4,000 spreadsheets holding people 's information , including email addresses , phone numbers , names and addresses . In an email , the attacker told CNET that he or she contacted TicketFly about the potential exploit multiple times , but did n't hear back . The attacker demandedAttack.RansomTicketFly payAttack.Ransom1 bitcoin to fix the cyberattackAttack.Ransom, which is currently worth $ 7,544 . The Ticketfly spokeswoman did n't comment on the alleged hacker . Eventbrite , which owns Ticketfly , does n't have any issues on its website .
Bristol Airport authorities were recently forced to take their flight information system displays offline for two days to contain a ransomware attackAttack.Ransom. The authorities dismissed the ransom demandAttack.Ransomand decided to rebuild the affected systems . For two days , flight status information was displayed on whiteboards and there was an increase in announcements over the speakers . Similarly , in the last few months there have been several cyberattacks targeting hospitals , city administration and sporting events . The servers of the US-based PGA were reportedly hit by ransomwareAttack.Ransomattacks right before the PGA Championship in the first week of August . A new ransomware called Everlasting Blue Blackmail Virus , which targets Windows PCs using spam and phishing campaignsAttack.Phishing, flashes former US President Barrack Obama ’ s image with the ransom message . Once the ransomware gains entry into the system , its looks for all .exe ( executable ) files and encrypts them , preventing users from running apps until the ransom is paidAttack.Ransom. Hot on the heels of the cyberattackAttack.Ransomon the town of Valdez in Alaska , Canadian town Midland in Ontario was hit by a ransomware attackAttack.Ransomin the first week of September . Hackers broke into the city database involving fire , water , and waste management and blocked access , demanding ransomAttack.Ransom. A major concern for cybersecurity experts is the fileless attacks , which are hard to detect . These attacks do not install a malicious software to infiltrate a victim ’ s computer , which makes it difficult for anti-virus solutions to detect them . According to Ponemon Institute , 35 % of all cyberattacks in 2018 were fileless , while security solution provider Carbon Black claims that fileless attacks accounted for 50 % of all successful data breachesAttack.Databreachtargeting financial businesses . Fileless attacks target legitimate Windows tools such as PowerShell ( a scripting language which can provide hackers unrestricted access to Windows API ) and Windows Management Instrumentation ( used by admins ) . By latching on to these tools , hackers gain control over the PC and eventually the organization ’ s database . In another recent development , researchers at F-Secure have come across a new vulnerability affecting PCs . Dubbed as cold boot , the attack can be carried off using a special programme through a USB drive connected to a PC . Using the programme , the hacker can disable the memory overwriting by rebooting the system , without a proper shutdown . The attack can be used to break into company system which might have access to the company network .