CyberWatch

Stealing the Show: From Competitor to Threat Actor

By

Matt Berns, Threat Intelligence Analyst

By

Access Point Consulting

In December 2020, Ticketmaster was hit with a $10 million fine for an act of corporate espionage. The company had engaged in unauthorized access to a competitor's computer systems, using stolen login credentials to gather confidential business intelligence. Although this scandal broke nearly four years ago, it serves as a reminder of the legal and ethical responsibilities businesses must adhere to in today’s marketplace.

The Scheme Unveiled: Crossing Ethical Lines

The details of the scheme read like something out of a corporate thriller. It all began when a senior employee from a rival ticketing platform left said rival company, and joined Ticketmaster’s parent company, Live Nation. Far from leaving his former employer behind, this individual—referred to in legal filings as "Coconspirator-1"—brought along much more than just his industry knowledge. He retained sensitive, proprietary information from his previous employer, including access credentials for their systems.

With this insider knowledge, Coconspirator-1 began collaborating with Ticketmaster executives, providing them with URLs and passwords to a password-protected system known as the "Artist Toolbox." This platform allowed artists to track ticket sales in real time, and it contained highly sensitive, business-critical data. The goal? To undermine the rival platform’s business model and clients by gaining a direct view into their operations.

Coconspirator-1’s illegal access didn’t go unnoticed within Ticketmaster. In fact, his actions were actively encouraged. Senior executives attended internal presentations where this stolen information was used to compare their offerings against their competitor’s in a bid to "benchmark" Ticketmaster’s services. In one instance, Ticketmaster held an “Artist Services Summit” where Coconspirator-1 performed a live demonstration of the victim company’s systems—again using the unlawfully retained credentials. This level of corporate espionage wasn’t just unethical; it crossed a clear legal line.

Targeting the Competition: The Digital Battle for Clients

One of the primary goals behind this illegal activity was to give Ticketmaster a competitive advantage by targeting the rival company’s clients. With access to the "Artist Toolbox" and other confidential data, Ticketmaster employees could see which artists were planning to sell tickets through the competitor’s platform. This allowed them to take preemptive action by offering competing services to lure clients away.

But the scheme didn’t stop there. Ticketmaster also gained access to draft ticketing web pages the competitor created for upcoming events. These pages were not publicly available and weren’t indexed by search engines, so they were invisible to the general public. However, Coconspirator-1 shared that the web page URLs contained sequential numbers, which made it possible for Ticketmaster to track and monitor new pages as they were created. Armed with this information, Ticketmaster was able to create a list of the competitor’s upcoming clients, giving them a crucial inside edge in trying to disrupt deals and steal clients.

The Legal Fallout: A Pricey Lesson in Ethics

The scheme eventually came to light, and in 2020, the U.S. Attorney’s Office for the Eastern District of New York filed charges against Ticketmaster for computer intrusion and wire fraud. Zeeshan Zaidi, the former head of Ticketmaster’s Artist Services division, had already pled guilty in 2019 to his role in the scheme, and by December 2020, Ticketmaster had agreed to pay a hefty $10 million criminal fine as part of a deferred prosecution agreement.

As part of the agreement, Ticketmaster also committed to implementing a compliance and ethics program aimed at preventing future violations of laws like the Computer Fraud and Abuse Act. This compliance program includes measures to detect and prevent unauthorized access to confidential information, both from competitors and within its own operations. Additionally, Ticketmaster was required to report to federal authorities annually for three years on its compliance efforts. Failure to meet these terms would have resulted in further prosecution.

Why This Case Is Still Relevant Today

Even though this case occurred nearly four years ago, and $10 million doesn’t seem like that much money in today’s corporate world, the lessons it imparts are more relevant than ever.

In our current digital-first economy, the lines between competitive advantage and unethical behavior can blur quickly. The Ticketmaster case highlights the dangers of crossing those lines, especially when it comes to accessing and misusing sensitive information that belongs to competitors.  Corporate espionage, once thought of as cloak-and-dagger operations, has increasingly shifted to the digital realm. Modern businesses rely heavily on proprietary software, client data, and other digital assets to maintain their edge. Any unlawful access to those systems—whether it’s passwords, URLs, or confidential documents—carries severe legal and financial consequences. The fallout for Ticketmaster, both in terms of financial penalties and reputational damage, is a prime example of how these actions can backfire.

Ongoing Cybersecurity Risks and the Importance of Compliance

The Ticketmaster case also serves as a critical reminder of the need for companies to prioritize cybersecurity and ethical behavior in their daily operations. The rise of insider threats—where employees misuse their access to company systems or retain sensitive information when moving to a competitor—poses an ongoing challenge for organizations. These threats are often harder to detect because they come from trusted individuals with legitimate access to sensitive information.

Lessons for Businesses: Know Where to Draw the Line

There’s a fine line between competitive intelligence and corporate espionage. Businesses naturally want to gain an edge in their industries, but when this desire leads to illegal activity—whether it’s unauthorized system access or the misuse of proprietary information—it can result in severe consequences.

The Ticketmaster case illustrates the importance of drawing that line. It shows that unethical actions, even if initially successful, carry significant long-term risks, both legally and reputationally. A short-term gain in market share is not worth the multimillion-dollar fines and public disgrace that come with getting caught.

Additionally, companies must ensure they have proper offboarding protocols for employees who leave. These should include clear policies regarding the return of confidential information and enforcing legal agreements that prohibit the misuse of proprietary data after departure. The mishandling of sensitive information, as in the Ticketmaster case, can lead to criminal liability—not just for individuals but for entire organizations.

Final Thoughts: Integrity in the Digital Age

As businesses continue to embrace digital transformation, the importance of cybersecurity, compliance, and ethical practices cannot be overstated. The Ticketmaster incident offers a powerful cautionary tale: Illegal shortcuts may offer temporary benefits, but they often lead to long-term losses. Whether it’s hefty fines, legal battles, or the erosion of trust among clients, the consequences are far-reaching.

In a world where data is the currency, companies must act with integrity and vigilance. This means respecting the boundaries of competition, protecting sensitive information, and ensuring that employees understand the ethical responsibilities that come with access to proprietary data. Four years on, the Ticketmaster case remains a relevant example of what can happen when businesses fail to uphold these standards.

Resources

Trending Articles & Security Reports

Resources

CyberWatch

September 18, 2024

Adobe Patched Potential Zero-Day in Reader

Adobe released a patch for a suspected zero-day vulnerability in Adobe Reader, identified as CVE-2024-41869. This vulnerability, a Use After Free (UAF) issue, can lead to arbitrary code execution, system crashes, or the return of unexpected values.

Find out more
September 16, 2024

Why We Need NIST's Post-Quantum Cryptography Standards

Last month, NIST published its first set of post-quantum cryptography (PQC) standards, setting a new benchmark for enterprises, government agencies, and vendors to withstand future cyberattacks from quantum computers. The time to start transitioning is now. Discover what’s at stake with CyberWatch.

Find out more
September 13, 2024

Patch Tuesday for September

Every second Tuesday of the month, Microsoft releases patches to their applications, services, and operating systems. Typically, these patches include a myriad of security fixes and this time around, for September of 2024, 79 different vulnerabilities have been addressed, including 4 zero-day vulnerabilities and 10 critical vulnerabilities.

Find out more