12:27 PM

Sony Brings In Forensic Experts On Data Breaches

Data Forte, Guidance Software, and Protiviti will investigate who hacked into Sony's servers and how they cracked the company's defenses.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
Sony declined to testify at that hearing. Instead, the head of Sony Computer Entertainment, Kaz Hirai, sent a letter with written responses to legislators' questions, in which he suggested that coordinated attacks had been used to disguise the breach. According to Hirai, "this cyber-attack came shortly after Sony Computer Entertainment America was the subject of denial of service attacks launched against several Sony companies and threats made against both Sony and its executives in retaliation for enforcing intellectual property rights in U.S. federal court."

Sony has also suggested that the collective known as Anonymous was behind the attacks, since forensic investigators discovered a file on Sony's servers, named "anonymous," that included a fragment of the collective's slogan.

But the collective disavowed all knowledge of the breach, saying in a statement that stealing credit card data isn't its style. "Whoever broke into Sony's servers to steal the credit card info and left a document blaming Anonymous clearly wanted Anonymous to be blamed for the most significant digital theft in history," said a statement from the collective. "No one who is actually associated with our movement would do something that would prompt a massive law enforcement response." Instead, the group suggested that online thieves had left the file as subterfuge.

One positive piece of information revealed by Sony is that, so far, none of the compromised credit card data has been used by attackers. Furthermore, the scale of credit card loss, while large, isn't as bad as first expected. According to Hirai's letter, "globally, approximately 12.3 million account holders had credit card information on file on the PlayStation Network system. In the United States, approximately 5.6 million account holders had credit card information on file on the system. These numbers include active and expired credit cards."

But Sony declined to fully reveal detail how the breach occurred. "We are reluctant to make full details publicly available because the information is the subject of an ongoing criminal investigation and also the information could be used to exploit vulnerabilities in systems other than Sony's that have similar architecture to the PlayStation Network," said Hirai.

In response to legislators' question about whether Sony would be offering credit monitoring services for customers whose information was stolen, Hirai said that instead, Sony will instead offer a "welcome back" package with 30 days of free service.

But will customers return?

2 of 2
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio