Attacks/Breaches
5/5/2011
12:27 PM
Connect Directly
RSS
E-Mail
50%
50%

Sony Brings In Forensic Experts On Data Breaches

Data Forte, Guidance Software, and Protiviti will investigate who hacked into Sony's servers and how they cracked the company's defenses.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
Sony declined to testify at that hearing. Instead, the head of Sony Computer Entertainment, Kaz Hirai, sent a letter with written responses to legislators' questions, in which he suggested that coordinated attacks had been used to disguise the breach. According to Hirai, "this cyber-attack came shortly after Sony Computer Entertainment America was the subject of denial of service attacks launched against several Sony companies and threats made against both Sony and its executives in retaliation for enforcing intellectual property rights in U.S. federal court."

Sony has also suggested that the collective known as Anonymous was behind the attacks, since forensic investigators discovered a file on Sony's servers, named "anonymous," that included a fragment of the collective's slogan.

But the collective disavowed all knowledge of the breach, saying in a statement that stealing credit card data isn't its style. "Whoever broke into Sony's servers to steal the credit card info and left a document blaming Anonymous clearly wanted Anonymous to be blamed for the most significant digital theft in history," said a statement from the collective. "No one who is actually associated with our movement would do something that would prompt a massive law enforcement response." Instead, the group suggested that online thieves had left the file as subterfuge.

One positive piece of information revealed by Sony is that, so far, none of the compromised credit card data has been used by attackers. Furthermore, the scale of credit card loss, while large, isn't as bad as first expected. According to Hirai's letter, "globally, approximately 12.3 million account holders had credit card information on file on the PlayStation Network system. In the United States, approximately 5.6 million account holders had credit card information on file on the system. These numbers include active and expired credit cards."

But Sony declined to fully reveal detail how the breach occurred. "We are reluctant to make full details publicly available because the information is the subject of an ongoing criminal investigation and also the information could be used to exploit vulnerabilities in systems other than Sony's that have similar architecture to the PlayStation Network," said Hirai.

In response to legislators' question about whether Sony would be offering credit monitoring services for customers whose information was stolen, Hirai said that instead, Sony will instead offer a "welcome back" package with 30 days of free service.

But will customers return?

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2886
Published: 2014-09-18
GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during ins...

CVE-2014-4352
Published: 2014-09-18
Address Book in Apple iOS before 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information by obtaining this UID.

CVE-2014-4353
Published: 2014-09-18
Race condition in iMessage in Apple iOS before 8 allows attackers to obtain sensitive information by leveraging the presence of an attachment after the deletion of its parent (1) iMessage or (2) MMS.

CVE-2014-4354
Published: 2014-09-18
Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.

CVE-2014-4356
Published: 2014-09-18
Apple iOS before 8 does not follow the intended configuration setting for text-message preview on the lock screen, which allows physically proximate attackers to obtain sensitive information by reading this screen.

Best of the Web
Dark Reading Radio