Attacks/Breaches
5/23/2011
01:39 PM
50%
50%

Sony Data Breach Cleanup To Cost $171 Million

If identify theft or credit card fraud takes place, the company said its actual costs could rise substantially.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
Sony on Monday said that it expects the cleanup cost from the data breaches it's suffered to cost at least $171 million. Sony said the data breach costs will affect revenues for its fiscal 2011 year, which ends on March 31, 2012.

According to a statement released by Sony's investor relations group, "based on information currently available to Sony, our currently known costs associated with the unauthorized network access are estimated to be approximately 14 billion yen," or about $171 million.

But those costs could go much higher, the company warned investors during a call on Monday. "So far, we have not received any confirmed reports of customer identity theft issues, nor confirmed any misuse of credit cards from the cyber-attack. Those are key variables, and if that changes, the costs could change," said Sony, as reported by Joystiq, which saw a transcript of the call.

Beginning in April, Sony suffered multiple data breaches involving its PlayStation Network (PSN), Qriocity, Sony Online Entertainment, and other sites.

On Sunday, new revelations surfaced that Sony apparently also suffered another data breach earlier this month, after hackers cracked Sony BMG's website in Greece. That would make it the seventh data breach suffered by Sony since April 2011.

In this breach, which occurred on May 5, attackers obtained information about more than 8,000 website users, according to The Hackers News, which received a copy of the website's SQL database from "b4d_vipera," the hacker who took responsibility for the breach.

The attacker also leaked a sample of the purloined database--containing 450 records--to Pastebin. It contains usernames, passwords for the Sony website, and email addresses. Security experts recommend that anyone with a Sony BMG account in Greece immediately change their Sony password, and any other uses of the same password online.

The attacker said he exploited the Greek Sony website using a SQL injection attack against the site, which was running Internet Information Server (IIS) 6.0 on Windows 2003. SQL injection attacks, which exploit website databases that haven't been patched against known vulnerabilities, are much favored by attackers, in part for their simplicity.

"It's not something that requires a particularly skillful attacker, but simply the diligence to comb through Sony website after website until a security flaw is found," said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post.

In the wake of numerous data breaches involving more than 100 million user accounts, Sony is still attempting to get its systems fully secured and back online. Some of its Web properties, such as PlayStation Store, remain offline.

On Wednesday, Sony also deactivated online password resets for PSN and Qriocity, saying its password system couldn't handle the load.

But rumors that the password reset site had been compromised by attackers weren't true, said Patrick Seybold, Sony's senior director of corporate communications and social media, in a blog post. "Contrary to some reports, there was no hack involved. In the process of resetting of passwords there was a URL exploit that we have subsequently fixed."

While Sony works to get its online password-reset process reestablished, Seybold said that PSN users can reset their passwords via their PlayStation 3. "Otherwise, they can continue to do so via the website as soon as we bring that site back up," he said.

In this new Tech Center report, we profile five database breaches--and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk. Download it here (registration required).

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
EntRiskTechnologies
100%
0%
EntRiskTechnologies,
User Rank: Apprentice
7/30/2014 | 6:07:17 PM
PSN Attack
We discussed the attack, pay-out from Sony, and future in our blog at: https://entrisk-technologies.com/update-sony-playstation-network-data-breach-2011/ Check it out!
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6123
Published: 2014-12-28
IBM Rational AppScan Source 8.0 through 8.0.0.2 and 8.5 through 8.5.0.1 and Security AppScan Source 8.6 through 8.6.0.2, 8.7 through 8.7.0.1, 8.8, 9.0 through 9.0.0.1, and 9.0.1 allow local users to obtain sensitive credential information by reading installation logs.

CVE-2014-6160
Published: 2014-12-28
IBM WebSphere Service Registry and Repository (WSRR) 8.5 before 8.5.0.1, when Chrome and WebSEAL are used, does not properly process ServiceRegistryDashboard logout actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.