Attacks/Breaches
5/23/2011
01:39 PM
50%
50%

Sony Data Breach Cleanup To Cost $171 Million

If identify theft or credit card fraud takes place, the company said its actual costs could rise substantially.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
Sony on Monday said that it expects the cleanup cost from the data breaches it's suffered to cost at least $171 million. Sony said the data breach costs will affect revenues for its fiscal 2011 year, which ends on March 31, 2012.

According to a statement released by Sony's investor relations group, "based on information currently available to Sony, our currently known costs associated with the unauthorized network access are estimated to be approximately 14 billion yen," or about $171 million.

But those costs could go much higher, the company warned investors during a call on Monday. "So far, we have not received any confirmed reports of customer identity theft issues, nor confirmed any misuse of credit cards from the cyber-attack. Those are key variables, and if that changes, the costs could change," said Sony, as reported by Joystiq, which saw a transcript of the call.

Beginning in April, Sony suffered multiple data breaches involving its PlayStation Network (PSN), Qriocity, Sony Online Entertainment, and other sites.

On Sunday, new revelations surfaced that Sony apparently also suffered another data breach earlier this month, after hackers cracked Sony BMG's website in Greece. That would make it the seventh data breach suffered by Sony since April 2011.

In this breach, which occurred on May 5, attackers obtained information about more than 8,000 website users, according to The Hackers News, which received a copy of the website's SQL database from "b4d_vipera," the hacker who took responsibility for the breach.

The attacker also leaked a sample of the purloined database--containing 450 records--to Pastebin. It contains usernames, passwords for the Sony website, and email addresses. Security experts recommend that anyone with a Sony BMG account in Greece immediately change their Sony password, and any other uses of the same password online.

The attacker said he exploited the Greek Sony website using a SQL injection attack against the site, which was running Internet Information Server (IIS) 6.0 on Windows 2003. SQL injection attacks, which exploit website databases that haven't been patched against known vulnerabilities, are much favored by attackers, in part for their simplicity.

"It's not something that requires a particularly skillful attacker, but simply the diligence to comb through Sony website after website until a security flaw is found," said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post.

In the wake of numerous data breaches involving more than 100 million user accounts, Sony is still attempting to get its systems fully secured and back online. Some of its Web properties, such as PlayStation Store, remain offline.

On Wednesday, Sony also deactivated online password resets for PSN and Qriocity, saying its password system couldn't handle the load.

But rumors that the password reset site had been compromised by attackers weren't true, said Patrick Seybold, Sony's senior director of corporate communications and social media, in a blog post. "Contrary to some reports, there was no hack involved. In the process of resetting of passwords there was a URL exploit that we have subsequently fixed."

While Sony works to get its online password-reset process reestablished, Seybold said that PSN users can reset their passwords via their PlayStation 3. "Otherwise, they can continue to do so via the website as soon as we bring that site back up," he said.

In this new Tech Center report, we profile five database breaches--and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk. Download it here (registration required).

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
EntRiskTechnologies
100%
0%
EntRiskTechnologies,
User Rank: Apprentice
7/30/2014 | 6:07:17 PM
PSN Attack
We discussed the attack, pay-out from Sony, and future in our blog at: https://entrisk-technologies.com/update-sony-playstation-network-data-breach-2011/ Check it out!
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.