Attacks/Breaches
5/23/2011
01:39 PM
50%
50%

Sony Data Breach Cleanup To Cost $171 Million

If identify theft or credit card fraud takes place, the company said its actual costs could rise substantially.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
Sony on Monday said that it expects the cleanup cost from the data breaches it's suffered to cost at least $171 million. Sony said the data breach costs will affect revenues for its fiscal 2011 year, which ends on March 31, 2012.

According to a statement released by Sony's investor relations group, "based on information currently available to Sony, our currently known costs associated with the unauthorized network access are estimated to be approximately 14 billion yen," or about $171 million.

But those costs could go much higher, the company warned investors during a call on Monday. "So far, we have not received any confirmed reports of customer identity theft issues, nor confirmed any misuse of credit cards from the cyber-attack. Those are key variables, and if that changes, the costs could change," said Sony, as reported by Joystiq, which saw a transcript of the call.

Beginning in April, Sony suffered multiple data breaches involving its PlayStation Network (PSN), Qriocity, Sony Online Entertainment, and other sites.

On Sunday, new revelations surfaced that Sony apparently also suffered another data breach earlier this month, after hackers cracked Sony BMG's website in Greece. That would make it the seventh data breach suffered by Sony since April 2011.

In this breach, which occurred on May 5, attackers obtained information about more than 8,000 website users, according to The Hackers News, which received a copy of the website's SQL database from "b4d_vipera," the hacker who took responsibility for the breach.

The attacker also leaked a sample of the purloined database--containing 450 records--to Pastebin. It contains usernames, passwords for the Sony website, and email addresses. Security experts recommend that anyone with a Sony BMG account in Greece immediately change their Sony password, and any other uses of the same password online.

The attacker said he exploited the Greek Sony website using a SQL injection attack against the site, which was running Internet Information Server (IIS) 6.0 on Windows 2003. SQL injection attacks, which exploit website databases that haven't been patched against known vulnerabilities, are much favored by attackers, in part for their simplicity.

"It's not something that requires a particularly skillful attacker, but simply the diligence to comb through Sony website after website until a security flaw is found," said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post.

In the wake of numerous data breaches involving more than 100 million user accounts, Sony is still attempting to get its systems fully secured and back online. Some of its Web properties, such as PlayStation Store, remain offline.

On Wednesday, Sony also deactivated online password resets for PSN and Qriocity, saying its password system couldn't handle the load.

But rumors that the password reset site had been compromised by attackers weren't true, said Patrick Seybold, Sony's senior director of corporate communications and social media, in a blog post. "Contrary to some reports, there was no hack involved. In the process of resetting of passwords there was a URL exploit that we have subsequently fixed."

While Sony works to get its online password-reset process reestablished, Seybold said that PSN users can reset their passwords via their PlayStation 3. "Otherwise, they can continue to do so via the website as soon as we bring that site back up," he said.

In this new Tech Center report, we profile five database breaches--and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk. Download it here (registration required).

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
EntRiskTechnologies
100%
0%
EntRiskTechnologies,
User Rank: Apprentice
7/30/2014 | 6:07:17 PM
PSN Attack
We discussed the attack, pay-out from Sony, and future in our blog at: https://entrisk-technologies.com/update-sony-playstation-network-data-breach-2011/ Check it out!
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-5084
Published: 2015-08-02
The Siemens SIMATIC WinCC Sm@rtClient and Sm@rtClient Lite applications before 01.00.01.00 for Android do not properly store passwords, which allows physically approximate attackers to obtain sensitive information via unspecified vectors.

CVE-2015-5352
Published: 2015-08-02
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time ...

CVE-2015-5537
Published: 2015-08-02
The SSL layer of the HTTPS service in Siemens RuggedCom ROS before 4.2.0 and ROX II does not properly implement CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a different vulnerability than CVE-2014-3566.

CVE-2015-5600
Published: 2015-08-02
The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumptio...

CVE-2015-1009
Published: 2015-07-31
Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!