Attacks/Breaches
6/3/2011
10:44 AM
50%
50%

Sony Hacked Again, 1 Million Passwords Exposed

Hacker group LulzSec releases 150,000 Sony Pictures records, including usernames and passwords, in latest setback for consumer electronics giant.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
A group of hackers behind the recent PBS website breach said they've now hacked into a Sony website. The hackers, who call themselves LulzSec or the Lulz Boat, said they exploited the Sony Pictures website via a SQL injection attack.

"We recently broke into SonyPictures.com and compromised over 1,000,000 users' personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony opt-in data associated with their accounts," the group said in a Pastebin post. "Among other things, we also compromised all admin details of Sony Pictures (including passwords) along with 75,000 'music codes' and 3.5 million 'music coupons.'"

The group released 150,000 records gleaned during its attack, saying it didn't have time to copy more. Those records also include material taken from exploited databases for Sony BMG in the Netherlands and Belgium, which contained further information about website users as well as employees.

"From a single injection, we accessed everything," said the group. "What's worse is that every bit of data we took wasn't encrypted. Sony stored over 1,000,000 passwords of its customers in plaintext, which means it's just a matter of taking it."

The records were released via a MediaFire file download, the LulzSec website, as well as via BitTorrent. By early Friday, however, the MediaFire file had been "removed for violation" and the group's website was unavailable, despite the group's boasts via Twitter about how its CloudFire backup would prevent the website from becoming unreachable.

LulzSec is the same group that posted fake news on the PBS website on Saturday in retaliation for a PBS Frontline documentary's portrayal of Julian Assange, the founder of WikiLeaks, and Bradley Manning, who's accused of providing WikiLeaks with massive amounts of classified information.

The Sony Pictures data exposure is the latest in a string of embarrassing data breaches suffered by Sony. Multiple Sony websites, including its PlayStation Network, were breached beginning in April, leading to more than 100 million user accounts being compromised, and at least one class-action lawsuit as a result.

In the wake of those attacks, seeing another Sony website property being compromised via a basic vulnerability "sounds like a broken record," said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post. "Worst of all the hackers are exposing over a million people to having their accounts compromised and identities stolen simply to make a political point."

What should Sony Pictures website users do? "The takeaway for the average Internet users is clear," said Wisniewski. "Don't trust that your password is being securely stored and be sure to use a unique password for every website to limit your exposure if hacks like these occur."

Businesses should likewise be prepared, by ensuring that they can't be breached via the types of vulnerabilities that have scuttled Sony websites. "Sony seems to have been compromised in such a negative and severe way, I'm concerned that other organizations won't use this as a warning sign to analyze their defenses, and will instead adopt an 'it won't happen here' mentality," said Ron Gula, CEO of Tenable Network Security, via email. "I've already seen executives in different verticals offer excuses that explain-away why Sony's issues don't affect their customers or employees--which is very alarming."

In this new Tech Center report, we profile five database breaches--and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk. Download it here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1414
Published: 2015-02-27
Integer overflow in FreeBSD before 8.4 p24, 9.x before 9.3 p10. 10.0 before p18, and 10.1 before p6 allows remote attackers to cause a denial of service (crash) via a crafted IGMP packet, which triggers an incorrect size calculation and allocation of insufficient memory.

CVE-2015-2072
Published: 2015-02-27
Multiple cross-site scripting (XSS) vulnerabilities in SAP HANA 73 (1.00.73.00.389160) and HANA Developer Edition 80 (1.00.80.00.391861) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to (1) ide/core/plugins/editor/templates/trace/hanaTraceDetailService.xsjs or...

CVE-2015-2075
Published: 2015-02-27
SAP BussinessObjects Edge 4.0 allows remote attackers to delete audit events from the auditee queue via a clearData CORBA operation, aka SAP Note 2011396.

CVE-2015-2076
Published: 2015-02-27
The Auditing service in SAP BussinessObjects Edge 4.0 allows remote attackers to obtains sensitive information by reading an audit event, aka SAP Note 2011395.

CVE-2015-2101
Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in the Navigate bar in the Navigate module before 6.x-1.1 and 7.x-1.x before 7.x-1.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.