Attacks/Breaches
6/3/2011
10:44 AM
Connect Directly
RSS
E-Mail
50%
50%

Sony Hacked Again, 1 Million Passwords Exposed

Hacker group LulzSec releases 150,000 Sony Pictures records, including usernames and passwords, in latest setback for consumer electronics giant.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
A group of hackers behind the recent PBS website breach said they've now hacked into a Sony website. The hackers, who call themselves LulzSec or the Lulz Boat, said they exploited the Sony Pictures website via a SQL injection attack.

"We recently broke into SonyPictures.com and compromised over 1,000,000 users' personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony opt-in data associated with their accounts," the group said in a Pastebin post. "Among other things, we also compromised all admin details of Sony Pictures (including passwords) along with 75,000 'music codes' and 3.5 million 'music coupons.'"

The group released 150,000 records gleaned during its attack, saying it didn't have time to copy more. Those records also include material taken from exploited databases for Sony BMG in the Netherlands and Belgium, which contained further information about website users as well as employees.

"From a single injection, we accessed everything," said the group. "What's worse is that every bit of data we took wasn't encrypted. Sony stored over 1,000,000 passwords of its customers in plaintext, which means it's just a matter of taking it."

The records were released via a MediaFire file download, the LulzSec website, as well as via BitTorrent. By early Friday, however, the MediaFire file had been "removed for violation" and the group's website was unavailable, despite the group's boasts via Twitter about how its CloudFire backup would prevent the website from becoming unreachable.

LulzSec is the same group that posted fake news on the PBS website on Saturday in retaliation for a PBS Frontline documentary's portrayal of Julian Assange, the founder of WikiLeaks, and Bradley Manning, who's accused of providing WikiLeaks with massive amounts of classified information.

The Sony Pictures data exposure is the latest in a string of embarrassing data breaches suffered by Sony. Multiple Sony websites, including its PlayStation Network, were breached beginning in April, leading to more than 100 million user accounts being compromised, and at least one class-action lawsuit as a result.

In the wake of those attacks, seeing another Sony website property being compromised via a basic vulnerability "sounds like a broken record," said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post. "Worst of all the hackers are exposing over a million people to having their accounts compromised and identities stolen simply to make a political point."

What should Sony Pictures website users do? "The takeaway for the average Internet users is clear," said Wisniewski. "Don't trust that your password is being securely stored and be sure to use a unique password for every website to limit your exposure if hacks like these occur."

Businesses should likewise be prepared, by ensuring that they can't be breached via the types of vulnerabilities that have scuttled Sony websites. "Sony seems to have been compromised in such a negative and severe way, I'm concerned that other organizations won't use this as a warning sign to analyze their defenses, and will instead adopt an 'it won't happen here' mentality," said Ron Gula, CEO of Tenable Network Security, via email. "I've already seen executives in different verticals offer excuses that explain-away why Sony's issues don't affect their customers or employees--which is very alarming."

In this new Tech Center report, we profile five database breaches--and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk. Download it here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.