Attacks/Breaches
5/3/2011
11:27 AM
Connect Directly
RSS
E-Mail
50%
50%

Sony Reports 24.5 Million More Accounts Hacked

After a second breach, the company suspends all Sony Online Entertainment multiplayer games as the number of compromised user accounts exceeds 100 million.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
Sony on Tuesday disclosed that another 24.5 million user accounts were compromised by attackers in mid-April, this time in a breach of its Sony Online Entertainment (SOE) division systems. The division is best known for its massively multiplayer games, which include EverQuest II and Clone Wars Adventures.

According to a notice posted on the SOE website, Sony has temporarily suspended all online multiplayer SOE games "until we could verify their security."

The newly discovered breach is the latest security setback for the consumer electronics giant, which saw sales of $77.8 billion for its 2010 fiscal year. All together, the total number of accounts compromised by attackers in the past month now stands at more than 100 million.

In a statement released on Tuesday, Sony said that "we had previously believed that SOE customer data had not been obtained in the cyber-attacks on the company, but on May 1st we concluded that SOE account information may have been stolen and we are notifying you as soon as possible." Stolen information may include a user's name, address, email address, gender, birth date, and phone number--if supplied by the user--as well as their login name and a hashed password.

Some credit card data also was compromised in the SOE breach. Surprisingly, Sony said the data was from "an outdated database from 2007 containing approximately 12,700 non-U.S. customer credit or debit card numbers and expiration dates (but not credit card security codes) and about 10,700 direct debit records listing bank account numbers of certain customers in Germany, Austria, Netherlands, and Spain may have also been obtained." Sony says it is notifying affected customers as quickly as possible.

Security experts reacted with surprise at Sony's rolling disclosures. "How many locations on your network are housing other 'lost' financial data?" said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post. "Do you even know where my information is to check whether it has been stolen?"

Sony's disclosure of the newly discovered breach at SOE come as the company is still investigating the extent of the previously reported breach of its PlayStation Network and Qriocity services, which affected 77 million users and has already been the subject of a U.S. lawsuit that seeks class action status.

Sony said on Monday that while passwords stolen in the PlayStation Network and Qriocity intrusions weren't encrypted, they also weren't stored in clear text. Rather, "they were transformed using a cryptographic hash function," said Sony's senior director for corporate communications and social media, Patrick Seybold, in a website statement.

But hashing doesn't automatically equal unbreakable security, said Wisniewski at Sophos. "Sony was quick to note that the passwords had been hashed, but has not disclosed which hashing algorithm was used and whether they used a salt when calculating the hashes."

Earlier this year, for example, to show that the SHA1 secure hashing algorithm is weak, German security researcher Thomas Roth rented $2.10 of computing power from Amazon Elastic Compute Cloud (EC2) to crack 14 SHA1 hashes.

John P. Pironti, president of IP Architects, said in a telephone interview that the worry is that attackers will recover valid username and password credentials, which they can apply to websites en masse. "People only use one password for a lot of sites," he said. Another worry is that the information may end up built into a botnet, as with Waledac, which uses stolen but legitimate credentials to bypass spam filters and security defenses.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.