Attacks/Breaches
4/27/2011
04:05 PM
50%
50%

Sony Sued Over PlayStation Network Hack

A class action lawsuit charges that Sony failing to protect personal information and credit card numbers of up to 77 million users.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
Sony faces public condemnation as its PlayStation Network (PSN) outage enters its seventh day, combined with a security breach of users' personal information that may have exposed the credit card details of up to 77 million customers.

On Wednesday, Kristopher Johns, 36, of Birmingham, Ala., filed the first class action lawsuit, on behalf of all PSN users, in the U.S. District Court for the Northern District of California. The lawsuit alleges that Sony "failed to encrypt data and establish adequate firewalls to handle a server intrusion contingency, failed to provide prompt and adequate warnings of security breaches, and unreasonably delayed in bringing the PSN service back on line." It also accused Sony of violating the Payment Card Industry (PCI) security standard, which prohibits companies from storing cardholder data.

Sony pulled the plug on PSN and its Qriocity music service on Friday, three days after it discovered "an external intrusion," according to a blog post from Patrick Seybold, Sony's senior director of corporate communications and social media. The outage blocks users from playing online games as well as some users from accessing multiple services, including Netflix and Hulu Plus. At the time, Seybold said that Sony was attempting to resolve the situation quickly.

By Tuesday, Sony said that the PSN outage was continuing while it attempted to address a situation that was worse than it originally suspected. Namely, Sony's forensic investigation had discovered that a hacker had compromised the personal information of up to 77 million users.

In a letter sent to all PSN and Qriocity account holders, Sony said that "although we are still investigating the details of this incident, we believe that an unauthorized person has obtained the following information that you provided: name, address (city, state, zip), country, email address, birth date, PlayStation Network/Qriocity password and login, and handle/PSN online ID." In addition, the attacker may also have stolen users' purchase history, billing address, and password security questions.

Most alarmingly, however, "while there is no evidence at this time that credit card data was taken, we cannot rule out the possibility," said the Sony letter. "Out of an abundance of caution we are advising you that your credit card number (excluding security code) and expiration date may have been obtained."

What should Sony's customers do to protect themselves? "If you have used the same username/e-mail address with the same password in some other service, change the password now. When PSN comes back online, change your password there as well," said Mikko Hypponen, chief research officer at F-Secure, in an email. Security experts also recommend canceling any potentially compromised credit cards.

In response to the breach, Sony said it had engaged a major security firm to investigate the intrusion and that it was going to "strengthen our network infrastructure by re-building our system to provide you with greater protection of your personal information." According to Sony, "our teams are working around the clock on this, and services will be restored as soon as possible."

What exactly might Sony be rebuilding? "Details of the 'rebuild' are not forthcoming so it's hard to identify exactly what they are changing. In my experience with such security issues, however, I would note that complex systems that are built lacking security are often incredibly difficult to debug and patch with security if they aren't built on good foundations," said James Lyne, director of technology strategy at Sophos, in an email interview. "Often, security with such large-scale data processing systems needs to be built into the architecture," and if it isn't, he said, the simplest way to create a secure approach is to simply start from scratch.

On the other hand, "time is of the essence" for Sony, hence "tactical patching in the existing infrastructure--to avoid additional exploits--followed by a complete design review, is a good strategy," he said.

Sony has no doubt started by addressing how a hacker managed to--potentially--steal credit card details for up to 77 million people, which puts it in apparent violation of PCI. Regardless, Lyne said that companies can do better. "The practices required by standards such as PCI are 'decent practices' but I would argue a great deal more could be done to avoid extensive exposure of credit card information," he said. "It's time to apply the lessons learned over the past few years and raise the bar."

Applying lessons learned may not, however, be Sony's strong suit, owing to its reputation for security incidents that spiral into PR disasters, owing to a lack of transparency. Notably, Sony earned mass condemnation--and saw at least one class action lawsuit--in 2005, when it installed a hidden rootkit on users' PCs to block them from copying Sony music CDs. Antivirus firms quickly designated the software, which was extremely difficult to uninstall, as spyware, and set their software to nuke it.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] Assessing Cybersecurity Risk
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.