Attacks/Breaches
4/27/2011
04:05 PM
Connect Directly
RSS
E-Mail
50%
50%

Sony Sued Over PlayStation Network Hack

A class action lawsuit charges that Sony failing to protect personal information and credit card numbers of up to 77 million users.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
Sony faces public condemnation as its PlayStation Network (PSN) outage enters its seventh day, combined with a security breach of users' personal information that may have exposed the credit card details of up to 77 million customers.

On Wednesday, Kristopher Johns, 36, of Birmingham, Ala., filed the first class action lawsuit, on behalf of all PSN users, in the U.S. District Court for the Northern District of California. The lawsuit alleges that Sony "failed to encrypt data and establish adequate firewalls to handle a server intrusion contingency, failed to provide prompt and adequate warnings of security breaches, and unreasonably delayed in bringing the PSN service back on line." It also accused Sony of violating the Payment Card Industry (PCI) security standard, which prohibits companies from storing cardholder data.

Sony pulled the plug on PSN and its Qriocity music service on Friday, three days after it discovered "an external intrusion," according to a blog post from Patrick Seybold, Sony's senior director of corporate communications and social media. The outage blocks users from playing online games as well as some users from accessing multiple services, including Netflix and Hulu Plus. At the time, Seybold said that Sony was attempting to resolve the situation quickly.

By Tuesday, Sony said that the PSN outage was continuing while it attempted to address a situation that was worse than it originally suspected. Namely, Sony's forensic investigation had discovered that a hacker had compromised the personal information of up to 77 million users.

In a letter sent to all PSN and Qriocity account holders, Sony said that "although we are still investigating the details of this incident, we believe that an unauthorized person has obtained the following information that you provided: name, address (city, state, zip), country, email address, birth date, PlayStation Network/Qriocity password and login, and handle/PSN online ID." In addition, the attacker may also have stolen users' purchase history, billing address, and password security questions.

Most alarmingly, however, "while there is no evidence at this time that credit card data was taken, we cannot rule out the possibility," said the Sony letter. "Out of an abundance of caution we are advising you that your credit card number (excluding security code) and expiration date may have been obtained."

What should Sony's customers do to protect themselves? "If you have used the same username/e-mail address with the same password in some other service, change the password now. When PSN comes back online, change your password there as well," said Mikko Hypponen, chief research officer at F-Secure, in an email. Security experts also recommend canceling any potentially compromised credit cards.

In response to the breach, Sony said it had engaged a major security firm to investigate the intrusion and that it was going to "strengthen our network infrastructure by re-building our system to provide you with greater protection of your personal information." According to Sony, "our teams are working around the clock on this, and services will be restored as soon as possible."

What exactly might Sony be rebuilding? "Details of the 'rebuild' are not forthcoming so it's hard to identify exactly what they are changing. In my experience with such security issues, however, I would note that complex systems that are built lacking security are often incredibly difficult to debug and patch with security if they aren't built on good foundations," said James Lyne, director of technology strategy at Sophos, in an email interview. "Often, security with such large-scale data processing systems needs to be built into the architecture," and if it isn't, he said, the simplest way to create a secure approach is to simply start from scratch.

On the other hand, "time is of the essence" for Sony, hence "tactical patching in the existing infrastructure--to avoid additional exploits--followed by a complete design review, is a good strategy," he said.

Sony has no doubt started by addressing how a hacker managed to--potentially--steal credit card details for up to 77 million people, which puts it in apparent violation of PCI. Regardless, Lyne said that companies can do better. "The practices required by standards such as PCI are 'decent practices' but I would argue a great deal more could be done to avoid extensive exposure of credit card information," he said. "It's time to apply the lessons learned over the past few years and raise the bar."

Applying lessons learned may not, however, be Sony's strong suit, owing to its reputation for security incidents that spiral into PR disasters, owing to a lack of transparency. Notably, Sony earned mass condemnation--and saw at least one class action lawsuit--in 2005, when it installed a hidden rootkit on users' PCs to block them from copying Sony music CDs. Antivirus firms quickly designated the software, which was extremely difficult to uninstall, as spyware, and set their software to nuke it.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2006-1318
Published: 2014-09-19
Microsoft Office 2003 SP1 and SP2, Office XP SP3, Office 2000 SP3, Office 2004 for Mac, and Office X for Mac do not properly parse record lengths, which allows remote attackers to execute arbitrary code via a malformed control in an Office document, aka "Microsoft Office Control Vulnerability."

CVE-2012-2588
Published: 2014-09-19
Multiple cross-site scripting (XSS) vulnerabilities in MailEnable Enterprise 6.5 allow remote attackers to inject arbitrary web script or HTML via the (1) From, (2) To, or (3) Subject header or (4) body in an SMTP e-mail message.

CVE-2012-6659
Published: 2014-09-19
Cross-site scripting (XSS) vulnerability in the admin interface in Phorum before 5.2.19 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-1391
Published: 2014-09-19
QT Media Foundation in Apple OS X before 10.9.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file with RLE encoding.

CVE-2014-3614
Published: 2014-09-19
Unspecified vulnerability in PowerDNS Recursor (aka pdns_recursor) 3.6.x before 3.6.1 allows remote attackers to cause a denial of service (crash) via an unknown sequence of malformed packets.

Best of the Web
Dark Reading Radio