Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Sony Hacked By N. Korea, Hacktivists, Ex-Employee, Or All Of The Above?
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 3   >   >>
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
12/31/2014 | 12:03:56 PM
Re: N Korea
Yep, those simulated events/fire drills are very valuable and IR companies highly recommend businesses practice them.
Ed Telders
50%
50%
Ed Telders,
User Rank: Apprentice
12/31/2014 | 11:58:11 AM
Re: N Korea
Yes indeed.  In a previous role many years ago I conducted a Business Continuity exercise for my company.  The Public Affairs team was very confident in their relationships with the media and their ability to handle the crisis communications for an event.  So we put them to the test.  I hired some Journalism students from the local university, had them using commercial grade video cameras (tells you how long ago this was) and microphones.  They were given the assignment to simply act as they really would pursuing a story and had them interview the public affairs team, in the room designated for press releases.  They had no script, they simply did exactly what a real live media team would do to cover a story.  Later we had the public affairs team review the tape and critique their own performance.  It was an eye opening experience for them.  They immediately reworked and refined their methods and procedures so that they would be better prepared for the real thing.   Its one thing to create an incident response procedure, it's another thing to actually do it.  Getting some "near reality" exercises improves their abilities as it would for any other team in a disaster scenario.  If more companies spent time exercising their response they would perform better when the real thing happens.  It also gives them the opportunity to find any flaws and weaknesses in their current response procedures and refine them.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
12/31/2014 | 11:55:10 AM
Re: N Korea
I would have to agree. The amount of pre-compiled inside pieces leans toward the idea that inside intelligence was provided. I will be interested to see how this progresses.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
12/31/2014 | 11:41:34 AM
Re: N Korea
@Ed Telders That would be really intriguing IF it was done correctly and Sony was willing to share its lessons learned, etc.

It's yet another example of how a detailed incident response plan (including PR, public disclosure strategy/plan) is crucial to a company's image and how something like this can take on a life of its own in the media if you don't have a good game plan.
Ed Telders
50%
50%
Ed Telders,
User Rank: Apprentice
12/31/2014 | 11:32:54 AM
Re: N Korea
Kelly, actually, you may really be on to something here.  Of course all the facts are not out yet but most of them will eventually become known.  The right movie, docu-drama, or expose, done well, could really do us a great and needed service.  Given that this happened to the entertainment industry what better source for turning this really tough issue into a public forum.  The media can capture the imagination, fire the interest, and feed the need for some real awareness.  I don't mean another silly comedy movie, but one that really highlights the issues, risks, and importantly the abilities of our  cyber-adversaries.  Maybe it'll wake some folks up !!   
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
12/31/2014 | 8:48:47 AM
Re: N Korea
@Rafer33 Like, totally. ;-)
shakeeb
50%
50%
shakeeb,
User Rank: Apprentice
12/31/2014 | 2:01:20 AM
Re: N Korea
@Kelly – I am just waiting to see who was involved in this and how they did it. Seen it as a movie will be wonderful than having it as a script. 
shakeeb
50%
50%
shakeeb,
User Rank: Apprentice
12/31/2014 | 1:34:04 AM
Re: N Korea
I'm sure an ex-employee should be part of it, at least helping the hackers with a backdoor. 
Technocrati
50%
50%
Technocrati,
User Rank: Ninja
12/30/2014 | 9:38:58 PM
Re: N Korea
@Kelly   Agreed !  : ) 
Rafer33
0%
100%
Rafer33,
User Rank: Apprentice
12/30/2014 | 7:34:39 PM
Re: N Korea
"Epic breach".....learn to write....my God are you 16??
<<   <   Page 2 / 3   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20686
PUBLISHED: 2021-09-17
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2021-38402
PUBLISHED: 2021-09-17
Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could lead to a stack-based buffer overflow while trying to copy to a buffer during font string handling. An attacker could leverage this vulnerability to ex...
CVE-2021-38404
PUBLISHED: 2021-09-17
Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2021-38406
PUBLISHED: 2021-09-17
Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in multiple out-of-bounds write instances. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2021-41326
PUBLISHED: 2021-09-17
In MISP before 2.4.148, app/Lib/Export/OpendataExport.php mishandles parameter data that is used in a shell_exec call.