Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Sony Hacked By N. Korea, Hacktivists, Ex-Employee, Or All Of The Above?
Oldest First  |  Newest First  |  Threaded View
Page 1 / 3   >   >>
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
12/30/2014 | 3:42:57 PM
N Korea
Unraveling this attack -- who did what when & why -- would be a much better movie script than "The Interview."
Rafer33
0%
100%
Rafer33,
User Rank: Apprentice
12/30/2014 | 7:34:39 PM
Re: N Korea
"Epic breach".....learn to write....my God are you 16??
Technocrati
50%
50%
Technocrati,
User Rank: Ninja
12/30/2014 | 9:38:58 PM
Re: N Korea
@Kelly   Agreed !  : ) 
shakeeb
50%
50%
shakeeb,
User Rank: Apprentice
12/31/2014 | 1:34:04 AM
Re: N Korea
I'm sure an ex-employee should be part of it, at least helping the hackers with a backdoor. 
shakeeb
50%
50%
shakeeb,
User Rank: Apprentice
12/31/2014 | 2:01:20 AM
Re: N Korea
@Kelly – I am just waiting to see who was involved in this and how they did it. Seen it as a movie will be wonderful than having it as a script. 
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
12/31/2014 | 8:48:47 AM
Re: N Korea
@Rafer33 Like, totally. ;-)
Ed Telders
50%
50%
Ed Telders,
User Rank: Apprentice
12/31/2014 | 11:32:54 AM
Re: N Korea
Kelly, actually, you may really be on to something here.  Of course all the facts are not out yet but most of them will eventually become known.  The right movie, docu-drama, or expose, done well, could really do us a great and needed service.  Given that this happened to the entertainment industry what better source for turning this really tough issue into a public forum.  The media can capture the imagination, fire the interest, and feed the need for some real awareness.  I don't mean another silly comedy movie, but one that really highlights the issues, risks, and importantly the abilities of our  cyber-adversaries.  Maybe it'll wake some folks up !!   
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
12/31/2014 | 11:41:34 AM
Re: N Korea
@Ed Telders That would be really intriguing IF it was done correctly and Sony was willing to share its lessons learned, etc.

It's yet another example of how a detailed incident response plan (including PR, public disclosure strategy/plan) is crucial to a company's image and how something like this can take on a life of its own in the media if you don't have a good game plan.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
12/31/2014 | 11:55:10 AM
Re: N Korea
I would have to agree. The amount of pre-compiled inside pieces leans toward the idea that inside intelligence was provided. I will be interested to see how this progresses.
Ed Telders
50%
50%
Ed Telders,
User Rank: Apprentice
12/31/2014 | 11:58:11 AM
Re: N Korea
Yes indeed.  In a previous role many years ago I conducted a Business Continuity exercise for my company.  The Public Affairs team was very confident in their relationships with the media and their ability to handle the crisis communications for an event.  So we put them to the test.  I hired some Journalism students from the local university, had them using commercial grade video cameras (tells you how long ago this was) and microphones.  They were given the assignment to simply act as they really would pursuing a story and had them interview the public affairs team, in the room designated for press releases.  They had no script, they simply did exactly what a real live media team would do to cover a story.  Later we had the public affairs team review the tape and critique their own performance.  It was an eye opening experience for them.  They immediately reworked and refined their methods and procedures so that they would be better prepared for the real thing.   Its one thing to create an incident response procedure, it's another thing to actually do it.  Getting some "near reality" exercises improves their abilities as it would for any other team in a disaster scenario.  If more companies spent time exercising their response they would perform better when the real thing happens.  It also gives them the opportunity to find any flaws and weaknesses in their current response procedures and refine them.
Page 1 / 3   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-28096
PUBLISHED: 2022-01-27
An issue was discovered in Stormshield SNS before 4.2.3 (when the proxy is used). An attacker can saturate the proxy connection table. This would result in the proxy denying any new connections.
CVE-2022-0348
PUBLISHED: 2022-01-27
Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.
CVE-2021-44795
PUBLISHED: 2022-01-27
Single Connect does not perform an authorization check when using the "sc-assigned-credential-ui" module. A remote attacker could exploit this vulnerability to modify users permissions. The exploitation of this vulnerability might allow a remote attacker to delete permissions from other us...
CVE-2022-23181
PUBLISHED: 2022-01-27
The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using...
CVE-2021-44792
PUBLISHED: 2022-01-27
Single Connect does not perform an authorization check when using the "log-monitor" module. A remote attacker could exploit this vulnerability to access the logging interface. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information.