You are on page 1of 1

NEWS

Sony under attack to 2007 was also compromised. This


contained credit/debit card expiration
knew it or not they were aiding in a
well-planned, well-executed, large-scale
dates for 12,700 non-US customers and theft that left not only Sony a victim,
H ackers have succeeded in
breaching Sony networks the
PlayStation Network (PSN), Qriocity
10,700 direct debit accounts for custom-
ers in Germany, Austria, Netherlands
but also Sonys many customers around
the world.
and Spain all of which may have been This prompted a second statement
and Sony Online Entertainment
stolen. Other account info was taken from Anonymous, reiterating that it
(SOE) resulting in the compromise
and although Sony says passwords were was not responsible and that it doesnt
of users details that potentially
hashed, it didnt reveal what method condone credit card theft (although it
numbered as many as 100 million
was used for the hashing for example, has supported direct attacks on financial
records. Both systems were taken
whether a salt was employed. Sony also institutions). However, the nature of the
offline immediately the breaches at
hasnt yet explained why an outdated group is such that individuals can eas-
the AT&T datacentre in San Diego
database remained on its system and was ily mount an attack claiming to act on
were discovered.
still reachable via the Internet. behalf of the group. And Sony later said
Initial reports claimed that as many as
Enterprises need to reconsider the it had found a file named Anonymous
77 million customer records were com-
validity of data collection and accessibil- on its servers carrying the message We
promised during the PSN attacks, which
ity, said John Colley, managing director are legion a popular slogan used by
took place in mid-April. This was based
of (ISC)2 EMEA. Marketing people, Anonymous. Nevertheless, the file could
on the size of the systems user base, but
for example, should perhaps review the have been left there by the hackers as a
estimates of the number actually affected
amount and type of information they way of shifting suspicion.
later dropped to 10 million still a mas-
gather as well as how they gather it, Sony said it is improving its security,
sive breach. The PSN attack netted the
given the level of attempts to defraud which includes the creation of the post
hackers records detailing names, birth
people via email. They must consider of Chief Information Security Officer
dates, email addresses, account logins
whether data needs to be stored perma- (CISO) and moving its datacentre to a
and physical addresses.
nently or whether it can be held tempo- new location. And as well as working
Later it was announced that SOE had
rarily. Authentication is a clear example closely with the FBI and database pro-
also been breached. SOE is home to a
of where the data usage requirement can vider Oracle, it has also called in security
number of services, including multi-play-
be temporary. experts Guidance Software and Data
er online games such as EverQuest, The
The Anonymous group, a loose col- Forte to help investigate the breaches.
Matrix Online, Star Wars Galaxies, DC
lective of activists, immediately fell At the time of writing, there were
Universe Online and Free Realms. Up to
under suspicion, although very soon rumours of a pending third attack.
24.5 million records were compromised.
after the Sony breach was announced CNET reporter Erica Ogg claimed to
Sony has claimed that although credit
the group made a public statement that have communicated with one of the
card information was stored on the
it was not responsible. However, it had attackers via an IRC channel. The hacker
PSN system around 10 million user
been carrying out a DDoS campaign said the attack would be on Sonys web-
accounts had credit/debit card informa-
against Sony because of the companys site where the hackers would publicise
tion associated with them this data was
now-settled legal action against George their successes.
encrypted. Sony also stated that it had
no evidence that credit card data was Hotz, who hacked the PlayStations
taken. It also pointed out that it does encryption key. These attacks effectively PCI DSS appears to
masked the hackers activities, which
not store CVV data. However, Sony gave
no details about the encryption methods is why Sony didnt notice the breaches reduce breaches
used. And researchers from Trend Micro sooner, the firm claimed. In a letter to
claim to have seen discussions in carder
forums offering this data for sale with
a Congressional committee, Sony chair-
man Kazuo Hirai suggested that the
A lthough most information secu-
rity practitioners insist that com-
pliance does not equate to security,
as many as 2.2 million records being Anonymous members engaged in the a new report sponsored by Imperva
available. Reported in the New York DDoS attack may have been providing and carried out by the Ponemon
Times, Trends senior threat researcher, cover for the hackers. Institute has found a correlation
Kevin Stevens, said that the hackers Whether those who participated in between Payment Card Industry
might be asking as much as $100,000 the denial of service attacks were con- Data Security Standards (PCI DSS)
for the data, and had even offered to sell spirators or whether they were simply compliance and fewer data breaches.
it back to Sony. This has been denied by duped into providing cover for a very The 2011 PCI DSS Compliance
the company. clever thief, we may never know, he Trends Study found that 64% of the
With the SOE attack, Sony says that, wrote. In any case, those who par- surveyed companies that comply with
in addition to current user informa- ticipated in the denial of service attacks the standards reported no data breaches
tion, an outdated database dating back should understand that whether they Continued on page 19....

3
May 2011 Computer Fraud & Security

You might also like