Feeds

Did PlayStation Network hackers plan supercomputer botnet?

Sony 'arrogance' fuels Doomsday scenario

Beginner's guide to SSL certificates

Sony 'arrogance' undermines security

“If you can't jailbreak it, then I can see a developer assuming that they don't need a particular authorization check on what's coming across the wire because a user can't do that,” said WhiteHat Security CTO Jeremiah Grossman, an expert in web application security. “So if somebody managed to jailbreak their device and pop a flaw, I can see something major happening there.”

Hotz, the PS3 jailbreaker who recently settled the copyright lawsuit Sony brought against him, said in a recent blog post that the theory is plausible and that responsibility for the hack lay squarely on the shoulders of Sony executives who placed too much trust in the invulnerability of the PS3.

“Since everyone knows the PS3 is unhackable, why waste money adding pointless security between the client and the server?” Hotz, aka GeoHot, wrote. “This arrogance undermines a basic security principle, never trust the client. Sony needs to accept that they no longer own and control the PS3 when they sell it to you.”

Of course, the cause of the hack and the motivation of those behind it are pure speculation. A SQL injection attack, which uses ordinary user input to pass powerful commands to a website's backend database, might also have been at play, as could any number of other exploits.

What's clear from the information stolen, the possibility that encrypted payment card data was also taken, and the amount of time the PSN has been unavailable (nine days at time of writing), is that the attackers had access to the very core of Sony's system – its database or web application system, for instance – and that this access lasted for hours or days.

PSN users are already lining up in court to sue Sony over the colossal security failure.

According to Sony's bare-bones account, the information was compromised from April 17 to April 19. By the following day, the PSN was taken offline. That means the scenario raised by Ray, the researcher who said attackers may have wanted to build their own supercomputer botnet, almost certainly didn't have enough time to unfold.

But he said users shouldn't assume anything until they get more information.

“In the meantime, I recommend that everyone unplug the network cable and disable the WiFi from their PS3 until the all-clear signal is given from Sony,” he wrote. “Ideally that signal would take the form of a disclosure of information in sufficient detail for us to come to our own judgment about the security of these systems going forward before we allow them back on our internal networks again.” ®

Bootnote

Kevin Poulsen of Wired.com spins an engaging yarn about Trixter. Referring to the chat log, Poulsen writes: "The parts of the discussion that delve into Sony’s security posture appear eerily prescient in the wake of the intrusion that exposed personal information on 77 million users, and copies of the chats are now lighting up gaming blogs and Twitter feeds."

More unconfirmed bread crumbs, these ones strongly suggesting sony.com2.us was hacked. That, of course, ain't Sony's.

Choosing a cloud hosting partner with confidence

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.