Feeds

Did PlayStation Network hackers plan supercomputer botnet?

Sony 'arrogance' fuels Doomsday scenario

SANS - Survey on application security programs

Sony 'arrogance' undermines security

“If you can't jailbreak it, then I can see a developer assuming that they don't need a particular authorization check on what's coming across the wire because a user can't do that,” said WhiteHat Security CTO Jeremiah Grossman, an expert in web application security. “So if somebody managed to jailbreak their device and pop a flaw, I can see something major happening there.”

Hotz, the PS3 jailbreaker who recently settled the copyright lawsuit Sony brought against him, said in a recent blog post that the theory is plausible and that responsibility for the hack lay squarely on the shoulders of Sony executives who placed too much trust in the invulnerability of the PS3.

“Since everyone knows the PS3 is unhackable, why waste money adding pointless security between the client and the server?” Hotz, aka GeoHot, wrote. “This arrogance undermines a basic security principle, never trust the client. Sony needs to accept that they no longer own and control the PS3 when they sell it to you.”

Of course, the cause of the hack and the motivation of those behind it are pure speculation. A SQL injection attack, which uses ordinary user input to pass powerful commands to a website's backend database, might also have been at play, as could any number of other exploits.

What's clear from the information stolen, the possibility that encrypted payment card data was also taken, and the amount of time the PSN has been unavailable (nine days at time of writing), is that the attackers had access to the very core of Sony's system – its database or web application system, for instance – and that this access lasted for hours or days.

PSN users are already lining up in court to sue Sony over the colossal security failure.

According to Sony's bare-bones account, the information was compromised from April 17 to April 19. By the following day, the PSN was taken offline. That means the scenario raised by Ray, the researcher who said attackers may have wanted to build their own supercomputer botnet, almost certainly didn't have enough time to unfold.

But he said users shouldn't assume anything until they get more information.

“In the meantime, I recommend that everyone unplug the network cable and disable the WiFi from their PS3 until the all-clear signal is given from Sony,” he wrote. “Ideally that signal would take the form of a disclosure of information in sufficient detail for us to come to our own judgment about the security of these systems going forward before we allow them back on our internal networks again.” ®

Bootnote

Kevin Poulsen of Wired.com spins an engaging yarn about Trixter. Referring to the chat log, Poulsen writes: "The parts of the discussion that delve into Sony’s security posture appear eerily prescient in the wake of the intrusion that exposed personal information on 77 million users, and copies of the chats are now lighting up gaming blogs and Twitter feeds."

More unconfirmed bread crumbs, these ones strongly suggesting sony.com2.us was hacked. That, of course, ain't Sony's.

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
Canadian taxman says hundreds pierced by Heartbleed SSL skewer
900 social insurance numbers nicked, says revenue watchman
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.