Feeds

Groundhog day: more Sony breaches

Barnstorming hackers continue diabolical mystery tour

Build a business case: developing custom apps

Talk of “isolated incidents” went by the board in the last couple of days, with Sony and Sony-affiliated sites compromised in Canada, Japan and Indonesia.

Let’s do the rounds:

• Canada – The Hacker News reports a breach at a Sony-Ericsson mobile store, conducted through an SQL injection attack and yielding details of around 2,000 accounts.

• Japan – Again via The Hacker News, again via SQL injection, SonyMusic.co.jp was attacked. According to Sophos, it’s not clear whether the attack compromised user data.

• Indonesia – This attack seems less serious: a page was altered on Sony Music Indonesia’s Website, and in response, the site has been closed.

According to Sophos’ Chester Wilenski, the attack on Sony Music Japan was carried out by an informal group called Lulz Security. Wilenski writes that these attackers are motivated by “fun and politics” rather than a desire to commit fraud.

“This doesn’t change the criminality of their behaviour”, Wilenski writes.

The Lulz group has claimed that it’s aware of two other Sony databases with the vulnerability it exploited in Japan.

The attack in Canada is attributed to Lebanese hackers going under the moniker Idahca.

With Sony now bleeding from its wounds, attention will turn from the financial impact – it has already allowed US$171 million for the PSN breach in April – to the matter of trust.

As the hackfest rolls around the world, Sony’s will have to answer why the same kind of vulnerability appeared across so many of its sites in different countries, and whether it had sought external assessment across all Sony-affiliated sites (including penetration testing).

Should the attacks in Canada or Japan (or an earlier attack in Greece) turn out to expose customer credit cards, those questions will become even more pressing. ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?