Feeds

New Sony hack exposes more consumer passwords

The 'sownage' continues

The Power of One eBook: Top reasons to choose HP BladeSystem

Hackers who last week broke into the website of television network PBS have turned their attention to Sony's movie division, publishing what appeared to be the email addresses and passwords belonging to at least 50,000 consumers who registered for online promotions.

A group called LulzSec claimed responsibility for the attack and said it was achieved by exploiting a simple SQL injection vulnerability on the Sony Pictures website. The group claimed the single attack exposed information for more than 1 million people, but that the group lacked the resources to copy such a massive amount of data.

"What's worse is that every bit of data we took wasn't encrypted," the group wrote in a press release announcing the hack. "Sony stored over 1,000,000 passwords of its customers in plaintext, which means it's just a matter of taking it. This is disgraceful and insecure: they were asking for it."

A Sony spokesman said the company is looking into the claims, but provided no other comment.

LulzSec is the same group that took credit for breaching security at PBS.org last holiday weekend in retaliation for a documentary it claimed was unfair to whistle-blower website WikiLeaks. The pranksters published usernames and hashed passwords for website administrators and users, and they also posted a hoax news story claiming that dead rapper Tupac Shakur was alive and living in the same New Zealand town as nemesis Biggie Smalls.

The group has also hacked Sony’s Fox.com and stole hundreds of employee passwords along with the names, phone numbers and e-mail addresses of some 73,000 people who requested audition information for the upcoming talent show The X-Factor.

The compromise of Sony Pictures is the latest embarrassment for Sony, which has suffered a series of devastating hacks since being targeted for its scorched-earth legal campaign against people jailbreaking the PlayStation 3 game console. All told, the attacks have exposed personally identifiable information for more than 100 million Sony customers and cost Sony at least $171 million.

The personally identifiable information contained in Thursday's data dump appeared to belong to people who signed up for promotional campaigns involving AutoTrader.com, Sony's "Summer of Restless Beauty," and a “Seinfeld — We’re Going to Del Boca Vista!” giveaway. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.