B2B Marketers » Reach Pre-Qualified IT Decision Makers with a Custom Lead Gen Program » Get Details
Welcome Guest | Sign In
TechNewsWorld.com
salesforce commerce cloud

Sony's Cyber-Whodunit Is a Page-Turner

By Richard Adhikari E-Commerce Times ECT News Network
Dec 5, 2014 6:59 AM PT

Who breached Sony Pictures' network and why continues to be a puzzle a week after news of the hack first emerged.

Sony's Cyber-Whodunit Is a Page-Turner

Some speculate it was an inside job. A few have pointed fingers at North Korea, which returned its own one-finger salute in response. Others discount that possibility.

In the meantime, the FBI has issued a warning stating destructive malware is on the loose.

Details of Sony's executive reimbursement and business dealings have been published on the Web, and the company might be in for a thrashing. In addition to being put at a disadvantage in business dealings, it could face lawsuits and government action.

However, the market seems sanguine -- shares of Sony's shares closed at US$22.12, up 17 cents, or 0.77 percent, on Thursday.

That might change if reports that Sony neglected staff warnings about security and didn't pay much attention to cybersecurity can be borne out.

"At the minimum, they will take a significant productivity hit," Michele Borovac, VP at HyTrust, told the E-Commerce Times. "It may take ... years for the company to assess the financial impact of [the breach], as it may spur employee turnover, loss of partners and potential legal costs."

The Impact on Sony

The latest hack may be a major setback, because "if consumers and employees lose faith, it will also affect investors," Jerome Segura, senior security researcher at Malwarebytes Labs, told the E-Commerce Times.

"This is one of the most devastating breaches for one company in history," declared Aviv Raff, CTO and cofounder of Seculert.

"Over 38 million corporate files from its sales, marketing and HR departments are now public," he told the E-Commerce Times. "I believe that now this is a board-level issue for Sony and other corporations."

Sony could lose negotiating power when dealing with competitive bids, and possibly lose leverage when using differential pricing of a product across different customers and markets, suggested Ian Amit, vice president of ZeroFox.

Longer-term strategic planning also could be impacted "as details of certain products' lifespan and pricing are exposed and can be leveraged to undercut Sony," he told the E-Commerce Times.

Politics as Usual...

However, the attack "does not significantly affect the political calculus," opined Mike Lloyd, CTO at RedSeal.

Even if it could be proved that North Korea was the attacker, which is doubtful, the situation "would be similar to learning [it] was behind an arson attack on a U.S.-owned warehouse in South Korea," Lloyd told the E-Commerce Times.

The attack "is serious but has not destroyed [Sony's] ability to make money or caused anyone's death," he pointed out.

Who's to Blame?

"From the samples [of malware] we've obtained, we can say the attackers knew the Sony internal network, since they contain hardcoded names of servers inside Sony's network and even credentials, usernames and passwords that the malware used to talk to IP addresses in Italy, Singapore, Poland, the United States, Thailand, Bolivia and Cyprus," noted Jaime Blasco, lab director at AlienVault.

These were "probably hacked systems or VPNs or proxies that the attackers used to hide their origin," he told the E-Commerce Times.

Some of the malware was compiled in systems using the Korean language, and Vice.com's Patrick McGuire has detailed correspondence between himself and people claiming to be the hackers, who said they were North Korean.

"That North Korea is involved seems implausible," Sean Sullivan, a security adviser at F-Secure, told the E-Commerce Times, "but we now live in interesting times, so that theory can no longer be dismissed out of hand."

North Korea could have been the attacker, ZeroFox's Amit said. "So could Ireland, Latvia or New Zealand." However, the duration of the attack -- over a year -- as well as the amount of data stolen and the kind of access obtained "all indicate that some physical access to the Sony facilities was likely part of the attack."

Meanwhile, Kaspersky has pointed to similarities between Shamoon and DarkSeoul -- malware used in attacks targeting South Korea -- and Destover, the Trojan used in the attack on Sony.

In short, nobody knows for sure who hit Sony or why.


Richard Adhikari has written about high-tech for leading industry publications since the 1990s and wonders where it's all leading to. Will implanted RFID chips in humans be the Mark of the Beast? Will nanotech solve our coming food crisis? Does Sturgeon's Law still hold true? You can connect with Richard on Google+.


Facebook Twitter LinkedIn Google+ RSS
salesforce commerce cloud
Would you move to a tech hub like San Francisco or Seattle if you were offered a high-paying, career-building job?
Absolutely. I already live in a tech center and I enjoy being where the action is.
No. I live in (or have lived in) a tech-forward city, and I'd rather live elsewhere.
I'd be tempted, but I'm worried about the cost of living.
I doubt it, as I don't like the reputation for decadence in those cities.
I would if I didn't have so many ties where I currently live.
Why bother? With telecommuting you can live and work anywhere.
salesforce commerce cloud
salesforce commerce cloud