- ISIL creates all-female brigade to terrorize women into following Sharia law
- ISTOOK: Obama wants to be impeached
- Obama to Latin leaders: Help with border
- Military bans troops from Baptist church event honoring ‘God’s Rescue Squad’
- ‘Pocket drones’: U.S. Army developing tiny surveillance tools for the next big war
- Belgian cafe posts sign: Dogs allowed, but Jews stay out
- Gen. Dempsey: Pentagon studying Russian readiness plans not viewed ‘for 20 years’
- John McCain: Botched, two-hour execution of murderer is ‘torture’
- House GOP ready to move border bill
- Bomb squad called after live WWII artillery washes on Cape Cod beach
Spotlight falls on Sony’s troubled cybersecurity
Question of the Day
LONDON (AP) - Another massive data breach at Sony has left hackers exulting, customers steaming and security experts questioning why basic fixes haven’t been made to the company’s stricken cybersecurity program.
Hackers say they managed to steal a massive trove of personal information from Sony Pictures‘ website using a basic technique which they claim shows how poorly the company guards its users’ secrets. Security experts agreed Friday, saying the company’s security was bypassed by a well-known attack method by which rogue commands are used to extract sensitive data from poorly constructed websites.
“Any website worth its salt these days should be built to withstand such attacks,” said Graham Cluley, of Web security firm Sophos. Coming on the heels of a massive security breach that compromised more than 100 million user accounts associated with Sony’s PlayStation and online entertainment networks, Cluley said the latest attack suggested that hackers were lining up to give the company a kicking.
“They are becoming the whipping boy of the computer underground,” he said.
In a joint statement from Michael Lynton, Chairman and Chief Executive Officer, and Amy Pascal, Co-Chairman, Sony Pictures Entertainment on Friday night acknowledged the breach and said the company had taken action “to protect against further intrusion.”
“We have also retained a respected team of experts to conduct the forensic analysis of the attack,” the statement said. It did not go into details about specific actions that will be taken to prevent future security breaches.
It wasn’t clear how many people were affected. The hackers, who call themselves Lulz Security _ a reference to the Internetspeak for “laugh out loud”_ boasted of compromising more than 1 million users’ personal information _ although it said that a lack of resources meant it could only leak a selection on the Web. Their claim could not be independently verified, but several people whose details were posted online confirmed their identities to The Associated Press.
Lulz Security ridiculed California-based Sony for the ease with which it stole the data, saying that the company stored peoples’ passwords in a simple text file _ something it called “disgraceful and insecure.”
Several emails sent to accounts associated with the hackers as well as messages posted to the microblogging site Twitter were not returned, but in one of its tweets Lulz Security expressed no remorse.
“Hey innocent people whose data we leaked: blame Sony,” it said.
Sony’s customers _ many of whom had given the company their information for sweepstakes draws _ appeared to agree.
Tim Rillahan, a 39-year-old computer instructor in Ohio, said he was extremely upset to find his email address and password posted online for “the whole world to see.”
“I have since been changing my passwords on every site that uses a login,” he said in an email Friday. “Sony stored our passwords in plain text instead of encrypting the information. It shows little respect to us, their customers.”
He and others complained that they had yet to hear from the company about the breach, news of which is nearly a day old.
John Bumgarner, the chief technology officer for the U.S. Cyber Consequences Unit _ a research group devoted to monitoring Internet threats _ was emphatic when asked whether users’ passwords could be left unencrypted.
“Never, never, never,” he said. “Passwords should always be hashed. Some kind of encryption should be used.”
Bumgarner, who’s been critical of Sony’s security in the past, said the company needed to take a hard look at how it safeguards its data.
“It’s time for Sony to press the reset button on their cybersecurity program before another incident occurs,” he said.
Raphael G. Satter can be reached at: http://twitter.com/razhael
TWT Video Picks
By Mark Davis
The nation founders, the Lone Star State thrives
- Rahm Emanuel: Send illegal immigrant shelter kids to Chicago
- 'Pocket drones': U.S. Army developing tiny spies for the next big war
- Tactical advantage: Russian military shows off impressive new gear
- CURL: Obama, staffers not even pretending any more
- Pentagon running out of time to find mass of missing weapons in Afghanistan
- Family of Marine killed in Afghanistan pushes back against cover-up
- NAPOLITANO: What if our democracy is a fraud?
- Military bans troops from Baptist church event honoring 'God's Rescue Squad'
- WEST: Those who would rather join the jihadi army than their own nation's army
- Obama orders Pentagon advisers to Ukraine
Obama's biggest White House 'fails'
Celebrities turned politicians
Athletes turned actors
20 gadgets that changed the world
Fighting in Iraq