Sony finds no apparent Anonymous link to PlayStation attack

The Internet activist group had previously targeted Sony systems, but the most recent attack was not the group's work

Sony said it has found no link between an attack on its PlayStation Network and Qriocity services and Internet activist group Anonymous, which had earlier targeted its systems.

The online gaming and entertainment services were taken offline on April 20 after a "very sophisticated" attack on Sony's data center in San Diego, said Kaz Hirai, CEO of Sony's games subsidiary, at a Tokyo news conference. They are due to return to service later this week.

Less than two weeks before the most recent attack, Anonymous members launched a denial of service attack against the PlayStation Network in protest at Sony's legal pursuit of hacker George Hotz. Hotz had modified the firmware of a PlayStation 3 so that it could run the Linux OS. Sony claimed the software violated the U.S. Digital Millennium Copyright Act, which prohibits the reverse-engineering of encryption protections.

"While there may be no relation to this attack, the Sony network has also been targeted by the Internet group Anonymous," said Hirai. "In addition, the personal information on Sony's top management, including the names of their children, the schools they attend, and the names of other family members, has been published on the Internet. They have also called for protests outside Sony stores around the world."

"These kinds of cyberattacks may not be limited to Sony. To protect personal information and the safety of the network environment, Sony will cooperate with law enforcement and network security organizations to continuously combat illegal intrusions," said Hirai.

Hirai said the company hadn't been able to find any link between Anonymous and the latest attack.

The dispersed Internet-based group had already claimed it had nothing to do with the attack.

In a posting on a website titled "For Once We Didn't Do It," the group said its core had not targeted Sony or the PlayStation Network. But the denial left open the possibility that individuals from the group might have been responsible.

"While it could be the case that other Anons have acted by themselves AnonOps was not related to this incident and takes no responsibility for it," the statement said.

Hotz, the hacker targeted by Sony, also denied any link with the attack.

"I'm not crazy, and would prefer to not have the FBI knocking on my door," he wrote in a blog post. "Running homebrew and exploring security on your devices is cool, hacking into someone else's server and stealing databases of user info is not cool."

At present, the identity of the hacker or hackers behind the attack remains a mystery.

Sony said there is a high possibility the hacker stole personal information on millions of registered uses, but it has found no evidence that a database of credit card numbers was accessed. If true, that appears to rule out a financial motive behind the attack.

When asked by a reporter for his opinion on a motive behind the attack, Hirai said he could not speculate on the motive.

Martyn Williams covers Japan and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is

Join the CSO newsletter!

Error: Please check your email address.

Tags Handheldssecuritypspdata breachgamesonline servicessonyPS3Sony Computer EntertainmentintrusionGame platforms

More about etworkFBIIDGLinuxSony

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Martyn Williams

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place