The Week in Hacking

This week has seen a number of incidents related to hacking and the unauthorized access of information. In some cases, personal information has been compromised, in others, system administrators were able to take their networks down before anything was badly damaged. Following the recent PSN hack, which brought down Sony's systems for over a month and put many users' payment information and personal details at risk, the public eye is very much on hacker activity -- so here's a summary of what's been going on this week.

Bethesda Site Latest Target for Hackers

On Monday, the Skyrim publisher reported a recent intrusion that nabbed a bunch of users' data, including 200,000 Brink accounts, but hacker collective LulzSec was more than happy to give out the details

LulzSec Topples EVE Online, Escapist Magazine, Minecraft and League of Legends Servers

On Tuesday, LulzSec went on a rampage, encouraged by "fans" on Twitter, and took down a number of high-profile targets, including EVE Online's login server and website, The Escapist's website, Minecraft's login servers and League of Legends.

Sony Delayed Informing Customers Following PSN Breach

On Wednesday, it was revealed that Sony knew about users' information being compromised a little earlier than they had previously admitted.

CCP Updates Players on LulzSec EVE Online Hack

Also on Wednesday, publisher-developer CCP issued an official statement regarding LulzSec's hack of EVE Online...

LulzSec Continues to Harass the Internet, Takes EVE Down Again

...following which, the group crippled EVE Online's login servers again while harassing a number of other companies using phone forwarding.

Hack of the Day: BioWare's Decade-Old Neverwinter Nights Forum

On Thursday, it was reported that a number of EA accounts had been compromised via BioWare's decade-old forum that was originally put in place to allow the Neverwinter Nights community to communicate and collaborate. LulzSec didn't appear to be involved, as at the time members of the group were releasing 62,000 user ID and password combinations for a variety of sites to the public.

Hack of the Day: Sega Hit By Unknown Intruders

On Friday, Sega reported that a number of Sega Pass forum accounts had been compromised. LulzSec claimed not to be involved, and offered its services to the company to track down and exact a hackers' revenge on the culprits.

Who Are LulzSec and What Do They Stand For?

Also on Friday, LulzSec issued a lengthy statement explaining their actions throughout the week and showing no remorse for their actions. Ostensibly, their point was to highlight how flawed many companies' Internet security was, but they also explained that they indulged in this behavior for "entertainment" purposes.

That's the week to date. Hacking activity has been growing a great deal in the past few weeks since Sony's high-profile security breach. Be sure to keep yourself safe online by using different passwords for different sites; using secure passwords that include mixtures of upper and lower case letters, numbers and symbols -- especially on sites that store your payment information such as Amazon and PayPal; and consider setting up dummy email addresses for publicly-accessible accounts to help keep your private email private.

This article originally appeared on as The Week in Hacking

Join the CSO newsletter!

Error: Please check your email address.

Tags segasecuritybiowaregamesBethesda SoftworkssonyCulture

More about Amazon Web ServicesPayPalSegaSony

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Pete Davison

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place