The Sony leak Scandal - What we know so far

In what has been one of the most momentous years in infosec ever - the Sony hack has topped everything. Although the Sony hack did not impact as many people directly as Apple's "goto: fail" bug or the Heartbleed exploit, the commercial and political ramifications of the attack on Sony have garnered more attention than any other attack - surpassing even the target attack in November 2013.

So - what do we actually know about the attack on Sony?

Back in June 2014, the North Korean government declared the Sony Pictures movie "The Interview" to be an  “undisguised sponsoring of terrorism, as well as an act of war” in a letter to UN Secretary-General Ban Ki-moon.

It's fair to say that most people ignored this as the ramblings of a government considered to be somewhat loose with what many people pass as sanity.

But then, on November 24, a group calling themselves the "Guardians of Peace" (or #GOP - get it, like the American Republican Party) took over the internal computer system at Sony, rendering the network useless and putting staff back in the 1970s as they tried to do their jobs with pens and paper.

The GOP also seized control of promotional Twitter accounts for Hollywood movies.
While this sounds a trifle annoying, of greater concern for Sony was that the hackers stole a massive trove of data - and they went public with it. A number of unreleased movies were shared over pirate move services and confidential emails were made public.

Aside from some interesting news about contract negotiations and employee salaries, we also learned that a number of Hollywood stars are a tad insecure and can get a little whiny.

The FBI conducted an investigation and blamed the North Korean government.

Of course, the North Korean government denies being behind the hack although they do think it was a "righteous deed". We suspect they're sitting back with tubs of popcorn, enjoying the "fun".

Apparently, all the fuss was caused by the as yet unreleased Seth Rogan and James Franco movie, The Interview, in which the supreme leader of the Democratic People's Republic of Korea, Kim Jong-un, is assassinated.

In response, movies theatres, worried that they would be targeted by terrorists if the released the movie, have said they won't be screening the movie - which was scheduled for release on Christmas Day.

Sony then pulled the release completely, drawing the ire of President Obama. Sony then said they had to pull it because no one would show it. However, they have backtracked on that having been called out by many public figures over free speech concerns, saying they will release the movie - we're just not sure how or when that might happen.

Along the way, the FBI's conclusion that this was a state-based attack on Sony has been questioned with the more likely culprit hacktivists. This is based on the proposition that state-based attacks tend to be more secretive and the language used in correspondence by the #GOP.

In summary - Sony was severely hacked resulting in vast swathes of data being made public. While there was some initial finger pointing at North Korea, we're not sure who really did it.
What we're all waiting for is "What's Next?".

When Christmas Day rolls around in North America, what will happen with Sony? There are several possibilities.

Sony will call the hacker's bluff and release The Interview into the public domain or via other channels for public distribution.

Read more: We can learn from the Sony hack

The hackers will release more, embarrassing information from Sony's network.

Everyone will enjoy their turkey and ham and nothing will happen.


Releases on 26th December about the Sony Hackers:

BBC .com : Sony comedy The interview opens Lena, Sony Hacker: 5 Fast Fact you Need to know Security firm says Sony hack might have been an inside job North Korea blasts U.S. over release of "the Interview"

The Australian: Doubts persist North Koreans responsible for Sony hack


This article is brought to you by Enex TestLab, content directors for CSO Australia.

Join CSO for the day@#csoperspectives and hear from @kimzetter @frankheidt @simplenomad Register today

Join the CSO newsletter!

Error: Please check your email address.

Tags terrorist attackshackGuardians of peace (GoP)CyberattackThe Interviewnorth koreasonyfbi

More about AppleCNNCSOEnex TestLabFBISony

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Anthony Caruana

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place