Posted on 12/13/2014 8:35:22 PM PST by TigerLikesRooster
Sony Hackers Leak New Data, Threaten Christmas Gift To Put Studio In Worst State
Movies | By Linda Ge on December 13, 2014 @ 2:53 pm
Latest data dump, the seventh, related to Sony streaming site Crackle
The Sony hacking continues to unfold as the group calling itself the Guardians of Peace have released another bundle of data obtained from the studios computer files, and issued another warning.
We are preparing for you a Christmas gift, reads the message. The gift will be larger quantities of data. And it will be more interesting. The gift will surely give you much more pleasure and put Sony Pictures into the worst state.
(Excerpt) Read more at thewrap.com ...
Judged by the grammar of the threat Id have to say that the hackers are Chinese.
just curious, is anybody really that upset that this is happening to a Hollywood studio?
Ah! So!
Not I. It is delicious when this happens to the self-important and special people who look down on the rest of us.
Aside from the fact that employee’s SS#s have been compromised and “innocent” people may lose jobs due to studio financial losses, I am enjoying the schadenfreude.
Or North Korean.
So ronry. Me love you long time.
all your data are berong to us
Well, yes, I find it sort of upsetting. Sony is a global company, I mean they are HUGE (and series too!). But they were not able to prevent this cyber attack.
I don’t really care about them, but it makes me feel rather insecure. Were they that sloppy? Who else is sloppy? My bank?
You know what I’m saying?
They used to hang horse thieves. Hackers should meet the same fate.
Now I’m curious - what’s “the worst state?”
The CLAWS are out!
http://i.dailymail.co.uk/i/pix/2014/12/13/23FE98FF00000578-2872464-image-a-67_1418458181707.jpg
Look at Angelina Jolie claw er... hand.
To me, the worst state is Massachusetts...but that’s just me.
They keep saying it was “malware” but that typically refers to viruses (that disable parts of a computer/data) or programs that use other peoples’ computers as “zombies/drones/slaves” to do other things elsewhere.
This was data (financial data, communication data, and intellectual property (i.e. FULL movies online)) that was COMPROMISED.
It was hacking more than it was “malware” infection.
E-mail viruses can hand control in multiple layers of systems (application, kernel, etc.) to crackers at specific and repeated times. They can open more ports, set up relays and do all kinds of evil. Some spoke of hints that some North Koreans are behind it.
They sounded pretty sure it was the North Koreans
Probably not... Until some a**hole in government conjures up some bulls*** law that ends up screwing the citizenry while professing to “address the issue”.
Malware and viruses are not the same. Viruses are intended to be very difficult to remove and tend to be destructive of their hosts. Malware is intended to be difficult to detect and provides vectors for attack through known open ports on a machine.
What happened to Sony started off by someone opening an email attachment or being redirected to a malware-laden website. Once the infection was established, it starts to scan its network for other vulnerable machines. For instance, one of the big vectors for infection now are XP machines due to their lack of patching and relative ubiquity in some workplaces for legacy applications. If those XP machines are connected to a non-sequestered VLAN or otherwise permitted full access to the Internet, they become prime candidates for trojan horses.
Fact is that viruses are becoming less popular. Almost everyone makes some sort of virus scanning and heuristics engine to spot the telltale signs of a virus. To circumvent that, malware is now a voluntarily-installed piece of software that purports to be a necessary plugin for a website or otherwise takes advantage of a user’s ignorance. Once the malware is established, it spreads quickly because virus scanners are not searching for malware, they’re searching for viruses. Malware is being used everywhere for espionage and acts as the raft upon which the bad guys float into most organization’s well-guarded systems.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.