What was the nature of the attack? Trojan? Modified/hacked real application? Web-based drive-by? USB drive infection?
What was its introduction vector - network, human, etc.?
Is it Windows-specific really -- i.e. an executable that only runs on Windows? Or is it only that it's presently tuned to Windows and could be readily tuned for Linux or Mac?
Was the damage at Sony done to the hard drives (hardware) or the drive format structure (filesystem) or the data stored in the filesystem (files, databases)?
Without more info, this is just a nebulous scary "Look out!" of little value....
the warning should be how destructive the morons in the fed govt are.
http://www.reuters.com/article/2014/12/02/us-sony-cybersecurity-malware-idUSKCN0JF3FE20141202
It seems to be more of a "Look out!" Scare tactic than anything else. I can't find out anything either. I know that Sony uses it's own Windows' based computers, not Macs, being competitors with Apple, so the exploit had to be on that platform. . . unless it was a server based exploit. I don't know what type of server they use.