backtop


Print 30 comment(s) - last by thurston.. on Apr 30 at 12:15 AM


Customers who registered with the PlayStation Network have had their names, addresses, usersnames, passwords, and possibly credit cards stolen. Sony waited a week before telling the public.
Customer addresses, passwords, usernames, and emails -- and possibly credit cards -- were all taken

Sony Computer Entertainment America LLC is facing a firestorm of criticism following its admission that it handed the management of its PlayStation Network (PSN) to a smaller services provider, Qriocity, who apparently had appallingly bad security, allowing a massive loss of customer data.

In total users' names, usernames, and addresses were all lost.  They also lost users' passwords, indicating that their passwords may not have been hashed -- or at the very least weren't salted (a cryptographic technique to increase the difficulty of a foreign party reversing a hash).

Sony also says that credit card info may have been lost, though it says it isn't sure.

In an update the company admits that it waited an entire week before telling customers that it had lost their info.  The company writes:

There’s a difference in timing between when we identified there was an intrusion and when we learned of consumers’ data being compromised. We learned there was an intrusion April 19th and subsequently shut the services down. We then brought in outside experts to help us learn how the intrusion occurred and to conduct an investigation to determine the nature and scope of the incident. It was necessary to conduct several days of forensic analysis, and it took our experts until yesterday to understand the scope of the breach. We then shared that information with our consumers and announced it publicly this afternoon.

Some in the U.S. government have taken notice and they're not happy.  Senator Richard Blumenthal (D-Connecticut) is "demanding answers" from Sony.  He writes [press release], "When a data breach occurs, it is essential that customers be immediately notified about whether and to what extent their personal and financial information has been compromised. Compounding this concern is the troubling lack of notification from Sony about the nature of the data breach."

The loss of credit card info is particularly disturbing.  If the information is used to commit fraud, there's a strong likelihood that at least some customers' scores with the three major U.S. credit bureaus -- Equifax, Experian and TransUnion -- will be damaged. In cases of identity theft, the bureaus are supposed to work with individuals to fix their file and cleanse their record, but that process can take years and much grief.

Some suspect that members of the loosely organized 4Chan affiliated hacker group "Anonymous" may be behind the data theft.  Anonymous members had been organizing over IRC impromptu distributed denial of service raids on Sony's online properties in the wake of the company's recent lawsuit against George "GeoHot" Hotz.

Stealing customers' data seems out of character for most members of Anonymous, but it's important to remember that the group is very loosely organized and that its members have a wide range of philosophies when it comes to security and computer crime, so anything is possible.

Sony even writes:

4. Is the attack by “Anonymous” or another party?

We are currently conducting a thorough investigation of the situation. Since this is an overall security related issue, we cannot comment further at this time.

The company has a FAQ page that outlines many questions people might have and answers.  For example, it writes:

3. Why was Sony not prepared for a compromise of its network?

We are currently conducting a thorough investigation of the situation. Since this is an overall security related issue, we cannot comment further at this time.

It appears that international users, including those in the European Union, may also be affected.  Sony Computer Entertainment Europe's blog carried a press release announcing the breach, similar that in the U.S.



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

Thank god we have political internet experts
By MrTeal on 4/27/2011 10:21:04 AM , Rating: 2
quote:
"When a data breach occurs, it is essential that customers be immediately notified about whether and to what extent their personal and financial information has been compromised. Compounding this concern is the troubling lack of notification from Sony about the nature of the data breach."


I agree with this top senator; as soon as Sony knew there was a breach, they should have ran a sudo ls -stolen_data to get a complete list of all in the information that was taken, and then notified their customers. That whole thing about having to bring in investigators to actually determine what was breached, how severely, and what information might have been compromised is just a bunch of corporate hooey to distract people from them just being too lazy to let people know.

I heard Kim Jong Il is an internet expert too, maybe Senator Blumenthal could team up with him to get to the bottom of this.




RE: Thank god we have political internet experts
By Lanister on 4/27/2011 11:16:26 AM , Rating: 2
I am not being sarcastic and am really asking. I thought you could tell what users access what servers and if a DB or file was accessed and or copied? Hell my wife can tell if I looked at porn the last week I would think they could tell if the server was accessed right?

I am sure its not as simple as entering in a command but it should be possible to know if hackers got into the DB or server that stores the customer CC info fairly easily right?

The company I work for accepts CC's and we spend a lot of time and money reviewing all our systems to make sure we are PCI compliant, I would have to assume that Sony did also which would mean that the info is encrypted as one of the requirements is that all data at rest needs to be encrypted.


RE: Thank god we have political internet experts
By Taft12 on 4/27/2011 1:13:26 PM , Rating: 2
quote:
The company I work for accepts CC's and we spend a lot of time and money reviewing all our systems to make sure we are PCI compliant, I would have to assume that Sony did also which would mean that the info is encrypted as one of the requirements is that all data at rest needs to be encrypted.


Why would you assume this? Everything we've heard so far points to Sony NOT having done things "the right way"


RE: Thank god we have political internet experts
By Lanister on 4/27/2011 1:53:31 PM , Rating: 2
Good point, I had thought that being PCI compliant was a requirement; a quick Google search shows that it is voluntary.

Sony will not be trusted with my personal info anymore. Think I may get a prepaid CC I can just load funds onto to use for my online shopping from now on.

Now that I think about it, are the passwords stored for this site encrypted??


By Kurz on 4/28/2011 10:26:36 AM , Rating: 2
The password question I use a very simple password for my account here. Then I use more complicated passwords for my bank accounts, online shopping, anything dealing with money.


By Solandri on 4/27/2011 4:03:21 PM , Rating: 2
quote:
I am not being sarcastic and am really asking. I thought you could tell what users access what servers and if a DB or file was accessed and or copied? Hell my wife can tell if I looked at porn the last week I would think they could tell if the server was accessed right?

SOP in any sophisticated break-in is to modify the logfiles to remove any trace of the break-in. Like editing the surveillance video of the liquor store you just robbed to remove any trace of the robbery.

The work-around for this is to have duplicate logfiles created on another machine over the network (a secret VCR in the back room which generates a second duplicate surveillance video). But I would say that's the exception rather than the norm.


"If you look at the last five years, if you look at what major innovations have occurred in computing technology, every single one of them came from AMD. Not a single innovation came from Intel." -- AMD CEO Hector Ruiz in 2007














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki