backtop


Print 56 comment(s) - last by BansheeX.. on May 25 at 4:36 AM


Another day, another Sony site hacked.  (Source: The Hacker News)
This time the stolen Sony database is from a Greek Sony property

It's hard to fathom how a company as big as Sony Corp. (6758) could have such porous defenses, as the events in recent weeks have unfolded.  Since late April, Sony has experienced a complete loss of customer records from its two largest international databases -- the PlayStation Network (PSN) database and the Sony Online Entertainment (SOE) database.  

Last week, the PSN network was briefly reactivated and then shut down after yet another security flaw was discovered.  And Japan announced that it would not be allowing Sony's online services to restart in its nation until the company showed proper proof that it had significantly improved its security.

Now yet those pesky hackers have compromised another Sony online property.  
 

I.  Third Sony Database Breached

This week a poster dumped a pretty interesting archive to text sharing site pastebin.  The record appears to contain a dump of the user database from Sony BMG in Greece.

Included in the post are usernames, real names, and email addresses.  

The post was eventually attributed to The Hacker News, who says they received the information from a hacker who goes by the handle "b4d_vipera".  The hacker appears to have redacted the information from certain fields, including password, telephone number, and user's company, though they claim to have this information.

In total 8,385 records were lost from SonyMusic.gr -- the website of Sony BMG in Greece.  The breach occurred May 5.

The attack was accomplished via an SQL Injection attack, a type of attack that first originated in the 1990s.  SQL Injection attacks are most commonly used on large entities with multiple websites.  The attacker finds SQL databases on various sites of the target and then tests them by sending strings that may be mishandled by the SQL Interpreter, allowing forbidden commands to be executed.

It is unclear whether the only Sony BMG in Greece was vulnerable or whether Sony BMG sites in other nations could have been vulnerable as well.

Security software and services vendor Sophos gave some interesting analysis on the breach in their Naked Security blog.   The blog suggests that the negligence likely wasn't the fault of Sony's engineers on the design side.  Writes Sophos's Chester Wisniewski:

As I mentioned in the Sophos Security Chet Chat 59 podcast at the beginning of the month, it is nearly impossible to run a totally secure web presence, especially when you are the size of Sony. As long as it is popular within the hacker community to expose Sony's flaws, we are likely to continue seeing successful attacks against them.

But Mr. Wisniewski says that Sony could have avoided these issues if had hired experts to do thorough penetration testing (fake attacks that look to simulate a malicious user to find and fix vulnerabilities).  He writes:

The lesson I take away from this is similar to other stories we have published on data breaches. It would cost far less to perform thorough penetration tests than to suffer the loss of trust, fines, disclosure costs and loss of reputation these incidents have resulted in.

He says that while Sony obviously is suffering from the barrage of attacks, at the end of the day it may be forced into having the most secure design on the market, much like Windows OS maker Microsoft Corp. (MSFT).  He comments, "While it's cruel to kick someone while they're down, when this is over, Sony may end up being one of the most secure web assets on the net."

II. The Cost to Sony

Richard Scott, a contributor of iconic infographics to BBC News and The New York Times, has set his sights on Sony with his latest graphic.  It depicts an estimated cost to Sony of $24B USD.

That estimate comes from research by The Ponemon Institute, a data-security research firm, who found that on average in 2010 a data breach cost a company $318 USD per lost record in security, user protection, and legal costs.  That represents a 48 percent increase from 2009.

Forbes suggests the $24B USD figure, but that's only
considering the PSN breach.  With the 24 million record SOE breach added in, the figure soars to $32.1B USD.

Sony is being conservative in its own cost estimates.  Its financial filings have indicated that the intrusions are clearly taking their toll on the company -- it went from predicting a ¥70B ($855M USD) profit for the year to now predicting a ¥260B ($3.14B USD) loss [source; PDF].  Sony blames much of that estimated loss on the earthquake (¥22B) and other factors.

The company say its expects only to have to pay ¥14B (about $172M USD) for the PSN intrusion.  This puts its expected expense per lost record at about $2 USD per account.

It seems Sony may be a bit too optimistic here.  If the industry average is $318 USD per lost record, it'd be extraordinary for Sony to get away with only paying $2 USD per record.

In 2010 Sony made $77.5B USD in revenue, with a $289M USD profit.  If it was forced to pay a $32.1B USD in total (based on the industry average) for the breaches it could end up with a net loss of $35B USD or more for this year.

A $35B USD loss would be equivalent to approximately half the company's annual revenue and equivalent to over 10 years in profit from relatively "good" years.  It remains to be seen exactly how dire the financial situation for Sony gets, but one thing's for sure -- the picture isn't pretty.

Sony is currently facing multiple class action lawsuits in the U.S. and abroad from former customers.



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

By Reclaimer77 on 5/23/2011 12:15:48 PM , Rating: 0
quote:
Companies need to remember it doesn't matter how "bad" or "evil" they think hackers are, at the end of the day, if those hackers despise your company due to your actions and have the talent to break your defenses, that's all that matters.


Hacking is illegal. I don't like this statement because it seems you are giving legitimacy to these "hacking communities".

Sony's security procedures were awful and their network hierarchy something a first year Cisco student would laugh at. These are the lessons Sony should learn, not being afraid of being "despised" by criminals.

I'm sure just as many have tried hacking X-Box live and have failed, not because Microsoft is "nice" to hackers, but simply because they aren't incompetent monkeys beating rocks together when it comes to security and intrusion detection.


RE: I would normally feel sympathy for the company
By Conner on 5/23/2011 1:21:10 PM , Rating: 2
quote:
Hacking is illegal. I don't like this statement because it seems you are giving legitimacy to these "hacking communities".

and Robin Hood was a tyrant.....

Not everything is cut-and-dry. I'm for people governed by people, not EULAs!


By liem107 on 5/23/2011 4:20:18 PM , Rating: 2
Nothing is a clear cut but maybe Robin did not resell users personnal details and credit cards details for his personnal enrichment...but how in this case did the hacking benefit to sony s clients? This hacking is purely criminal and this is a clear cut.


"We are going to continue to work with them to make sure they understand the reality of the Internet.  A lot of these people don't have Ph.Ds, and they don't have a degree in computer science." -- RIM co-CEO Michael Lazaridis














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki