backtop


Print 60 comment(s) - last by BansheeX.. on Jun 7 at 8:01 PM

Another day, another SQL injection exploit

Just when Sony appeared to be getting back on the right track with the full restoration of its PlayStation Network, LulzSec struck again hitting Sony right between the eyes. The group once again used an SQL injection tactic to gain access to the Sony Pictures account database.

This time around, LulzSec manage to obtain:   

  • 1 million user accounts (including passwords, email and home addresses, and data of birth)
  • All admin account details and passwords
  • 75,000 music codes
  • 3.5 million music coupons

In addition, there was even opt-in data that was accessible, which gives even more information about Sony's customers and their preferences.

The part that amazes LulzSec (and us for that matter) is that fact that Sony stored all 1 million user passwords in simple plain text files -- no encryption whatsoever was used. "It's just a matter of taking it," stated LulzSec in a press release. "This is disgraceful and insecure: they were asking for it."

The group went on to express its disdain for Sony and its security practices (or lack thereof): 

Our goal here is not to come across as master hackers, hence what we're about to reveal: SonyPictures.com was owned by a very simple SQL injection, one of the most primitive and common vulnerabilities, as we should all know by now. From a single injection, we accessed EVERYTHING. Why do you put such faith in a company that allows itself to become open to these simple attacks? 

LulzSec has provided evidence of their latest "Sownage" on its site, which can be accessed here.



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

Sony Press Conference in 5, 4, 3, 2, 1..... Lol
By bgm063 on 6/2/2011 6:46:01 PM , Rating: 2
Okay, I don't know if we'll be seeing one soon, but they really need to apologize to the hacker community or somebody because Sony is looking more and more like a bunch of fools here with each new hack...




RE: Sony Press Conference in 5, 4, 3, 2, 1..... Lol
By JakLee on 6/2/2011 6:50:44 PM , Rating: 4
ok - this went from Funny that Sony was so pathetically protected and got kicked in the face, to disgusted that they were so shoddy and angry at these types of things happening, back to funny. How bad can this get? Everytime I look Sony is back to dropping something..... this is like one of those accidents that is horrible yet you can't stop watching....


By phatboye on 6/2/2011 8:23:42 PM , Rating: 5
What I don't get is why don't they just take down everything with user info on it. Don't put it back up until there is a security review.


By geddarkstorm on 6/3/2011 5:13:20 PM , Rating: 3
Obviously their common sense was hacked and stolen a long time ago.


By wvh on 6/4/2011 1:15:04 PM , Rating: 2
I'm a sys/network admin and used to work as security consultant doing penetration testing. Checking shitloads of crappy code spread over many systems and services takes a long time. We shouldn't doubt the quality of the code that gets Sony hacked over and over again isn't exactly top-shelf. Wading through other people's code – produced by some out-sourcing, uncaring and unrelated company that was pressed for time and eager for the pay check – isn't easy. You need to analyse the architecture, the network, the setup of individual systems and their services and daemons, the code itself including the choice of libraries and frameworks, and all this in different languages on different operating systems written by different (in general mostly incompetent) people.

That's not mentioning it might be easier to get access by hacking the systems yourself than to find out who legitimately can give you access to which systems and networks. It wouldn't be the first time that all employees that worked on the systems have left, the out-sourcing company that built them doesn't exist anymore, and no manager remembers anything about any setup or passwords.

Unplugging and redoing everything isn't exactly a 5 minute job, so I guess Sony – being focussed on making profit – doesn't want to put down all of their services for an indefinite amount of time.


By Darkefire on 6/2/2011 7:20:37 PM , Rating: 3
Forget a press conference, given the events of the past couple of months I wouldn't be surprised if they had their entire IT staff commit seppuku on national TV. This is Network Security 101, storing passwords and user info as plain text is about as secure as leaving a key under the doormat or putting the valet key to your car in the (unlocked) glove compartment.


By danobrega on 6/2/2011 8:37:57 PM , Rating: 5
IT is not responsible for sql injection vulnerabilities. Its the web and db development teams fault.


By vision33r on 6/2/2011 8:56:28 PM , Rating: 1
It is IT's fault. Since they are the gatekeepers.


By RadnorHarkonnen on 6/2/2011 10:01:34 PM , Rating: 2
Its not the fault of IT,DB or Web Dev. As i said before Sony is a mesh of (outsourced) companies. Different companies probably did the different parts of the web site/DB/network and systems infrastructure. And i bet they did it according to Sony requests.

Encrypted data ? Adds too much overhead on multi-sites, whether its a replication, backups or just IO. You save on CPU,HDD and RAM. Weak Security ? Lousy contract.

They entered by a simple SQL injection. Afterwards they just went nicely through the network and systems infrastructure and basically downloaded everything in plain text. Sony just saved major dollars on R&D(DB,Web), deployment and infrastructure (network and systems) and maintenance (Network/Systems/DB/Web).

IT are the gatekeepers yes, but i believe there is none in this case. You might have one problem, a crack on your armor in one point, but from what I've read, Sony had no armor. This was almost child's play.



By EricMartello on 6/3/2011 1:34:22 AM , Rating: 4
SQL Injection attacks can be avoided with simple input scrubs on the data. Anyone running a popular website should be sanitizing user input fields and stripping unauthorized commands.

When I program a site that accepts user data, I use a simple exclusion process where the data for the particular field must conform to a specific format else it is rejected. So for example, the ZIP code field could be like 10 alphanumeric chars only, and everything else would return an error.

It's not really hardcore security that will cause overhead...it's common sense.


By RadnorHarkonnen on 6/3/2011 4:30:54 AM , Rating: 2
I a am more a Network and sys admin, but as far as i know, web implementation on a larger scale is segmented on different "sites" with different "parts" of the site in a layered approach. One of the reasons we do this is to load balance between "sites" and another is security. You can't Query/DDoS the total DB/Web, because of its layered approach.

I've been a sys admin for some time now, or working indirectly through various forms, and honestly while attacks are quite frequent, never had this type of problems. And surely not this massive.


By EricMartello on 6/3/2011 6:40:20 AM , Rating: 2
Load balancing happens on the back end, and smart companies would use a reverse proxy like nginx...but that is the infrastructure level and SQL injection is an application level attack.

SQL injection is an exploit within HTML code and the server's particular script engine (i.e. PHP,ASP,CF) where the hacker can actually use non-santized input fields to execute arbitrary SQL queries.

For example, if you have a field for "first_name" on a web form which gets POSTed to the server, the value of "first_name" could be an arbitrary SQL query if the data is not cleaned by the application first, simply by issuing a command that tells the script to execute only the submitted "hack" code while ignoring the actual remaining code within the script. Since all script engines have standard SQL functions built in, that's how you can access passwords and dump the entire database.


By inighthawki on 6/2/2011 8:48:21 PM , Rating: 2
No, it's more akin to placing the key next to the lock with a large sign that says "KEY HERE ->"


By Samus on 6/3/2011 1:15:51 AM , Rating: 3
Or just leave the key in the lock like Homer Simpson asking to get hit by the Cat Burgler!


By RW on 6/2/2011 7:22:51 PM , Rating: 1
Once I did asked myself why is SONY in such a big trouble ?
Then I realized why, the fact is that when you're meshing with the bests the bests are meshing with you, that's why.


By icanhascpu on 6/3/2011 4:44:27 AM , Rating: 2
Really? We're gonna equate this to terrorism now? LOL

Showing people how shitty and how little Sony cares about your vital information. I guess that IS a terror to some ignorant saps.

But to a degree I agree; Sony need not sorry it up to anyone on the scene, they should be saying sorry to their consumers. As it is I know people are going to boycott sony even more than ever, and they have good reason.

The truth will out.


By Reclaimer77 on 6/3/2011 12:16:19 PM , Rating: 2
As far as I know, there is no law that puts the blame on Sony here. You COULD argue negligence, but again, there are no legal standards for required security. Hacking and stealing private information, is of course, illegal. This is a no brainer.

Sony is most certainly being terrorized by this group, how you can look at it any other way only shows bias.

What should Sony apologize for exactly? Being hacked? Having exploitable security? Technically there is no such thing as a hack proof system if it's connected to the Internet in any way.

This is just more anti-corporatism. If Sony was a small company, they would be pictured as the underdog being kicked around by the mean old hackers. But because Sony is a multinational conglomerate, the hackers are almost looked upon as vigilantes for truth and justice, and Sony the big bad fatcat who needs to be taken down a few pegs.

Hacking is illegal, and this group has hurt millions of innocent individuals who have NOTHING to do with Sony or their quarrel with them. Any other opinion is simply wrong.


By JDHack42 on 6/3/2011 1:45:55 PM , Rating: 1
quote:
As far as I know, there is no law that puts the blame on Sony here.


Look up SAS70 audit standards. These apply to data centers. Now if the servers were hosted outside the US, maybe the standards don't apply.


By geddarkstorm on 6/3/2011 5:22:53 PM , Rating: 2
There's a difference between things being impossible to hack proof and someone making it through your best defenses with some clever tricks; and simply NOT HAVING DEFENSES.

There WAS no security to speak of, that's the point. Here we consumers are, being forced to give out private information so we can use the company's resources, and that company is doing nothing to safe guard this information which could be used to compromise other more important accounts. This is gross negligence. How easy would it be for another amoral company, or country, to steal this information quietly and use it for their gain, without anyone noticing? Lulz announced it on purpose, to get Sony to actually protect its stuff.

Heck, you can encrypt files on your home computer with three or four simple clicks under Windows 7. Sony has no excuse of any sort to leave such important personal data in plain text.


By The Raven on 6/3/2011 10:34:13 AM , Rating: 1
quote:
They shouldn't negotiate with terrorists. It gives them credibility

Umm... these attacks give them credibility. Sony is the one without credibility.

Go out there and give 110% while you are at it lol.


By chick0n on 6/3/2011 8:02:11 AM , Rating: 2
why would they need to apologize to them ?

so if some serial killer keep killing people, nobody knows who he/she is, he/she is running loose all the time and challenge everybody with a "catch me if you can," we should beg/apologize to them saying that "oh please don't kill anymore, we're sorry that we're trying to catch you"

Sony is a bitch I know, but that does not mean these people have to right to do all these shit.

What Sony did wrong was they hired a bunch of idiots who can't secure shit. maybe they should hire me instead, I'm sure I know how SQL injection works and I'm sure I will encrypt all passwords and crap.


"It's okay. The scenarios aren't that clear. But it's good looking. [Steve Jobs] does good design, and [the iPad] is absolutely a good example of that." -- Bill Gates on the Apple iPad














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki