Sony Systems Alleged Breached By Hackers

A lesser known hacking group has claimed on the dark web that it has breached ‘all Sony systems’ and will sell the stolen data, amid media reports Sony is refusing to pay a ransom.

According to the reports, the hacking claim comes from a group called Ransomed.vc, which seems to be a ransomware operator and a ransomware-as-a-service organisation that is reportedly based in Russia and Ukraine.

Sony is no stranger to cybersecurity incidents. In November 2014 Sony Pictures was famously hit by a devastating attack by North Korean hackers, in retaliation for the film “The Interview” – a Seth Rogen comedy about a plot to kill to the leader of North Korea.

Sony hack?

That 2014 hack was so devastating it exposed the personal details of some Hollywood movie stars, as well other highly confidential data.

Prior to that, Sony’s most serious hack had been in 2011 that saw some 77 million registered accounts compromised and online features totally inoperable. That attack on the Playstation Network took it offline for a week.

Now Ransomed.vc is alleging that it has hacked Sony systems, and will publish the stolen data over claims that Sony will not pay a ransom.

At the time of writing, there is no public statement from Sony on the claims from Ransomed.vc.

Hackers track record

The Ransomed.vc allegations of compromising Sony has been noted by some security experts.

“Until Sony provides further information, it is not clear if this breach took place, but the warnings from Ransomed.vc should never be ignored,” said Ryan McConechy, CTO of managed cyber security service provider Barrier Networks.

“Ransomed.vc may be less known than major ransomware gangs like Cl0p or BlackCat, but when looking at the group’s history, they are responsible for a string of devastating attacks on financial organisations, data providers and managed IT companies,” said McConechy.

“Furthermore, making false announcements on victims is something ransomware gangs avoid as it damages their reputations and profitability opportunities, so there is a strong possibility the claims are genuine, which means they must be investigated thoroughly,” said McConechy.

“If the incident has taken place, it once again highlights the powerless position organisations are placed in when infected by ransomware,” said McConechy. “Regardless of whether the organisation’s data is encrypted and held hostage, or stolen and put up for sale, it’s the attackers that have the power.”

“This means organisations must prioritise defences before attacks occur,” said McConechy. “This means training employees on the techniques criminals use to access systems, keeping all systems up to date with the latest patches, running a regular back up system, layering security and implementing network segmentation to prevent ransomware from spreading.”

“Furthermore, it is also advised that organisations take the average ransomware sum likely to be demanded from them in the event of a compromise – then use that figure as their budget for investing in adequate defensive tooling,” McConechy concluded.

Truthful claim?

Meanwhile Mike Newman, CEO of identity and access management specialist My1Login, noted that this is a worrying claim that must be investigated as a priority, because in most cases when attackers claim to have breached an organisation, they are being truthful.

“Furthermore, as we have seen over the last few weeks, carrying out ransomware attacks on large and seemingly secure organisations is fairly easily for a determined attacker to execute, especially via social engineering or by exploiting an unpatched vulnerability,” said Newman.

“If the claims are accurate, it is essential Sony takes remediation action immediately,” said Newman. “This includes running forensics to understand what data has been stolen and then working to reduce its value by updating systems. Additionally, Sony must also inform impacted parties so they can be on guard for phishing scams and be alert for further attacks.”

“The incident will also act as a reminder to educate employees on the serious risk posed by cybercrime today and the need for them to be vigilant for attacks,” said Newman.

“This means being on guard for phishing and social engineering scams, and also improving corporate defences by removing credentials from the hands of employees,” Newman added.

“With phishing and social engineering, the key focus for attackers is to steal valid user credentials so they can achieve deeper corporate network access, but if these are removed from employee hands, they can’t be tricked into handing them over to criminals,” Newman concluded. “This can be achieved by adopting modern Single Sign-On and Enterprise Password Manager tools which securely remove the need for employees to memorise or manage passwords.”

Tom Jowitt

Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut...

Recent Posts

OpenAI Tests Search Engine Prototype Called ‘SearchGPT’

Google's dominance of online search is being challenged, after OpenAI unveiled a search prototype tool…

15 hours ago

Elon Musk To Discuss $5 Billion xAI Investment With Tesla Board

Conflict of interest? Elon Musk to talk with Tesla board about making $5 billion Tesla…

19 hours ago

Amazon Developing Cheaper AI Chips – Report

Engineers at Amazon's chip lab in Austin, Texas, are racing ahead to develop cheaper AI…

1 day ago

Apple Smartphone Sales In China Drop 6.7 Percent, Canalys Finds

China woes. Apple's China smartphone shipments decline during the second quarter, dropping it down into…

2 days ago

Meta Ordered To Clean Up AI-Generated Porn By Oversight Board

Oversight Board orders Meta to clarify rules over sexually explicit AI-generated images, after two fake…

2 days ago