New Evidence Claims ‘Sony’ Hack May Have Been An Inside Job

Published: Tuesday 30th Dec 2014 by David

Video In-Article Ad (Desktop)
mathew-knowles-that-grape-juice-2014-destinys-child

Video In-Article Ad (Desktop)

Last week, music mogul Mathew Knowles could be forgiven for blaming North Korea for exposing his plans to produce a Destiny’s Child movie for the big screen with their latest enemy, ‘Sony Pictures.

Video In-Article Ad (Desktop)

However, thanks to a Shonda Rhimes– flavoured plot twist unveiled today, evidence now claims that the recent hacking of Sony’s database was carried out by…Sony.

Video In-Article Ad (Desktop)

Full story below…

Video In-Article Ad (Desktop)

Video In-Article Ad (Desktop)

Video In-Article Ad (Desktop)

‘The Security Ledger’ reveals:

Video In-Article Ad (Desktop)

Researchers from the security firm Norse allege that their investigation of the hack of Sony has uncovered evidence that leads, decisively, away from North Korea as the source of the attack. Instead, the company alleges that a group of six individuals is behind the hack, at least one a former Sony Pictures Entertainment employee who worked in a technical role and had extensive knowledge of the company’s network and operations.

Video In-Article Ad (Desktop)

 

Video In-Article Ad (Desktop)

If true, the allegations by Norse deal a serious blow to the government’s account of the incident, which placed the blame squarely on hackers affiliated with the government of the Democratic Peoples Republic of Korea, or DPRK. That accusation, first aired last week, has been the source of heated rhetoric from both Washington D.C. and Pyongyang, the North Korean capital.

Video In-Article Ad (Desktop)

Speaking to The Security Ledger, Kurt Stammberger, a Senior Vice President at Norse, said that his company identified six individuals with direct involvement in the hack, including two based in the U.S., one in Canada, one in Singapore and one in Thailand.  The six include one former Sony employee, a ten-year veteran of the company who was laid off in May as part of a company-wide restructuring.

Video In-Article Ad (Desktop)

Stammberger said that Norse’s team of around nine researchers started from the premise that insiders would be the best situated to carry out an attack on the company and steal data. The company analyzed human resources documents leaked in the hack and began researching employees with a likely motive and means to carry out a hack.

Video In-Article Ad (Desktop)

That HR data was the “golden nugget” in the investigation, revealing the details of a mass layoff at Sony in the Spring of 2014, including a spreadsheet identifying employees who were fired from Sony Pictures in the April-May time period.

Video In-Article Ad (Desktop)

After researching those individuals, Norse said it identified one former employee who he described as having a “very technical background.” Researchers from the company followed that individual online, noting angry posts she made on social media about the layoffs and Sony. Through access to IRC (Internet Relay Chat) forums and other sites, they were also able to capture communications with other individuals affiliated with underground hacking and hacktivist groups in Europe and Asia.

Video In-Article Ad (Desktop)

Video In-Article Ad (Desktop)

The publication adds:

Video In-Article Ad (Desktop)

The sheer amount of information leaked by the hackers has provided plenty of ammunition to fuel alternative narratives about what happened. Initial reports noted that the malware used in the attacks on Sony was created on systems that used Korean language software libraries, and shared similarities with malicious software used in destructive attacks on the Saudi oil firm Saudi Aramco.

Video In-Article Ad (Desktop)

But for every clue that seems to point to the involvement of the DPRK, there are others that point in other directions, as well. For example, recent analysis has focused on date and time stamps attached to the leaked Sony data. Researchers have used those time stamps to infer the speed with which the data was transferred off Sony’s network. Reports have suggested that the timestamp data points to a data leak within Sony’s enterprise network, for example: to a USB device or external hard drive.

Video In-Article Ad (Desktop)

Stammberger notes the involvement of an insider would explain how the attackers obtained critical information about Sony’s network, including the IP addresses of critical servers and valid credentials to log into them. Even in sophisticated attacks, remote actors might spend days, weeks or months probing a network to which they have gained access to obtain that information: using compromised employee accounts to explore and find sensitive data before stealing it or causing other damage. It is during that “lateral movement,” malicious actors are often spotted, Stammberger said.  In the case of the Sony hack, however, the malware was compiled knowing exactly what assets to attack.

Video In-Article Ad (Desktop)

Still, there are many questions that have yet to be answered. Norse’s own analysis has plenty of blank spaces. Stammberger said that a “handful” of former employees may have been involved, though only one was linked directly to the hack. That employee, at some point, joined forces with external actors and more experienced hackers with a grudge against Sony, including individuals involved with sites like the Pirate Bay which offer Hollywood movies for download. “We see evidence for those two groups of people getting together,” Stammberger told The Security Ledger.

Video In-Article Ad (Desktop)

 

Video In-Article Ad (Desktop)

The hacking of the company saw a number of email messages shared between its Chairwoman of Motion Pictures Amy Pascal and producer Scott Rudin surface online.

Video In-Article Ad (Desktop)

The leaking of these emails unveiled Knowles’ plan to create the aforementioned Destiny’s Child biopic, and Pascal’s plans to make the Black British actor Idris Elba the latest actor to portray British spy James Bond.

Video In-Article Ad (Desktop)

Video In-Article Ad (Desktop)

Source.

Video In-Article Ad (Desktop)

Your thoughts?

Video In-Article Ad (Desktop)

Comments 7

Please Post Your Comments & Reviews

Your email address will not be published. Required fields are marked *

  1. Akeem December 30, 2014

    Why the hell do yall keep using Destinys Child’s image to promote this Sony Hack S***??? “Who is your publicist?! Who’s writing for you?!”

    • Madonna, Queen of Stunts and Gimmicks December 30, 2014

      Don’t you know. The WORLD revolves around Beyonce. At least in the mind of the queens on this blog.

      • NENE December 30, 2014

        Girl your world and not mine. so lets keep it str8

    • Roxy December 30, 2014

      You must be new here, anything Beyonce related gets the most comments and shares.

      • NENE December 30, 2014

        Thats a lie that will not make it to 2015, Rihanna post gets the most shared and comments.

        Beyonce post gets attension only when Rihanna is dragged into it so dont get it confused.

  2. Dossome December 30, 2014

    Dead at this being filed under Destiny’s Child

  3. I STAN(D) FOR TALENT December 30, 2014

    Why is this post filed under Destiny’s child? I see TGJ is trying so hard to get people’s attention by notifying them via email, which I also got. SMH. Atleast they tried.

Recommended Posts
..**