TIME Security

Sony Pictures Employees Get Threatening Email from Alleged Hacker

Emails to the movie studio’s employees threatening them and their families is the latest bad news for Sony Pictures since a cyber attack last week exposed sensitive documents

Last week’s cyber attack on Sony Pictures Entertainment turned scarier on Friday when the hackers responsible reportedly threatened company employees and their families.

Someone claiming to represent the hacker group Guardians of Peace sent emails to Sony Pictures employees in which they promised to bring about the “collapse” of the company. The message, sent by the self-described “head of GOP,” asked that employees join the hackers in denouncing Sony Pictures or suffer severe consequences.

“If you don’t,” the message said, “not only you but your family will be in danger.”

Variety, which obtained the email, also reported that Sony Pictures, after becoming aware of the message, told employees to turn off their mobile devices. There is no word on the number of employees who received the message.

“We understand that some of our employees have received an email claiming to be from GOP,” a Sony spokesman told Fortune in a statement. “We are aware of the situation and are working with law enforcement,”

In total, the e-mail is four paragraphs long, contains bad grammar, and goes on to attack Sony Pictures while promising further unspecified action. It’s unclear how many Sony employees received the message.

“[W]hat we have done so far is only a small part of our further plan,” the email said. “It’s your false [sic] if you if you think this crisis will be over after some time. All hope will leave you and Sony Pictures will collapse,” the e-mail reads.

The Federal Bureau of Investigation is also investigating the matter. In a statement to the Los Angeles Times, the FBI said it was aware of the threatening e-mails and that it will continue to investigate the cyber attack.

Little is known about Guardians of Peace, which the email’s author described as “a worldwide organization.” The group took responsibility for last week’s cyber attack, involved leaking numerous sensitive company documents and causing Sony Pictures to shut down its computer system. Among the documents released was salary information for thousands of Sony Pictures employees as well as documents containing thousands of passwords to company computers, social media accounts and even financial accounts.

Reports surfaced earlier this week that Sony Pictures was set to blame the government of North Korea for backing the cyber attack, but the country has denied any involvement. Kim Jong Un previously called Sony Pictures’ upcoming release of the film The Interview — a comedy that depicts an assassination attempt on the North Korean leader — “an act of war.”

This article originally appeared on Fortune.com

TIME Security

Report: Sony’s Security Team Was Unprepared for Hack

The Sony Corp. logo is displayed outside the company's showroom in Tokyo on Oct. 30, 2013.
The Sony Corp. logo is displayed outside the company's showroom in Tokyo on Oct. 30, 2013. Bloomberg/Getty Images

After hackers leak salaries, social security numbers and films

Sony Picture’s security team had few resources and a poor reputation among its employees, according to new reports about the company-wide hack that led to leaked movie budgets, salary information, social security numbers and unreleased films.

Unnamed sources with ties to the company told Fusion that Sony had a lax attitude towards security. “Sony’s ‘information security’ team is a complete joke,” one former employee said. “We’d report security violations to them and our repeated reports were ignored.”

Just 11 people are assigned to the information security team out of a company of 7,000 employees, according to leaked files discovered by Fusion. Only three people on the team are not managers or directors.

The executive director of information security at Sony Pictures, Jason Spaltro, told CIO Magazine in a 2007 interview that it may be “a valid business decision to accept the risk” of a security breach, depending on the cost of investing in security and the cost of a successful attack.

Sony is offering one year of free credit monitoring and fraud protection to current and former employees, the Wall Street Journal reports.

Many experts speculate the recent breach, which is now being investigated by the security firm FireEye as well as the FBI, was perpetrated by North Korea, though a Pyongyang diplomat recently denied his country was responsible.

TIME celebrities

Stars Like Sylvester Stallone and Judd Apatow Among Victims of Sony Hack

Clash In Cotai II - Manny Pacquiao v Chris Algieri
Sylvester Stallone looks on during a boxing match at The Venetian on November 23, 2014 in Macau, China Chris Hyde—Getty Images

The private details of 47,000 employees, former employees, and freelancers, has also been posted online

The hackers behind the attack on Sony Pictures Entertainment have released the private details of 47,000 Sony employees, former employees, and freelancers — including a few Hollywood stars. The information includes Social Security numbers, contracts and taxpayer-identification numbers.

Celebrities whose details have been revealed include actors Sylvester Stallone, Judd Apatow and Rebel Wilson, the Wall Street Journal reports.

Data like the salaries and home addresses of people who left the company as far back as 2000 has also been posted, according to an analysis of 33,000 leaked documents by data-security company Identity Finder.

A group called Guardians of Peace has claimed responsibility for the cyber attack. The group may be affiliated with North Korea, which has expressed outrage at Sony Pictures’ upcoming release The Interview, which satirizes the country’s dictator Kim Jong Un.

The film’s budget, along with the salaries of stars Seth Rogen and James Franco, were leaked earlier this week.

TIME Security

Study Says Hackers Can Attack Social Logins to Impersonate You

Login
Login Hamza Türkkol—Getty Images

LinkedIn and Amazon have moved to update their systems

Social logins like the kind used by Amazon and LinkedIn can provide an easy entry point for hackers to gain access to your accounts on various websites, according to new research from IBM’s security team.

Websites often ask users for third-party social logins to post comments, with Facebook and Twitter among the most common logins users use. IBM, however, found that certain social logins can be commandeered by a hacker to post misleading information or malicious software on some sites that use them.

The hack, dubbed SpoofedMe, works like this: A hacker registers a new account on a login platform with a victim’s email address. The hacker then uses that account to sign in to a third-party website (like Nasdaq.com or SlashDot.org), posing as the victim.

IBM’s team found that Amazon and LinkedIn’s social logins were vulnerable to SpoofedMe before they warned those companies earlier this year. LinkedIn has since discontinued social login requests that include the email field, IBM said, while Amazon has updated its developer documents and said it will add a verification component. Websites that use a LinkedIn login include Nasdaq.com, Slashdot.org, Crowdfunder.com and Spiceworks.com. Several shopping websites use Amazon as a login.

Because hackers can use SpoofedMe to pose as trustworthy, well-known users—a company executive, for instance, or a respected developer—it allows them to more easily spread false information or malware. Still, that’s a fairly limited level of mischief compared to more damaging attacks.

“If you have a piece of malware code and you take over someone’s trusted account and say ‘here’s this code,’ because you’re leveraging trust already established in the community,” others on the website are more likely to use it, said Diana Kelley, executive security advisor at IBM Security. “That would be a big ‘gotcha.’”

TIME Denmark

Dane Gets 4 Years Prison for Social Media Terror

(COPENHAGEN, Denmark) — A Moroccan-born Dane was found guilty Thursday of instigating and promoting terrorism, this time on social media.

Sam Mansour, 54, was sentenced to four years in prison at a Copenhagen court for violating Denmark’s terror laws.

Mansour had denied the charges, saying his postings were legal under freedom of speech laws. In Facebook postings, he wrote “terrorism is a duty” and “we are fearful,” and urged jihadis to kill several Danes whom he had named.

His online activities, which also include sending emails with similar content, took place from early 2012 until his arrest on Feb. 11, prosecutors said.

The court rejected the prosecution’s demand that Mansour, who has lived in the Scandinavian country since 1984, be expelled after having served his time, saying he could be “mistreated” by Moroccan authorities for his activities in Denmark.

It wasn’t immediately clear whether Mansour would appeal the ruling by three judges and a six-man jury.

In 2007, Mansour, then known as Said Mansour, became the first person in Denmark convicted under a 2002 anti-terrorism law that forbids the instigation of terrorism. He was sentenced to three-and-half years in prison.

TIME Security

North Korean Diplomat Denies His Country Hacked Sony

A North Korean diplomat said blame on his country was a "fabrication"

A North Korean diplomat denied his country was responsible for a massive cyberattack on Sony Pictures, putting him in contrast with another official who elected not to issue such a denial two days ago.

The film and television giant suffered a hack that led to Sony’s corporate email and other key systems crashing. Sensitive data was also released in the hack, including about 6,000 employees’ and executives’ salaries.

Some reports have tied North Korea to the attack, as Sony is about to release a comedy about an attempt to assassinate the country’s leader, Kim Jong-un. North Korea has called the film, titled The Interview, an “act of war.”

But an unnamed North Korean diplomat told Voice of America that the idea of a North Korean link to the Sony hack is a “fabrication.”

“Linking the DPRK to the Sony hacking is another fabrication targeting the country,” said the official. “My country publicly declared that it would follow international norms banning hacking and piracy.”

Despite the diplomat’s claims, Re/code reports that Sony is preparing to officially name North Korea as the source of the hack, though Sony denied this.

Similar attacks to the one launched against Sony have been linked to North Korea.

[Voice of America]

TIME Security

Google Is Simplifying One of the Most Annoying Parts of the Internet

Those dreaded boxes of distorted text will no longer annoy you when logging in

Just today, you may have been forced to squint at a jumble of hard-to-read letters and numbers to prove you weren’t a robot in order to log into a website.

That security feature, called CAPTCHA, has been frustrating Internet users for more than a decade—and it’s not even all that great at weeding out real humans from automated spam scripts, according to Google. So the search giant has unveiled a new login security measure dubbed “No CAPTCHA” that it claims is both simpler for humans and better at warding off bots.

Here’s how it works: Instead of typing in obtuse strings of text, users will simply have to check a box asserting that they’re not robots. A risk analysis algorithm will evaluate the way the user interacts with the web page to determine if he’s a person or a bot. For most people, the checkmark is all that will be required. If the algorithm isn’t sure, a user may be forced to type in the character string the old-fashioned way.

Google says that artificial intelligence can now solve the traditional distorted text fields with 99.8% accuracy, so a new method was needed.

Recaptcha_google

Google is also working to make CAPTCHAs more bearable on mobile devices. Users will start being asked to match similar images in a grid instead of typing in text.

Some big names like Snapchat and WordPress have already implemented No CAPTCHA, and Google says the feature is helping users to log in faster.

TIME Security

Sony Executives’ Salaries Leaked in Devastating Hack

Sony Chief Executive Officer Kazuo Hirai Speaks At Sony IR Day
Michael Lynton, chief executive officer of Sony Pictures Entertainment Inc., gestures as he speaks during a news conference in Tokyo, Japan, on Nov. 18, 2014. Bloomberg/Getty Images

Thousands of social security numbers also made public

Documents containing Sony Pictures employees’ personal information were leaked late Monday in the wake of a massive online attack against the company.

The internal documents listed the names, titles and salaries of more than 6,000 Sony Pictures employees, including senior executives, Fusion reports. Included in the data were 3,803 employees’ social security numbers, including all the company’s top executives.

Seventeen executives make over $1 million per year, the documents reveal. Only one of them, co-chair of Sony Pictures Entertainment Amy Pascal, is a woman. The information was posted onto the anonymous uploading site Pastebin.

According to Fusion, Pascal and CEO Michael Lynton are paid $3 million per year.

Sony was hacked by a mysterious group on Nov. 24 by a group calling itself #GOP, for Guardians of Peace. The FBI said this week it’s investigating the attack, which some reports have linked to North Korea.

[Fusion]

TIME Security

The FBI Is Warning Other Companies After Sony Hack

How Hacker Sleuths Found Zhang Changhe in Trail From Myrtle Beach to China
Joe Stewart, director of malware research at Dell SecureWorks, a unit of Dell Inc., speaks to a colleague in front of a pair of large wall mounted monitors in his office in Myrtle Beach, South Carolina, U.S., Friday, Jan. 18, 2013. S Bloomberg—Bloomberg via Getty Images

The malware overrides data and prevents computers from booting up

A devastating malware attack used against Sony Pictures Entertainment last week could be a threat to other businesses as well.

In a five-age confidential warning first reported by Reuters, the FBI describes malicious software used in an attack that appeared similar to that used against Sony, though it didn’t mention the company by name. The FBI report provided technical advice to other businesses on how to respond to the malware.

The attack against Sony shut down the company’s email and other key systems for a week shortly before the holiday season, when the company will release several big-name movies. Several of Sony’s titles leaked online shortly after the hack before most of them even made it to theaters.

The FBI document warned of malware that overrides data on computer hard drives and prevents computers from being booted up. The agency said it was investigating the attack, while Sony said it hired FireEye’s Mandiant response team to help clean up the company’s systems.

Some reports have tied the attack to North Korea, which has promised retaliation for an upcoming Sony comedy about a plot to kill North Korean leader Kim Jong-un.

[Reuters]

TIME Security

Everything We Know About the Massive Sony Hack

Could North Korea be to blame?

Sony is having a rough start to the holiday season. The tech giant’s movie division, Sony Pictures, is the victim of an ongoing cyberattack that has resulted in upcoming movies being leaked, communication systems going offline and Twitter accounts being hijacked.

The timing of the attack has led to increasing speculation that North Korea may have orchestrated it, possibly as retribution for an upcoming comedy in which Seth Rogen and James Franco are tasked with assassinating North Korean leader Kim Jong-un.

Investigators have found hacking tools similar to those used by North Korea in previous attacks on South Korea, according to Reuters.

Here’s everything we know so far about the incident:

The attacks began with an ominous photo

On the Monday before Thanksgiving, Sony Pictures employees turned on their computers and were greeted with an ominous picture of red skull and a warning that the company’s “top secrets” would be released if unstated demands were not met.

“We’ve already warned you, and this is just a beginning,” the image reads. “If you don’t obey us, we’ll release data shown the world.”

Another image depicting Sony Pictures CEO Michael Lynton in hell was posted on Sony Twitter accounts, a sure sign the accounts were compromised. According to a Reddit thread, the hackers claim to have obtained a trove of data that includes passwords, internal financial documents and even copies of celebrities’ passports.

Sony’s communication systems went down for a week

Sony Pictures took down its email and messaging systems for a week as it tried to contain the cyberattack. Employees reportedly had to use phone calls, handwritten notes and fax machines to carry out their work. Multiple reports indicate that Sony’s email system was expected to return Monday, though Sony hasn’t confirmed that yet.

Sony’s big upcoming movies leaked

So far the biggest tangible result of the hack seems to be the leak of five Sony films. DVD-quality versions of Fury, Annie, Still Alice, Mr. Turner and To Write Love on Her Arms are all now available on file-sharing sites.

All of the movies except for Fury have yet to be widely released, so piracy could be a huge blow to their box office take. Over the summer, The Expendables 3 bombed at the box office because a high-quality version of the movie leaked online weeks before it premiered. And a 2011 Carnegie Mellon study found that such pre-release leaks can reduce a movie’s box office take by as much as 19%.

So that’s what we know for sure. But the hack took on a new dimension on Friday, when Re/code reported Sony is investigating North Korea’s possible involvement in the cyberattack, potentially staging the attack from China.

Here’s what we know that actually makes that claim seem plausible:

North Korea hates Sony’s upcoming movie The Interview

Sony’s big Christmas movie this year is The Interview, which stars James Franco and Seth Rogen as TV journalists tasked by the CIA with assassinating Kim Jong-un. North Korean officials are, unsurprisingly, not pleased about a movie that centers on trying to kill their supreme leader for laughs. A government official told North Korean state media in June that releasing the film would constitute “a blatant act of terrorism and war” and would lead to “merciless” retaliation from the country. The government also denounced the film as “undisguised sponsoring of terrorism, as well as an act of war” in a letter to U.N. Secretary-General Ban Ki-moon in June.

Rogen shrugged off the warning on Twitter at the time, but The Interview was delayed from its original October release date shortly afterward. (Sony has said the delay was unrelated to North Korea’s statements.)

North Korea’s cyberattack capabilities are increasing fast

Residents of North Korea are known to be isolated from the rest of the world, deprived of basic Internet access and other modes of global communication. However, the country is growing increasingly comfortable weaponizing the Internet. In November 2013, South Korean media reported that Kim Jong-un called cyberattacks a “magic weapon” that could help North Korea launch “ruthless strikes” against its southern foe.

A secretive North Korean bureau called Unit 121 is tasked with infiltrating computer networks, planting viruses and carrying out cyberattacks, according to a Hewlett-Packard report on North Korea’s cyber capabilities. The division carries out attacks both from within North Korea and in Shenyang, China, near the North Korean border. South Korean media have claimed that Unit 121 is the third-largest cyber intelligence unit in the world, behind the U.S. and Russia, though China is also up there.

The U.S. government is taking claims of North Korean involvement seriously

Claims of North Korean involvement are credible enough that the U.S. government is reportedly looking into them. NBC News reports that several government agencies are considering North Korea as a possible suspect in the hack. The FBI is among the U.S. agencies now looking into the hack, according to Reuters.

A North Korean diplomat in New York has denied that his country was involved in hacking. “Linking [North Korea] to the Sony hacking is another fabrication targeting the country,” the official, who asked to remain anonymous, told Voice of America. “My country publicly declared that it would follow international norms banning hacking and piracy.”

 

 

 

Your browser, Internet Explorer 8 or below, is out of date. It has known security flaws and may not display all features of this and other websites.

Learn how to update your browser