Honeypot thesis
sound pretty weak. The big firms know that to have proper markets in creative intellectual property once again, then they'll need ordinary bods onside in fights against the big filesharers.
Sony PlayStation website servers were used to distribute a 27.78GB archive potentially containing sensitive data swiped from Sony Pictures computers, it's claimed. Until early on Tuesday afternoon, San Francisco time, more than 60 systems seeding the archive on the BitTorrent network appeared to be virtual servers in the …
I like Sony as a manufacturer, mostly. I am not a big consumer of electronics, but I am very very picky. Of the products I have owned or been exposed to via friends or family that I think are made with thought and quality, all are Sony. It really feels like their engineers never brute force themselves around a problem, and while powerful inside their design try hard to tone it down.
Anyway, when it comes to security Sony feels like a troll. Nearly literally, the troll from some fantasy world hired to keep folks out or in. Big, brutish, can crush you with it's finger, but easily fooled and can, in an attempt to catch you, level to the ground whatever it is you were not allowed to enter. Also its literacy on the law is quite low on the count that its literacy is quite low and that it does not really see the benefit in obeying any.
On this count I try my hardest to find any product that isn't Sony when I need something new.
It's hardly guesswork.
Sony got hacked big time, the hackers stole the keys to the company cloud servers too, and hosted the stolen files there. Once they realised, they got them all taken down at the same time.
The only "guesswork" is if it was done intentionally by Sony or not. And I'm going with "Not".
The GOP are showing that they've also totally compromised the PlayStation Network. Again.
> What goes around...
> http://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal
> Sweet, sweet karma.
The only silver lining off that whole kerfuffle was that it gave Mark Russinovitch some (much deserved) publicity and made me aware of the awesome SysInternals Suite.
Wait a sec, I thought that it was Sony Pictures that got hacked? Surely the Playstation servers are controlled by Sony Computer Entertainment, which is supposed to be a separate entity?
Have Sony been penetrated twice? (And I'm sure el Reg can make a good headline out of that one ;)
China's internet regulator has launched an investigation into the security regime protecting academic journal database China National Knowledge Infrastructure (CNKI), citing national security concerns.
In its announcement of the investigation, the China Cyberspace Administration (CAC) said:
Air raid sirens sounded for over an hour in parts of Jerusalem and southern Israel on Sunday evening – but bombs never fell, leading some to blame Iran for compromising the alarms.
While the perpetrator remains unclear, Israel's National Cyber Directorate did say in a tweet that it suspected a cyberattack because the air raid sirens activated were municipality-owned public address systems, not Israel Defense Force alarms as originally believed. Sirens also sounded in the Red Sea port town of Eilat.
Netizens on social media and Israeli news sites pointed the finger at Iran, though a diplomatic source interviewed by the Jerusalem Post said there was no certainty Tehran was behind the attack. The source also said Israel faces cyberattacks regularly, and downplayed the significance of the incident.
Never mind what enterprise programmers are trained to do, a self-defined set of hackers has its own programming language zeitgeist, one that apparently changes with the wind, at least according to the relatively small set surveyed.
Members of Europe's Chaos Computer Club, which calls itself "Europe's largest association of hackers" were part of a pool for German researchers to poll. The goal of the study was to discover what tools and languages hackers prefer, a mission that sparked some unexpected results.
The researchers were interested in understanding what languages self-described hackers use, and also asked about OS and IDE choice, whether or not an individual considered their choice important for hacking and how much experience they had as a programmer and hacker.
After at least six years of peddling pilfered personal information, the infamous stolen-data market RaidForums has been shut down following the arrest of suspected founder and admin Diogo Santos Coelho in the UK earlier this year.
Coelho, 21, who allegedly used the mistaken moniker "Omnipotent" among others, according to the US indictment unsealed on Monday in the Eastern District of Virginia, is currently awaiting the outcome of UK legal proceedings to extradite him to the United States.
The six-count US indictment [PDF] charges Coelho with conspiracy, access device fraud, and aggravated identity theft following from his alleged activities as the chief administrator of RaidForums, an online market for compromised or stolen databases containing personal and financial information.
Analysis The Lapsus$ cyber-crime gang, believed to be based in Brazil, until recently was best known for attacks on that country's Ministry of Health and Portuguese media outlets SIC Noticias and Expresso.
However, the gang is climbing up the ladder, swinging at larger targets in the tech industry. Over the past few weeks, those have included Nvidia, Samsung, and Argentine online marketplace operator Mercado Libre. Now, Lapsus$ is suspected of attacking game developer Ubisoft.
Lapsus$ in February compromised Nvidia, stealing a terabyte of data that included proprietary information and employee credentials, and dumping some of the data online. The crew also demanded the GPU giant remove limits on crypto-coin mining from its graphics cards, and open-source its drivers.
The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.
NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.
"Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."
BadgerDAO, maker of a decentralized finance (DeFi) protocol, said on Wednesday that it is investigating reports that millions in user funds have been stolen.
"As Badger engineers investigate this, all smart contracts have been paused to prevent further withdrawals," the company wrote in a Twitter post. "Our investigation is ongoing and we will release further information as soon as possible."
PeckShield, a blockchain security firm, put the losses at $120.3 million, if translated to fiat currency.
A Ubiquiti developer has been charged with stealing data from the company and extortion attempts totalling $2m in what prosecutors claim was a vicious campaign to harm the firm's share price – including allegedly planting fake press stories about the breaches.
US federal prosecutors claimed that 36-year-old Nickolas Sharp had used his "access as a trusted insider" to steal data from his employer's AWS and GitHub instances before "posing as an anonymous hacker" to send a ransom demand of 50 Bitcoins.
The DoJ statement does not mention Sharp's employer by name, but a Linkedin account in Sharp's name says he worked for Ubiquiti as a cloud lead between August 2018 and March 2021, having previously worked for Amazon as a software development engineer.
A zero-day exploit said to have been developed by the NSA was cloned and used by Chinese government hackers on Windows systems years before the cyber-weapon was leaked online, it is claimed.
Check Point put out a report on Monday digging into Chinese malware it calls Jian, and argues persuasively this particular software nasty was spawned sometime around 2014 from NSA exploit code that eventually leaked online in 2017.
The timeline basically seems to be, according to Check Point:
A young man caught hacking into Nintendo’s servers to steal secret Switch blueprints has been sentenced to three years in prison after ignoring an FBI warning to stop.
According to court documents [PDF] Ryan Hernandez of Palmdale, California, is now 21 though in 2016, while a minor, he requested help on a Nintendo forum. An engineer at the Japanese giant clicked on a link in that post and was taken to a malicious website that secretly obtained the staffer's login credentials for Nintendo's developer portal. These were then used to gain administrator access on the internal site.
From there, he stole reams of Nintendo's confidential information, some of it on the yet-to-be-announced Switch console, that he then posted online. This attracted the attention of the FBI, who turned up at his parents’ house in October 2017, and extracted a promise from Hernandez that he would stop his hacking activities.
Biting the hand that feeds IT © 1998–2022