Sony BMG Greece hit by hacker
Database containing about 9,000 user records accessed, posted online; fourth recent attack on Sony sites
Computerworld - For the fourth time in about a month, hackers have broken into a Sony network.
In the latest intrusion, hackers hit the Web site of Sony BMG in Greece and pilfered a database containing the usernames, real names and email addresses of people who had registered with the site, according to security firm Sophos.
The stolen data was passed on to Hacker News, which posted a copy of it on PasteBin.com, Sophos said.,
Chester Wisniewski, senior security adviser at Sophos, today said that the intrusion was made possible by a SQL injection flaw that allowed the intruders to inject malicious code into the Greek Sony BMG site.
According to Wisniewski, the attacker appears to have used an automated SQL injection tool that searched for vulnerabilities in the site
"This looks like it was an old-school hacking," Wisniewski said. "It surprised me that Sony missed this one, considering how easy it was to find. This was not sophisticated at all."
The breach didn't require strong hacking skills, he added.
It was the third breach of a Sony system in recent days.
Last Thursday, Sony disclosed that an intruder has broken into So-net, a Japanese Sony ISP subsidiary, and stole about $1,200 worth of virtual tokens.
That same day, security firm F-Secure announced that it had discovered a phishing site being hosted on a Sony server in Thailand.
Those attacks were far smaller in scope than intrusions last month into Sony's PlayStation Network and Entertainment Online sites that compromised data on almost 100 million account holders.
The April attacks prompted Sony to shut down both networks for several days while its internal security team worked to fix the problems with the help of consultants from three external security firms.
The company restored limited service on both networks about 10 days ago. Sony has yet to fully restore all previously available functionality.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is email@example.com.
- Michaels breach exposes nearly 3M payment cards
- Teen nabbed in Heartbleed attack against Canadian tax site
- Heartbleed bug can expose private server encryption keys
- FTC can sue companies hit with data breaches, court says
- 5-year-old hacks Xbox, now he's a Microsoft 'security researcher'
- State AGs probe Experian subsidiary's data breach
- NSA sniffing prompts Yahoo to encrypt traffic between its data centers
- Banks withdraw data breach claim against Target
- Bank abandons place in class-action suit against Target, Trustwave
- Banks' suit in Target breach a 'wake-up call' for companies hiring PCI auditors
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts