Sony says 400 customer names, emails from mobile division leaked in China
The Japanese electronics firm said at least one server run by a third-party Chinese company was compromised
IDG News Service - Sony said Thursday that hackers accessed about 400 names and email addresses of its mobile customers in China and Taiwan, but that no credit card or banking information was compromised.
The company said it became aware of the hack several days after a message was posted on the popular text-sharing website Pastebin by a group called "NullCrew" claiming to have accessed Sony servers and listing logins and email addresses.
Sony said the information was taken from at least one server run by a third-party service provider based in China. The company is still investigating the details of the breach, but it appears no servers operated directly by Sony were compromised, company spokesman Hiroshi Okubo said.
"We became aware of the incident late last night or early this morning," said Okubo, referring to Japan time.
The information was on customers of Sony Mobile Communications, the company's mobile arm, in the Asian countries.
The message posted on Pastebin on Sept. 3 claims to have hacked Sony Mobile and lists hundreds of what appear to be login IDs and email addresses from the company's site.
"Sony, we are dearly dissapointed in your security. This is just one of eight sony servers that we hve control of," it reads.
The Japanese electronics firm, which is pouring resources into expanding its online services, was the target of several large-scale attacks last year.
In October, the company suspended 93,000 user accounts on several of its gaming and entertainment networks after a large number of unauthorized login attempts on those accounts.
In April, Sony was the victim of a massive attack on its online properties, in which 100 million accounts were stole from company databases. The company shut down several networks for a month and a half.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Mobile Applications Case Study: 8 Billion Transactions a Day The story documents how the online brokerage company tradeMONSTER created a custom mobile app and the success gleaned from this initiative. Also covered...
- Who's afraid of the big (data) bad wolf? Survive the big data storm by getting ahead of integration and governance functional requirements This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
- Understanding big data so you can act with confidence Automating information integration and governance and employing it at the point of data creation helps organizations boost confidence in their big data.
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources... All Personal Technology White Papers | Webcasts