The Peorian

Sat12212024

Last updateMon, 15 Jun 2020 10pm

Back You are here: Home Tech Technology News SEO Streight: Why North Korea probably did NOT hack Sony

Streight: Why North Korea probably did NOT hack Sony

passwordsecurity
Log in to save this page.

 

There is growing skepticism in the cyber security and hacktivist crowd about North Korea being to blame for the recent Sony hack, supposedly involving “The Interview” film.

One thing the mainstream media gets wrong is calling Sony Pictures “an American corporation.” It's a Japanese company, with an American division. What makes this a sensitive issue is that Japan committed war crime atrocities against Korea (and China) during World War 2.

So, a film by a Japanese company portraying the assassination of the North Korean ruler stirs up the old animosities. It also, even though humorously, advocates the violation of the Geneva Conventions.

We must also understand that Sony Pictures had horrible cyber-security in place. It was like leaving piles of cash on your front porch and hoping nobody comes by and steals it. Or leaving the front door of your home unlocked with a sign that says "Unlocked Door."

You just can't get any more stupid that having "password" as your password and storing password files in unencrypted files titled "passwords." Sony Pictures is looking more and more ridiculous as the details about their easy-to-hack computer network are revealed.

Cyber security expert S. Cobb made this remark about corporate cluelessness in response to George Clooney (who was trying to get other Hollywood types to sign a petition against North Korea):

“In my own work I have seen the way in which multinational companies generate billions of dollars in profits by applying digital technology to improve productivity.

My job has been, for the better part of two decades, advising companies on how to defend this highly profitable digital technology that they deploy.

Sadly, time and again, too many times to count, my fellow security professionals and I run into companies and company executives who reject our advice as too costly to implement, as an unreasonable burden on their business. When we say that the path they are taking comes with a large amount of risk, they either don't believe us or they say, "fine, we'll risk it."

The result? America's corporate ecosystem, like those of many other countries, suffers from systemic cyber weakness to the point where no company today can afford to say "bring it on". Why? Because they know they are not impervious to potentially crippling hacking attacks.

I used to be in the penetration testing business, that's where you pretend to be bad guys in order to test another company's cybersecurity; our guys had a 100% success rate. They always found a way in, and they didn't even break the law to do it. Every pen tester I've ever spoken to has a similar record.” http://scobbs.blogspot.com/2014/12/dear-george-clooney-word-about.html

The problem is that if you tighten your network security too much, it becomes difficult for vendors and employees to use it. Cyber security experts say you can't really defend yourself 100 percent against cyber attacks. If someone wants to break into your network, they'll eventually find a way to do it. What's important is having the ability to recover quickly after an attack.

The controversy about whether or not it was really North Korea who was responsible for the Sony Pictures hack involves how cyber attackers will spoof their origins and it's time-consuming to trace an attack back to its real source.

Here's a list of more links to information you can explore. Take the time to read these, especially if you're a CEO, CIO, business owner, or IT person.

  • Wired “The Evidence That North Korea Hacked Sony is Flimsy.”
  • Gawker “Cyber Security Firm Says Sony Hack Was Likely an Inside Job by a Woman”
  • Associated Press “Stolen Emails Reveal Lapses in Sony Security Practices”
  • Risk Based Security “A Breakdown and Analysis of the December 2014 Sony Hack” (This is a highly detailed analysis and  in-depth rundown for technical IT people to enjoy. Everyone can learn a lot from it.)
  • New York Times “Sony Attack Was First a Nuisance But Swiftly Became a Firestorm”
  • S. Cobbs “Why the Sony Hack is NOT Cyber War”
  • Kryp3tia “Winners and Losers in the Sony Hack”
  • Zero Paste
  • TechDirt “Ridiculousness of Calling the Sony Hack the 9-11 of Cyber Security”
  • Mark W. Rogers “Why the Sony Hack is Unlikey to Be the Work of North Korea”
  • Motherboard “Sony Hack Should Not Be an Excuse to Pass Bad Cyber Security Laws”
  • NY Times “US Defense Secretary Leon Panetta Warns of Dire Threat of Cyber Attack”
  • Ars Technica “State Sponsored or Not, Sony Pictures Malware Bomb Used Simple, Buggy Code”
  • Motherboard “Sony Hack Proves We Need to Replace Email”
  • Motherboard “Best Thing We Can Do About Sony Hack is Calm Down”
  • Business Insurance “Sony Hack is Cyber Security Game Changer”
  • CNN Politics “Government Hacks and Security Breaches Skyrocket”
  • Huffington Post (2011 article) “Cyber Security Experts Slam Sony for Not Fixing Vulnerabilities”
  • LinkedIn Pulse: “Why Sony's Breach Matters for All Companies”
  • CBS News “Hacking after Sony: What Companies Need to Know”
  • BoingBoing “Obama Admin Sanctions North Korea Anyway”
  • CNN: “Norse Responds to Sony Hack Questions”
  • Norse Cyber Security “Marketing Departments Are More Vulnerable to Hackers”
  • USA Today “Maybe North Korea Wasn't Behind the Sony Pictures Hack”
  • CNN “Experts Doubt North Korea Behind Sony Hack”
  • The Daily Beast “No, North Korea Didn't Hack Sony”
  • TrendMicro “WIPALL Malware Leads to GOP Warning in Sony Hack”

http://www.wired.com/2014/12/evidence-of-north-korea-hack-is-thin/

http://gawker.com/researcher-sony-hack-was-likely-an-inside-job-by-a-wom-1676556756

http://hosted2.ap.org/APDEFAULT/495d344a0d10421e9baa8ee77029cfbd/Article_2014-12-17-US--Sony%20Hack-What%20Went%20Wrong/id-f5a2cdefe54d46d7842d7c0f5b109fd9

https://www.riskbasedsecurity.com/2014/12/a-breakdown-and-analysis-of-the-december-2014-sony-hack/

http://www.nytimes.com/2014/12/31/business/media/sony-attack-first-a-nuisance-swiftly-grew-into-a-firestorm-.html?_r=0

http://scobbs.blogspot.com/2014/12/why-sonyhack-is-not-cyberwar.html

http://krypt3ia.wordpress.com/2014/12/18/sony-hack-winners-and-losers/

http://0paste.com/6875#md

https://www.techdirt.com/articles/20141218/18192929485/ridiculousness-turning-sony-hack-into-911-computer-security.shtml

http://marcrogers.org/2014/12/18/why-the-sony-hack-is-unlikely-to-be-the-work-of-north-korea/

http://motherboard.vice.com/read/the-sony-hack-is-not-an-excuse-to-pass-bad-cybersecurity-laws-north-korea

http://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html

http://arstechnica.com/security/2014/12/state-sponsored-or-not-sony-pictures-malware-bomb-used-slapdash-code/

http://motherboard.vice.com/read/the-sony-hack-proves-we-need-to-replace-email

http://motherboard.vice.com/read/the-best-thing-we-can-do-about-the-sony-hack-is-calm-down

http://www.businessinsurance.com/article/20141221/NEWS07/312219980

http://www.cnn.com/2014/12/19/politics/government-hacks-and-security-breaches-skyrocket/

http://www.huffingtonpost.com/2011/06/04/sony-security-hacks_n_871310.html

https://www.linkedin.com/pulse/why-sonys-breach-matters-steven-sinofsky

http://www.cbsnews.com/news/hacking-after-sony-what-companies-need-to-know/

http://boingboing.net/2015/01/02/obama-administration-north-ko.html

http://blog.norsecorp.com/2014/12/30/cnn-norse-responds-to-sony-hack-questions/

http://blog.norsecorp.com/2014/12/21/marketing-just-isnt-ready-for-hackers/

http://www.usatoday.com/story/money/columnist/rieder/2015/01/05/maybe-north-korea-wasnt-behind-sony-hack/21290467/

http://www.cnn.com/2014/12/27/tech/north-korea-expert-doubts-about-hack/

http://www.thedailybeast.com/articles/2014/12/24/no-north-korea-didn-t-hack-sony.html

http://blog.trendmicro.com/trendlabs-security-intelligence/wipall-malware-leads-to-gop-warning-in-sony-hack/

 

About the Author
Steven Streight is a man of many skills. He’s a talented writer, web content developer, internet marketing consultant and photographer. He’s a trustee on the Peoria Historical Society, a member of SCORE Peoria and the author of the Peoria technology history book, “Bicycle Fever.” In his downtime, he’s hangs out with his beloved Min Pin and tries to get some rest. Considering how involved he is in the community, it sounds like he could use as much as he can get.