Wednesday, January 7, 2015

Cyber Security Experts Agree That Sony Picutures Hack NOT by North Korea



There is growing skepticism in the cyber security and hacktivist crowd about North Korea being to blame for the recent Sony hack, supposedly involving “The Interview” film.

One thing the mainstream media gets wrong is calling Sony Pictures “an American corporation.” It's a Japanese company, with an American division. What makes this a sensitive issue is that Japan committed war crime atrocities against Korea (and China) during World War 2.

So a film by a Japanese company portraying the assassination of the North Korean ruler stirs up the old animosities. It is also, even though humorously, advocating the violation of the Geneva Conventions.

We must also understand that Sony Pictures had horrible cyber-security in place. It was like leaving piles of cash on your front porch and hoping nobody comes by and steals it. Or leaving the front door of your home unlocked with a sign that says "Unlocked Door."

You just can't get any more stupid that having "password" as your password and storing password files in unencrypted files titled "passwords." Sony Pictures is looking more and more ridiculous as the details about their easy-to-hack computer network are revealed.

Cyber security expert S. Cobb made this remark about corporate cluelessness in response to George Clooney (who was trying to get other Hollywood types to sign a petition against North Korea):


QUOTE

In my own work I have seen the way in which multinational companies generate billions of dollars in profits by applying digital technology to improve productivity.

My job has been, for the better part of two decades, advising companies on how to defend this highly profitable digital technology that they deploy.

Sadly, time and again, too many times to count, my fellow security professionals and I run into companies and company executives who reject our advice as too costly to implement, as an unreasonable burden on their business. When we say that the path they are taking comes with a large amount of risk, they either don't believe us or they say, "fine, we'll risk it."

The result? America's corporate ecosystem, like those of many other countries, suffers from systemic cyber weakness to the point where no company today can afford to say "bring it on". Why? Because they know they are not impervious to potentially crippling hacking attacks.

I used to be in the penetration testing business, that's where you pretend to be bad guys in order to test another company's cybersecurity; our guys had a 100% success rate. They always found a way in, and they didn't even break the law to do it. Every pen tester I've ever spoken to has a similar record.


END QUOTE

http://scobbs.blogspot.com/2014/12/dear-george-clooney-word-about.html



The problem is that if you tighten your network security too much, it becomes difficult for vendors and employees to use it. Cyber security experts say you can't really defend yourself 100% against cyber attacks. If someone wants to break into your network, they'll eventually find a way to do it. What's important is having the ability to recover quickly after an attack.

The controversy about whether or not it was really North Korea who is responsible for the Sony Pictures hack involves how cyber attackers will spoof their origins and it's time-consuming to trace an attack back to it's real source.




Here's a list of more links to information you can explore. Take the time to read these, especially if you're a CEO, CIO, business owner, or IT person.


Wired “The Evidence That North Korea Hacked Sony is Flimsy.”

http://www.wired.com/2014/12/evidence-of-north-korea-hack-is-thin/



Gawker “Cyber Security Firm Says Sony Hack Was Likely an Inside Job by a Woman”

http://gawker.com/researcher-sony-hack-was-likely-an-inside-job-by-a-wom-1676556756




Associated Press “Stolen Emails Reveal Lapses in Sony Security Practices”

http://hosted2.ap.org/APDEFAULT/495d344a0d10421e9baa8ee77029cfbd/Article_2014-12-17-US--Sony%20Hack-What%20Went%20Wrong/id-f5a2cdefe54d46d7842d7c0f5b109fd9




Risk Based Security “A Breakdown and Analysis of the December 2014 Sony Hack” (This is a highly detailed analysis and in-depth rundown for technical IT people to enjoy. Everyone can learn a lot from it.)

https://www.riskbasedsecurity.com/2014/12/a-breakdown-and-analysis-of-the-december-2014-sony-hack/




New York Times “Sony Attack Was First a Nuisance But Swiftly Became a Firestorm”

http://www.nytimes.com/2014/12/31/business/media/sony-attack-first-a-nuisance-swiftly-grew-into-a-firestorm-.html?_r=0





S. Cobbs “Why the Sony Hack is NOT Cyber War”

http://scobbs.blogspot.com/2014/12/why-sonyhack-is-not-cyberwar.html






Kryp3tia “Winners and Losers in the Sony Hack”

http://krypt3ia.wordpress.com/2014/12/18/sony-hack-winners-and-losers/





Zero Paste

http://0paste.com/6875#md





TechDirt “Ridiculousness of Calling the Sony Hack the 9-11 of Cyber Security”

https://www.techdirt.com/articles/20141218/18192929485/ridiculousness-turning-sony-hack-into-911-computer-security.shtml





Mark W. Rogers “Why the Sony Hack is Unlikey to Be the Work of North Korea”

http://marcrogers.org/2014/12/18/why-the-sony-hack-is-unlikely-to-be-the-work-of-north-korea/






Motherboard “Sony Hack Should Not Be an Excuse to Pass Bad Cyber Security Laws”

http://motherboard.vice.com/read/the-sony-hack-is-not-an-excuse-to-pass-bad-cybersecurity-laws-north-korea






NY Times “US Defense Secretary Leon Panetta Warns of Dire Threat of Cyber Attack”

http://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html







Ars Technica “State Sponsored or Not, Sony Pictures Malware Bomb Used Simple, Buggy Code”

http://arstechnica.com/security/2014/12/state-sponsored-or-not-sony-pictures-malware-bomb-used-slapdash-code/




Motherboard “Sony Hack Proves We Need to Replace Email”

http://motherboard.vice.com/read/the-sony-hack-proves-we-need-to-replace-email





Motherboard “Best Thing We Can Do About Sony Hack is Calm Down”

http://motherboard.vice.com/read/the-best-thing-we-can-do-about-the-sony-hack-is-calm-down





Business Insurance “Sony Hack is Cyber Security Game Changer”

http://www.businessinsurance.com/article/20141221/NEWS07/312219980




CNN Politics “Government Hacks and Security Breaches Skyrocket”

http://www.cnn.com/2014/12/19/politics/government-hacks-and-security-breaches-skyrocket/




Huffington Post (2011 article) “Cyber Security Experts Slam Sony for Not Fixing Vulnerabilities”

http://www.huffingtonpost.com/2011/06/04/sony-security-hacks_n_871310.html





LinkedIn Pulse: “Why Sony's Breach Matters for All Companies”

https://www.linkedin.com/pulse/why-sonys-breach-matters-steven-sinofsky






CBS News “Hacking after Sony: What Companies Need to Know”

http://www.cbsnews.com/news/hacking-after-sony-what-companies-need-to-know/




BoingBoing “Obama Admin Sanctions North Korea Anyway”

http://boingboing.net/2015/01/02/obama-administration-north-ko.html





CNN: “Norse Responds to Sony Hack Questions”

http://blog.norsecorp.com/2014/12/30/cnn-norse-responds-to-sony-hack-questions/





Norse Cyber Security “Marketing Departments Are More Vulnerable to Hackers”

http://blog.norsecorp.com/2014/12/21/marketing-just-isnt-ready-for-hackers/






USA Today “Maybe North Korea Wasn't Behind the Sony Pictures Hack”

http://www.usatoday.com/story/money/columnist/rieder/2015/01/05/maybe-north-korea-wasnt-behind-sony-hack/21290467/





CNN “Experts Doubt North Korea Behind Sony Hack”

http://www.cnn.com/2014/12/27/tech/north-korea-expert-doubts-about-hack/






The Daily Beast “No, North Korea Didn't Hack Sony”

http://www.thedailybeast.com/articles/2014/12/24/no-north-korea-didn-t-hack-sony.html





TrendMicro “WIPALL Malware Leads to GOP Warning in Sony Hack”

http://blog.trendmicro.com/trendlabs-security-intelligence/wipall-malware-leads-to-gop-warning-in-sony-hack/



No comments: