Attack on Sony 2014
Sammy Lui 1
Attack on Sony 2014 Sammy Lui 1 In Index Overview Timeline - - PowerPoint PPT Presentation
Attack on Sony 2014 Sammy Lui 1 In Index Overview Timeline Tools Wiper Malware Implications Need for physical security Employees Accomplices? Dangers of Cyberterrorism Danger to Other
Sammy Lui 1
2
Peace hacker group
Sony’s network and leaked it
weeks
The Interview with a terrorist attack
3
Terabytes of data stolen from computers and threat messages
movies to file sharing networks
password protected files
plaintext credentials and internal and external account credentials
along with financial data from Sony
4
employees to sign statement disassociating themselves with Sony
not release The Interview
emails from employees. Last day of data leaks.
to select movie theaters and online
the hackers
5
malware to infiltrate and steal data from Sony employee computers
harmful to a computer user
Crimeware, Adware, Trojans and Viruses
6
management & network file- sharing to spread, shut down networks and reboot computers
reputational damage to companies
and backups of system and data
7
enough by destroying headers
boot loader to bypass OS protections
8
computers in Thailand, Italy and Poland
in network and then wipe harddrives
access Windows drives
9
confirming North Korea made the malware
Russian or Korean
allowed GoP member to enter Sony building
GoP member
IT to cause disruption and fear
10
personnel, hardware, software, and networks from physical actions
cybersecurity is physical access
securing email servers and password files
11
untrained
helped the hackers were inside men or unwitting accomplices
12
predominantly digital
treated like acts of war if their consequences are great enough” – Dave Aitel
13
Sony needed to be repaired
computer network to prevent further data wiping
whiteboards for weeks
recovery tools useless, making recovery even more tedious
from information found in leaks
14
less functional
networks
easily avoid detection by antivirus software
15
plan
program
continuity plan
16
focus on generating revenue first
increase cybersecurity to protect against foreign attacks
addresses used by the GoP were from North Korea because they didn’t use proxy servers
hacks to the same hacker group
17
announces attack on Sony for lying about North Korea hacks
rigged 2016 election to lack of responding to Sony Attack
charged against North Korean spy for role in Sony Attack and creation of Wannacry 2.0 malware
individuals involved with the attack but cites that they are not connected to North Korea
18
PlayStation Network by hacker group Anonymous
users
and weeks of repair
19
debit card information from customers
cards exploited
compromised third party vendor
infect Target’s POS system
20
Maersk company with NotPetya wiper malware
the Maersk company’s network shut down
encrypted important files
21
EternalBlue & Mimikatz
an unpatched machine
them to hack into other machines
security easily by being able to infect patched computers
it irreversibly encrypted master boot records
22
explained/?noredirect=on&utm_term=.5f1bed012389
eight-days-after-cyber-attack-idUSKCN0JG27B20141203
holiday-peak-idUSBRE9BH1GX20131219
learned/
23