{"id":1658,"date":"2011-06-04T06:07:53","date_gmt":"2011-06-03T23:07:53","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/2011\/06\/04\/sony-confirms-lulzsec-compromised-server-data\/"},"modified":"2011-06-07T00:01:51","modified_gmt":"2011-06-06T17:01:51","slug":"sony-confirms-lulzsec-compromised-server-data","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2011\/06\/sony-confirms-lulzsec-compromised-server-data\/","title":{"rendered":"Sony Confirms Lulzsec Compromised Server Data"},"content":{"rendered":"<p><!-- p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 16.0px Helvetica} p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; font: 16.0px Helvetica; min-height: 19.0px} p.p3 {margin: 0.0px 0.0px 0.0px 0.0px; font: 16.0px Helvetica; color: #003399} span.s1 {color: #0166a0} span.s2 {color: #000000} -->Sony Pictures tonight confirmed that some of its Web sites were breached yesterday.<\/p>\n<p>In a joint statement, Sony Pictures Chairman and CEO Michael Lynton and Co-chairman Amy Pascal said the company has contacted the FBI in an attempt to find out who was behind the cyberattack.<\/p>\n<p>Yesterday a group of hackers calling themselves Lulzsec brashly taunted Sony on Twitter saying it would &#8220;embarrass&#8221; the company by posting data stolen from the company&#8217;s servers. Several hours later <a href=\"http:\/\/news.cnet.com\/8301-31021_3-20068414-260\/hackers-steal-more-customer-info-from-sony-servers\/\">the group posted online<\/a> 150,000 people&#8217;s passwords, names, e-mail addresses, addresses, and phone numbers from SonyPictures.com and Sony BMG&#8217;s Web sites in Belgium and the Netherlands. The group claims there was little complexity involved in overcoming the servers&#8217; security.<\/p>\n<p><!--more--><\/p>\n<p><!-- p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 16.0px Helvetica} p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; font: 16.0px Helvetica; min-height: 19.0px} p.p3 {margin: 0.0px 0.0px 0.0px 0.0px; font: 16.0px Helvetica; color: #003399} span.s1 {color: #000000} -->The cybercrime wave that has affected Sony companies and a number of government agencies, businesses, and individuals in recent months has hit Sony Pictures as well,&#8221; the Sony statement reads.<\/p>\n<p>In addition to working with federal authorities, Sony Pictures has also hired its own &#8220;experts&#8221; to conduct a forensic investigation into the breach, according to Lynton and Pascal.<\/p>\n<p>&#8220;We deeply regret and apologize for any inconvenience caused to consumers by this cybercrime,&#8221; they wrote<\/p>\n<p>Read the original here:<br \/>\n<a title=\"Sony Confirms Lulzsec Compromised Server Data\" href=\"http:\/\/packetstormsecurity.org\/news\/view\/19271\/Sony-Confirms-Lulzsec-Compromised-Server-Data.html\" target=\"_blank\">Sony Confirms Lulzsec Compromised Server Data<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sony Pictures tonight confirmed that some of its Web sites were breached yesterday. In a joint statement, Sony Pictures Chairman and CEO Michael Lynton and Co-chairman Amy Pascal said the&#8230;<\/p>\n","protected":false},"author":439,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[608,606],"class_list":["post-1658","post","type-post","status-publish","format-standard","hentry","category-security","tag-lulzsec","tag-sony"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-qK","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/1658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/439"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=1658"}],"version-history":[{"count":2,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/1658\/revisions"}],"predecessor-version":[{"id":1779,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/1658\/revisions\/1779"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=1658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=1658"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=1658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}