{"id":2005,"date":"2011-06-11T08:46:57","date_gmt":"2011-06-11T01:46:57","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/?p=2005"},"modified":"2011-06-11T09:10:18","modified_gmt":"2011-06-11T02:10:18","slug":"sony-aka-sownage","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2011\/06\/sony-aka-sownage\/","title":{"rendered":"Sony aka Sownage"},"content":{"rendered":"<h3>Absolute Sownage<\/h3>\n<h3>A concise history of recent Sony hacks<\/h3>\n<p>Over the last two months, the multi-national <a href=\"http:\/\/en.wikipedia.org\/wiki\/Sony\">Sony Corporation<\/a> has come under a wide range of attacks from an even wider range of attackers. The backstory about what event prompted who to attack and why will make a mediocre made-for-TV movie someday. This article is not going to cover the brief history of hacks; readers can find details <a href=\"http:\/\/www.thetechherald.com\/article.php\/201121\/7185\/Seven-security-incidents-in-two-months-Sony-s-nightmare-grows\">elsewhere<\/a>.<br \/>\nInstead, the following only serves to create an accurate and comprehensive timeline regarding the recent breaches, a cliff notes summary for easy reference.<\/p>\n<p>Other than Steve Ragan and <a href=\"http:\/\/www.thetechherald.com\/article.php\/201121\/7185\/Seven-security-incidents-in-two-months-Sony-s-nightmare-grows\">The Tech Herald<\/a>, most recent articles about Sony make vague references to ongoing problems, but do not enumerate the full history. This is likely because the past events, while only 45 days old at most, are convoluted and confusing. The table below should serve to fix that, hopefully giving journalists and security professionals a concrete and clear history.<\/p>\n<p><!--more-->One thing should be noted; the attacks against Sony are <strong>not coordinated<\/strong>, nor are they<br \/>\n<em>advanced<\/em>. Sony has demonstrated they have not implemented what any rational administrator or security professional would consider &#8220;the absolute basics&#8221;. Storing millions of customer&#8217;s personal details and passwords without using any form of encryption is reckless and ridiculous. Even security books from the &#8217;80s were adamant about encrypting passwords at the very least. Several of Sony&#8217;s sites have been compromised as a result of basic <a href=\"http:\/\/en.wikipedia.org\/wiki\/SQL_injection\">SQL injection attacks<\/a>, nothing<br \/>\nelaborate or complex.<\/p>\n<p>If anyone&#8230; <strong>ANYONE<\/strong> at all uses the term &#8220;advanced persistent threat&#8221; in describing the<br \/>\nattacks on Sony, please hit them very hard before disregarding them as ignorant charlatans hell-bent on serving their own interests. Given the wide variety of attackers (see below), the attacks on Sony can only be described as an uncoordinated effort at best.<\/p>\n<p>That said, welcome to the recently coined term, &#8220;Sownage&#8221;. The state of being thoroughly &#8220;owned like Sony is&#8221;.<\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"5\" width=\"739\" height=\"3102\" align=\"left\" bordercolor=\"#999999\">\n<tbody>\n<tr>\n<td><span style=\"color: #66ff66;\"><strong>Incident<\/strong><\/span><\/td>\n<td><span style=\"color: #66ff66;\"><strong>Date<\/strong><\/span><\/td>\n<td><span style=\"color: #66ff66;\"><strong>Site<\/strong><\/span><\/td>\n<td><span style=\"color: #66ff66;\"><strong>Stock<\/strong><\/span><\/td>\n<td><span style=\"color: #66ff66;\"><strong>Who (allegedly)<\/strong><\/span><\/td>\n<td><span style=\"color: #66ff66;\"><strong>Observation<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>2011-04-20<\/td>\n<td><a href=\"http:\/\/www.wired.com\/gamelife\/2011\/04\/psn-down\/\">Sony PSN Offline<\/a><\/td>\n<td>30.14<\/td>\n<td><\/td>\n<td>PSN taken offline by Sony due to hack.&nbsp;<\/p>\n<p>Network World has a <a href=\"http:\/\/www.networkworld.com\/news\/2011\/042711-playstation-network-hack.html\">timeline of events related to PSN<\/a>.<\/td>\n<\/tr>\n<tr>\n<td><span>1<\/span><\/td>\n<td>2011-04-26<\/td>\n<td><a href=\"http:\/\/www.wired.com\/gamelife\/2011\/04\/playstation-network-hacked\/\">PlayStation Network (PSN) Hacked<\/a><\/td>\n<td>29.79<\/td>\n<td><a href=\"http:\/\/www.wired.com\/gamelife\/2011\/05\/sony-playstation-network-anonymous\/\">Anonymous<\/a> (?)<\/td>\n<td><a href=\"http:\/\/blog.us.playstation.com\/2011\/04\/26\/update-on-playstation-network-and-qriocity\/\">Sony admits attack took place between April 17 and 19, but did not disclose<br \/>\nuntil around the 26th.<\/a>&nbsp;<\/p>\n<p><strong>Records breached<\/strong>: 77 million names, addresses, email addresses, birthdates, PlayStation Network\/Qriocity passwords and logins, handle\/PSN online ID, profile data, purchase history and possibly credit cards obtained<br \/>\n(<a href=\"http:\/\/datalossdb.org\/incidents\/3634\">DatalossDB Entry<\/a>)<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>2011-04-27<\/td>\n<td><a href=\"http:\/\/arstechnica.com\/gaming\/news\/2011\/04\/ars-readers-report-credit-card-fraud-blame-sony.ars\">Ars readers report credit card fraud, blame Sony<\/a><\/td>\n<td>29.03<\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>2011-04-28<\/td>\n<td><a href=\"http:\/\/www.theregister.co.uk\/2011\/04\/28\/sony_psn_sued\/\">Sony PSN hack triggers lawsuit<\/a>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.joystiq.com\/2011\/04\/28\/sony-online-entertainment-says-its-customer-data-is-safe\/\">Sony says SOE Customer Data Safe<\/a><\/td>\n<td>28.39<\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><span>2<\/span><\/td>\n<td>2011-05-02<\/td>\n<td><a href=\"http:\/\/www.wired.com\/gamelife\/2011\/05\/sony-online-entertainment-hack\/\">Sony Online Entertainment (SOE) hacked<\/a>&nbsp;<\/p>\n<p><a href=\"http:\/\/news.cnet.com\/8301-27080_3-20058962-245.html\">SOE Network Taken Offline<\/a><\/td>\n<td>28.80<\/td>\n<td>(unknown)<\/td>\n<td><a href=\"http:\/\/www.soe.com\/securityupdate\/pressrelease.vm\">Sony Press Release<\/a>.&nbsp;<\/p>\n<p><strong>Records breached<\/strong>: 24.6 million customer dates of birth, email addresses and phone numbers, including 12,700 non-U.S. credit or debit card numbers and expiration dates and about 10,700 direct debit records including bank account numbers<br \/>\n(<a href=\"http:\/\/datalossdb.org\/incidents\/3661\">DatalossDB Entry<\/a>)<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>2011-05-03<\/td>\n<td><a href=\"http:\/\/archives.neohapsis.com\/archives\/dataloss\/2011-05\/0001.html\">Sony Online Entertainment (SOE) issues breach notification letter<\/a><\/td>\n<td>28.44<\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>2011-05-05<\/td>\n<td><a href=\"http:\/\/www.informationweek.com\/news\/security\/attacks\/229402895\">Sony Brings In Forensic Experts On Data Breaches<\/a><\/td>\n<td>27.98<\/td>\n<td><\/td>\n<td>&#8220;Data Forte, Guidance Software, and Protiviti will investigate who hacked into Sony&#8217;s servers and how they cracked the company&#8217;s defenses.&#8221;<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>2011-05-06<\/td>\n<td><a href=\"http:\/\/www.eweek.com\/c\/a\/Security\/Sony-Networks-Lacked-Firewall-Ran-Obsolete-Software-Testimony-103450\/\">Sony Networks Lacked Firewall, Ran Obsolete Software: Testimony<\/a><\/td>\n<td>28.06<\/td>\n<td><\/td>\n<td>Gene Spafford <a href=\"http:\/\/www.cerias.purdue.edu\/site\/blog\/post\/sony_congress_the_media_and_me\/\">wrote an article describing his testimony<\/a>, and how many media outlets misquoted him.<\/td>\n<\/tr>\n<tr>\n<td><span>3<\/span><\/td>\n<td>2011-05-07<\/td>\n<td><a href=\"http:\/\/nakedsecurity.sophos.com\/2011\/05\/07\/sony-succumbs-to-another-hack-leaking-2500-old-records\/\">Sony succumbs to another hack leaking 2,500 &#8220;old records&#8221;<\/a><\/td>\n<td>n\/a<\/td>\n<td>Sony<\/td>\n<td>Note: This information was available via a Sony website and <a href=\"http:\/\/www.google.com\/search?q=site:products.sel.sony.com+filetype:xls\">indexed by Google<\/a>. This was not a &#8220;hack&#8221; by any means.<br \/>\nFile originally found at products.sel.sony.com\/shared\/santa\/dbs\/sweepstake.xls (<a href=\"http:\/\/www.huffingtonpost.com\/2011\/05\/07\/sony-removes-data-stolen-hackers_n_858913.html\">now offline<\/a>)&nbsp;<\/p>\n<p><strong>Records Breached:<\/strong> 2,500 names and partial addresses of 2001 Sony sweepstakes<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>2011-05-12<\/td>\n<td><a href=\"http:\/\/www.reuters.com\/article\/2011\/05\/12\/us-sony-lawsuits-idUSTRE74B5IA20110512\">Lawyers take aim at Sony hack, may miss on payout<\/a><\/td>\n<td>28.23<\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>2011-05-14<\/td>\n<td><a href=\"http:\/\/www.computerworld.com\/s\/article\/9216742\/Sony_resuming_PlayStation_Network_Qriocity_services\">Sony resuming PlayStation Network, Qriocity services<\/a><\/td>\n<td>n\/a<\/td>\n<td><\/td>\n<td>All SOE games\/services were down for a total of 24 days.<\/td>\n<\/tr>\n<tr>\n<td><span>4<\/span><\/td>\n<td>2011-05-17<\/td>\n<td><a href=\"http:\/\/sony.nyleveia.com\/2011\/05\/17\/warning-all-psn-users-your-accounts-are-still-not-safe\/\">PSN Accounts still subject to a vulnerability<\/a><\/td>\n<td>28.07<\/td>\n<td>unknown<\/td>\n<td>With this vulnerability, an attacker has the ability to change a user&#8217;s password using only their account&#8217;s email and date of birth. Rumors suggest it was being exploited by bad guys.&nbsp;<\/p>\n<p><a href=\"http:\/\/thenextweb.com\/industry\/2011\/05\/18\/not-so-fast-sonys-playstation-network-hacked-again\/\">TNW article<\/a> titled &#8220;Not so fast: Sony&#8217;s PlayStation Network hacked again&#8221; is misleading.<\/p>\n<p><a href=\"http:\/\/blog.us.playstation.com\/2011\/05\/18\/update-on-psn-password-reset-process\/\">Sony blog on incident<\/a> (vulnerability fixed)<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>2011-05-18<\/td>\n<td><a href=\"https:\/\/twitter.com\/jadedsecurity\/status\/70943445665062912\">Prolexic rumored to consult with Sony on security<\/a><\/td>\n<td>27.80<\/td>\n<td><\/td>\n<td>&#8220;got a call from a recruiter who swore some company called prolexic was hired to protect Sony from Anonymous&#8221;&nbsp;<\/p>\n<p>Update: Prolexic did provide services to Sony, but only for DDoS mitigation.<\/td>\n<\/tr>\n<tr>\n<td><span>5<\/span><\/td>\n<td>2011-05-20<\/td>\n<td><a href=\"http:\/\/www.f-secure.com\/weblog\/archives\/00002160.html\">Phishing site found on a Sony server<\/a><\/td>\n<td>27.05<\/td>\n<td>unknown<\/td>\n<td>(<a href=\"http:\/\/www.washingtonpost.com\/blogs\/faster-forward\/post\/sony-hit-with-phishing-scam-on-thailand-home-page\/2011\/05\/20\/AFN3Yp7G_blog.html\">additional article<\/a>)<\/td>\n<\/tr>\n<tr>\n<td><span>6<\/span><\/td>\n<td>2011-05-21<\/td>\n<td><a href=\"http:\/\/www.theregister.co.uk\/2011\/05\/21\/sony_subsidiary_hacked\/\">Hack on Sony-owned ISP steals $1,220 in virtual cash<\/a> (So-net Entertainment Corp)<\/td>\n<td>n\/a<\/td>\n<td>unknown<\/td>\n<td>(<a href=\"http:\/\/online.wsj.com\/article\/SB10001424052748704904604576334950941283250.html\">additional article<\/a>)&nbsp;<\/p>\n<p><strong>Records Breached:<\/strong> e-mail and virtual currency of 128 accounts<\/td>\n<\/tr>\n<tr>\n<td><span>7<\/span><\/td>\n<td>2011-05-21<\/td>\n<td><a href=\"http:\/\/www.thehackernews.com\/2011\/05\/sony-music-indonesia-defaced-by.html\">Sony Music Indonesia Defaced By k4L0ng666<\/a><\/td>\n<td>n\/a<\/td>\n<td>k4L0ng666<\/td>\n<td>No evidence of personal information being compromised.<\/td>\n<\/tr>\n<tr>\n<td><span>8<\/span><\/td>\n<td>2011-05-22<\/td>\n<td><a href=\"http:\/\/nakedsecurity.sophos.com\/2011\/05\/22\/sony-bmg-greece-the-latest-hacked-sony-site\/\">Sony BMG Greece the latest hacked Sony site<\/a><\/td>\n<td>n\/a<\/td>\n<td>b4d_vipera<\/td>\n<td>Apparently done via <a href=\"http:\/\/www.thehackernews.com\/2011\/05\/sony-bgm-greece-hack-complete-details.html\">SQL Injection<\/a>. <a href=\"http:\/\/pastebin.com\/WqLysjiN\">Pastebin dump<\/a>&nbsp;<\/p>\n<p><strong>Records Breached:<\/strong> 8,500 usernames, email addresses, phone numbers and password hashes<br \/>\n(<a href=\"http:\/\/datalossdb.org\/incidents\/3770\">DatalossDB Entry<\/a>)<\/td>\n<\/tr>\n<tr>\n<td><span>9<\/span><\/td>\n<td>2011-05-23<\/td>\n<td><a href=\"http:\/\/www.thehackernews.com\/2011\/05\/lulzsec-leak-sonys-japanese-websites.html\">LulzSec leak Sony&#8217;s Japanese Websites<\/a><\/td>\n<td>26.59<\/td>\n<td>LulzSec<\/td>\n<td>SQL Injection in www.sonymusic.co.jp (<a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2385813,00.asp\">article<\/a>)&nbsp;<\/p>\n<p><a href=\"http:\/\/nakedsecurity.sophos.com\/2011\/05\/24\/sony-music-japan-hacked-through-sql-injection-flaw\/\">Sophos says databases do &#8220;not contain names, passwords or other personally identifiable information&#8221;<\/a><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>2011-05-23<\/td>\n<td><a href=\"http:\/\/arstechnica.com\/gaming\/news\/2011\/05\/sony-forecasts-a-31b-loss-for-fiscal-2011-due-to-quake-psn-failure.ars\">Sony forecasts a $3.1B loss for FY 2011 due to quake, PSN failure<\/a>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.joystiq.com\/2011\/05\/23\/psn-breach-and-restoration-to-cost-171m-sony-estimates\/\">PSN breach and restoration to cost $171M, Sony estimates<\/a><\/td>\n<td>26.59<\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><span>10<\/span><\/td>\n<td>2011-05-24<\/td>\n<td><a href=\"http:\/\/www.computerworld.com\/s\/article\/9217028\/Sony_says_hacker_stole_2_000_records_from_Canadian_site\">Sony says hacker stole 2,000 records from Canadian site<\/a> (Sony Erricson)<\/td>\n<td>27.90<\/td>\n<td>Idahc<\/td>\n<td><a href=\"http:\/\/www.thehackernews.com\/2011\/05\/sony-erricson-got-hacked-by-idahca.html\">Sony Ericsson Got Hacked by Idahc &#8211; Lebanese hacker<\/a> via SQL Injection&nbsp;<\/p>\n<p>Idahc dumped 1,000 of the cords to http:\/\/pastebin.com\/4YGAWxQZ (since removed)<\/p>\n<p><strong>Records Breached:<\/strong> Email addresses, passwords and names of 2,000 users<br \/>\n(<a href=\"http:\/\/datalossdb.org\/incidents\/3769\">DatalossDB Entry<\/a>)<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>2011-05-25<\/td>\n<td><a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2385909,00.asp\">Sony Begins Providing ID Theft Protection for PlayStation Hack<\/a><\/td>\n<td>27.65<\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><span>11<\/span><\/td>\n<td>2011-06-02<\/td>\n<td><a href=\"http:\/\/pastebin.com\/Y38gCS82\">LulzSec versus Sony Pictures<\/a><\/td>\n<td>26.54<\/td>\n<td>LulzSec<\/td>\n<td><a href=\"http:\/\/nakedsecurity.sophos.com\/2011\/06\/02\/sony-pictures-attacked-again-4-5-million-records-exposed\/\">Sophos says 4.5 million records exposed<\/a>. LulzSec<br \/>\ninitially thought <a href=\"http:\/\/www.dailytech.com\/EDITORIAL+LulzSec+Targets+Elderly+in+the+Wake+of+Latest+Sony+Hacks\/article21819.htm\">to target the elderly<\/a>, but<br \/>\n<a href=\"https:\/\/twitter.com\/LulzSec\/status\/77845443383525377\">clarify they dumped the database by DoB and stopped at 1943<\/a>.&nbsp;<\/p>\n<p><a href=\"http:\/\/arstechnica.com\/tech-policy\/news\/2011\/06\/lulz-sony-hackers-deny-responsibility-for-misuse-of-leaked-data.ars\">Lulz? Sony hackers deny responsibility for misuse of leaked data<\/a><\/p>\n<p><strong>Records breached:<\/strong> Over 1,000,000 users&#8217; passwords, email addresses, home addresses, dates of birth, as well as administrator login passwords. Information taken from<br \/>\nAutoTrader users database, Summer of Restless Beauty users database, Sony Wonder coupons database, Sony Wonder music codes database, Seinfeld Del Boca Vista database<br \/>\n(<a href=\"http:\/\/datalossdb.org\/incidents\/3790\">DatalossDB Entry<\/a>)<\/td>\n<\/tr>\n<tr>\n<td><span>12<\/span><\/td>\n<td>2011-06-02<\/td>\n<td><a href=\"http:\/\/lulzsecurity.com\/releases\/Sony_BMG_Music_Entertainment_BELGIUM.txt\">Sony BMG Belgium (sonybmg.be) database exposed<\/a><\/td>\n<td>26.54<\/td>\n<td>LulzSec<\/td>\n<td><strong>Records Breached:<\/strong> Email addresses, usernames, cleartext passwords, internal release dates of records, sales reports<br \/>\n(<a href=\"http:\/\/datalossdb.org\/incidents\/3790\">DatalossDB Entry<\/a>)<\/td>\n<\/tr>\n<tr>\n<td><span>13<\/span><\/td>\n<td>2011-06-02<\/td>\n<td><a href=\"http:\/\/lulzsecurity.com\/releases\/Sony_BMG_Music_Entertainment_NETHERLANDS.txt\">Sony BMG Netherlands (sonybmg.nl) database exposed<\/a><\/td>\n<td>26.54<\/td>\n<td>LulzSec<\/td>\n<td><strong>Records Breached:<\/strong> Usernames, cleartext passwords<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>2011-06-02<\/td>\n<td><a href=\"http:\/\/www.govinfosecurity.com\/articles.php?art_id=3697\">Sony, Epsilon Testify Before Congress<\/a><\/td>\n<td>26.54<\/td>\n<td><\/td>\n<td><a href=\"http:\/\/republicans.energycommerce.house.gov\/Media\/file\/Hearings\/CTCP\/060211\/Schaaff.pdf\">Tim Schaaff, President of Sony Network Entertainment International Witness Testimony<\/a> (PDF)&nbsp;<\/p>\n<p>&#8220;Sony Network Entertainment and Sony Online Entertainment have always made<br \/>\nconcerted and substantial efforts to maintain and improve their data security systems.&#8221;<\/td>\n<\/tr>\n<tr>\n<td><span>14<\/span><\/td>\n<td>2011-06-03<\/td>\n<td><a href=\"http:\/\/nakedsecurity.sophos.com\/2011\/06\/04\/sony-europe-hacked-by-lebanese-hacker-again\/\">Sony Europe database leaked<\/a><\/td>\n<td>26.38<\/td>\n<td>Idahc<\/td>\n<td><a href=\"http:\/\/pastebin.com\/aXLkmNmR\">Dump of the apps.pro.sony.eu database<\/a> via SQL Injection&nbsp;<\/p>\n<p><strong>Records Breached:<\/strong> 120 names, phone numbers and e-mail addresses<br \/>\n(<a href=\"http:\/\/datalossdb.org\/incidents\/3829\">DatalossDB Entry<\/a>)<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>2011-06-05<\/td>\n<td><a href=\"http:\/\/www.pcworld.com\/article\/229421\/latest_hack_shows_sony_didnt_plug_holes.html\">Latest Hack Shows Sony Didn&#8217;t Plug Holes<\/a><\/td>\n<td><\/td>\n<td><\/td>\n<td>&#8220;Group members said their motivation was to show Sony execs weren&#8217;t telling the truth when they tried to reassure customers they had revamped security to prevent the simple, almost identical exploits<br \/>\nthat allowed a range of hackers to take over one of its networks after another beginning in mid-April.&#8221;<\/td>\n<\/tr>\n<tr>\n<td><span>15<\/span><\/td>\n<td>2011-06-05<\/td>\n<td><a href=\"http:\/\/pastebin.com\/Ubw6kCVW\">Sony Pictures Russia (www.sonypictures.ru) databases leaked<\/a><\/td>\n<td><\/td>\n<td>unknown<\/td>\n<td>Another SQL injection attack. @LulzSec <a href=\"http:\/\/twitter.com\/LulzSec\/statuses\/77668119237238784\">confirms they did not find it<\/a>.&nbsp;<\/p>\n<p><strong>Records Breached:<\/strong> all (?) databases of Sony Pictures Russia<\/td>\n<\/tr>\n<p><!-- http:\/\/www.allgeek.tv\/2011\/06\/05\/sony-pictures-russia-exposed-by-sql-injection\/\t\tUpdated saying attacker unknown. http:\/\/news.cnet.com\/8301-27080_3-20069443-245\/hackers-taunt-sony-with-more-data-leaks-hacks\/\tElinor Mills said LulzSec, fixed within minutes of being told http:\/\/www.thetechherald.com\/article.php\/201123\/7237\/Sony-Pictures-suffers-another-attack-as-security-problems-mount\tSteve Ragan said LulzSec, fixed within minutes of being told http:\/\/www.dailytech.com\/EDITORIAL+LulzSec+Targets+Elderly+in+the+Wake+of+Latest+Sony+Hacks\/article21819.htm\tJason Mick said LulzSec, quietly updated day+ later --><\/p>\n<tr>\n<td><\/td>\n<td>2011-06-06<\/td>\n<td><a href=\"http:\/\/www.theepochtimes.com\/n2\/technology\/lulzsec-member-arrested-group-leaks-sony-database-57296.html\">LulzSec member arrested<\/a><\/td>\n<td><\/td>\n<td><\/td>\n<td>Based on a <a href=\"http:\/\/seclists.org\/fulldisclosure\/2011\/Jun\/75\">post to Full-Disclosure<\/a>, rumors that a member of LulzSec was arrested<br \/>\n<a href=\"http:\/\/www.theepochtimes.com\/n2\/technology\/following-arrest-lulzsec-still-going-strong-57312.html\">circulated widely<\/a>.<br \/>\nThis news was included in <a href=\"http:\/\/ps3.ign.com\/articles\/117\/1173177p1.html\">several articles<\/a> that did not validate the information.<br \/>\nLulzSec <a href=\"http:\/\/pastebin.com\/yut4P6qN\">issued a statement<\/a><br \/>\nsaying the news was wrong, and that &#8220;ev0&#8221; was not a member of the group. Arik Hesseldahl actually contacted a source at the FBI to confirm this<br \/>\nand <a href=\"http:\/\/allthingsd.com\/20110606\/no-lulzsec-hackers-have-been-arrested-at-least-not-yet\/\">covered the details in an article<\/a>.<\/td>\n<\/tr>\n<tr>\n<td><span>16<\/span><\/td>\n<td>2011-06-06<\/td>\n<td><a href=\"http:\/\/blogs.forbes.com\/parmyolson\/2011\/06\/06\/lulzsec-hackers-posts-sony-dev-source-code-get-7k-donation\/\">LulzSec Hackers Post Sony Computer Entertainment Developer Network (SCE Devnet)<\/a><\/td>\n<td>25.76<\/td>\n<td>LulzSec<\/td>\n<td>(<a href=\"http:\/\/allthingsd.com\/20110606\/lulzsec-posts-more-sony-data-amid-claim-one-of-them-is-arrested\/?mod=socialflow\">additional article #1<\/a>),<br \/>\n(<a href=\"http:\/\/www.theepochtimes.com\/n2\/technology\/lulzsec-member-arrested-group-leaks-sony-database-57296.html\">additional article #2<\/a>),&nbsp;<\/p>\n<p><a href=\"http:\/\/lulzsecurity.com\/releases\/sownage_2_press_release.txt\">LulzSec &#8220;press release&#8221; on incident<\/a><\/p>\n<p><strong>Data Leaked:<\/strong> 54meg torrent of Sony Computer Entertainment Developer Network (<a href=\"http:\/\/www.scedev.net\/\">SCE Devnet<\/a>) source code<\/td>\n<\/tr>\n<tr>\n<td><span>17<\/span><\/td>\n<td>2011-06-06<\/td>\n<td><a href=\"http:\/\/news.cnet.com\/8301-27080_3-20069443-245\/hackers-taunt-sony-with-more-data-leaks-hacks\/\">LulzSec hits Sony BMG, leaks internal network maps<\/a>&gt;<\/td>\n<td>25.76<\/td>\n<td>LulzSec<\/td>\n<td>While @LulzSec released the data in <a href=\"http:\/\/thepiratebay.org\/torrent\/6449737\/Sownage_2\">one torrent<\/a>, the group<br \/>\n<a href=\"https:\/\/twitter.com\/LulzSec\/status\/77947731041206272\">confirmed the BMG maps did not come from SCE Devnet<\/a> (tweet since deleted), making this a<br \/>\ndistinct and separate compromise.&nbsp;<\/p>\n<p><strong>Data Leaked:<\/strong> Sony BMG internal network maps<\/td>\n<\/tr>\n<p><!-- http:\/\/www.scmagazineus.com\/an-open-letter-to-the-network-security-industry\/article\/204606\/  Peter George, president and CEO, Fidelis Security Systems first to mention Sony + APT --><\/p>\n<tr>\n<td><span>18<\/span><\/td>\n<td>2011-06-08<\/td>\n<td><a href=\"http:\/\/nakedsecurity.sophos.com\/2011\/06\/09\/sony-portugal-latest-to-fall-to-hackers\">Sony Portugal latest to fall to hackers<\/a><\/td>\n<td>25.25<\/td>\n<td>Idahc<\/td>\n<td>Dump of the sonymusic.pt database. <a href=\"http:\/\/pastebin.com\/LMhNAAaG\">Idahc says<\/a> he found SQL injection, cross-site scripting (XSS) and Iframe injection vulnerabilities in the site.&nbsp;<\/p>\n<p><strong>Records Breached:<\/strong> Customer e-mail addresses<\/td>\n<\/tr>\n<tr>\n<td><span>19<\/span><\/td>\n<td>2011-06-08<\/td>\n<td><a href=\"http:\/\/www.sony.jp\/info\/20110609.html\">Spoofing lead to fraud via shopping coupons at Sonisutoa \/ My Sony Club<\/a> (<a href=\"http:\/\/translate.google.com\/translate?js=n&amp;prev=_t&amp;hl=en&amp;ie=UTF-8&amp;layout=2&amp;eotf=1&amp;sl=ja&amp;tl=en&amp;u=http%3A%2F%2Fwww.sony.jp%2Finfo%2F20110609.html\">Google Translation<\/a>)<\/td>\n<td>25.25<\/td>\n<td>unknown<\/td>\n<td>Through &#8220;spoofing&#8221;, an attacker used 95 accounts to exchange online shopping coupons worth 278,000 points at Sonisutoa (My Sony Club), defrauding Sony of ~ 280,000 yen (~ US$3,500). Sony cannot<br \/>\nconfirm if e-mail addresses or passwords were leaked.<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>2011-06-11<\/td>\n<td><a href=\"http:\/\/mashable.com\/2011\/06\/10\/anonymous-hacker-suspects-arrested\/\">Spain Arrests 3 Suspects in Sony Hacking Case<\/a><\/td>\n<td><\/td>\n<td><\/td>\n<td>From the article: &#8220;According to a <a href=\"http:\/\/www.policia.es\/prensa\/20110610_2.html\">police statement<\/a>, the suspects are part of Anonymous..&#8221;<\/td>\n<\/tr>\n<p><!--\n\n\n<tr>\n\n\n<td><\/td>\n\n\n\n\n<td><\/td>\n\n\n\n\n<td><\/td>\n\n\n\n\n<td><\/td>\n\n\n\n\n<td><\/td>\n\n\n\n\n<td><\/td>\n\n\n<\/tr>\n\n\n--><\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Note:<\/p>\n<ul>\n<li>This table does not include any Denial of Service (DoS) attacks against Sony.<\/li>\n<li>Several sources including news outlets and blogs consider the first DoS attack by Anonymous against Sony as the first attack.<\/li>\n<li>Stock has been on a steady decline for a long time before these events<\/li>\n<\/ul>\n<h3>Legacy Sony Events<\/h3>\n<p>Given the recent testimony from Tim Schaaff, President of Sony Network Entertainment International,<br \/>\none may be led to believe that Sony has been proactive in their digital security. Schaaff told the Subcommittee on Commerce, Manufacturing and Trade, part of the House of Representatives Energy &amp; Commerce Committee, that &#8220;Sony Network Entertainment and Sony Online Entertainment have always made concerted and substantial efforts to maintain and improve their data security systems.&#8221; Looking at a brief, and very likely incomplete, history of Sony&#8217;s hacking problems, this statement seems absurd.<\/p>\n<p>Schaaff goes on to say &#8220;The attack on us was, we believe, unprecedented in its size and scope.&#8221;<br \/>\nWith the string of recent high-profile attacks against <a href=\"http:\/\/www.reuters.com\/article\/2011\/06\/02\/us-lockheed-china-idUSTRE7517B120110602\">Lockheed Martin<\/a>,<br \/>\n<a href=\"http:\/\/bits.blogs.nytimes.com\/2011\/04\/02\/the-rsa-hack-how-they-did-it\/\">RSA Security<\/a>, and<br \/>\n<a href=\"http:\/\/arstechnica.com\/tech-policy\/news\/2011\/02\/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars\/\">HBGary Federal<\/a> (by the same<br \/>\ngroup allegedly involved in the Sony PSN hack), this comment seems disingenuous. Further,<br \/>\nbetween 2001-02-05 and 2001-05-05, Sony was attacked and compromised 11 times.<\/p>\n<p>While this is a slightly bigger time frame than the recent activity (2011-04-17 to 2011-06-02), given the first run was in 2001 and attacks were arguably less frequent (while defacements were considered high profile and got a lot of attention), can Sony really<br \/>\nback up this comment?<\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"5\" width=\"389\" height=\"1261\" align=\"left\" bordercolor=\"#999999\">\n<tbody>\n<tr>\n<td><span style=\"color: #66ff66;\"><strong>Date<\/strong><\/span><\/td>\n<td><span style=\"color: #66ff66;\"><strong>Description<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td>1999-11-28<\/td>\n<td><a href=\"\/mirror\/attrition\/1999\/11\/28\/sony.com.pa\/\">Sony Panama website defaced<\/a> (Requires Auth)<\/td>\n<\/tr>\n<tr>\n<td>2000-11-29<\/td>\n<td><a href=\"\/mirror\/attrition\/2000\/11\/29\/www.sony.ch\/\">Sony Chile website defaced<\/a> (Requires Auth)<\/td>\n<\/tr>\n<tr>\n<td>2000-12-22<\/td>\n<td><a href=\"\/mirror\/attrition\/2000\/12\/22\/www.sony.com.mx\">Sony Mexixco website defaced<\/a> (Requires Auth)<\/td>\n<\/tr>\n<tr>\n<td>2001-01-01<\/td>\n<td><a href=\"\/mirror\/attrition\/2001\/01\/01\/www.sonystyle.com.mx\/\">SonyStyle Mexico website defaced<\/a> (Requires Auth)<\/td>\n<\/tr>\n<tr>\n<td>2001-02-05<\/td>\n<td><a href=\"\/mirror\/attrition\/2001\/02\/05\/www.sony.it\/\">Sony Italy website defaced<\/a> (Requires Auth)<\/td>\n<\/tr>\n<tr>\n<td>2001-02-18<\/td>\n<td><a href=\"\/mirror\/attrition\/2001\/02\/18\/www.sony.com.tw\/\">Sony Taiwan website defaced<\/a> (Requires Auth)<\/td>\n<\/tr>\n<tr>\n<td>2001-02-28<\/td>\n<td><a href=\"\/mirror\/attrition\/2001\/02\/28\/www.sony.co.kr\/\">Sony Korea website defaced<\/a> (Requires Auth)<\/td>\n<\/tr>\n<tr>\n<td>2001-03-17<\/td>\n<td><a href=\"\/mirror\/attrition\/2001\/03\/17\/www.sony.cl\/\">Sony Chile website defaced<\/a> (Requires Auth)<\/td>\n<\/tr>\n<tr>\n<td>2001-03-18<\/td>\n<td><a href=\"\/mirror\/attrition\/2001\/03\/18\/www.sony.fr\/\">Sony France website defaced<\/a> (Requires Auth)<\/td>\n<\/tr>\n<tr>\n<td>2001-03-27<\/td>\n<td><a href=\"\/mirror\/attrition\/2001\/03\/27\/www.foundry.sony.com\/\">Sony Semiconductor website defaced<\/a> (Requires Auth)<\/td>\n<\/tr>\n<tr>\n<td>2001-03-29<\/td>\n<td><a href=\"\/mirror\/attrition\/2001\/03\/29\/sawebp1.sel.sony.com\/\">Sony Computing Knowledge Base website defaced<\/a> (Requires Auth)<\/td>\n<\/tr>\n<tr>\n<td>2001-04-03<\/td>\n<td><a href=\"\/mirror\/attrition\/2001\/04\/03\/thestore.sonymusic.com\/\">Sony Music Store defaced<\/a> (Requires Auth)<\/td>\n<\/tr>\n<tr>\n<td>2001-04-11<\/td>\n<td><a href=\"\/mirror\/attrition\/2001\/04\/11\/www.sony-training.com\/\">Sony TrainNet website defaced<\/a> (Requires Auth)<\/td>\n<\/tr>\n<tr>\n<td>2001-05-01<\/td>\n<td><a href=\"\/mirror\/attrition\/2001\/05\/01\/www.sonytv.com.br\/\">Sony TV Brazil website defaced<\/a> (Requires Auth)<\/td>\n<\/tr>\n<tr>\n<td>2001-05-05<\/td>\n<td><a href=\"\/mirror\/attrition\/2001\/05\/05\/www.sony.co.in\/\">Sony India website defaced<\/a> (Requires Auth)<\/td>\n<\/tr>\n<tr>\n<td>2006-05-31<\/td>\n<td><a href=\"http:\/\/zone-h.com\/news\/id\/4302\">Sony BMG IT \/ UK websites defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2006-06-06<\/td>\n<td><a href=\"http:\/\/zone-h.com\/news\/id\/4311\">Sony Music UK website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2006-08-15<\/td>\n<td><a href=\"http:\/\/zone-h.com\/news\/id\/4420\">Sony Philippines website defaced<\/a><\/td>\n<\/tr>\n<p><!--\n\n\n<tr>\n\n\n<td>2007-09-04<\/td>\n\n\n\n\n<td><a href=\"http:\/\/news.bbc.co.uk\/2\/hi\/technology\/6975838.stm\" _mce_href=\"http:\/\/news.bbc.co.uk\/2\/hi\/technology\/6975838.stm\">Sony MicroVault USB sticks found with virus-like software\/backdoor<\/a><\/td>\n\n\n<\/tr>\n\n\n--><\/p>\n<tr>\n<td>2009-04-21<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/8791650\">Sony New Zealand website defaced<\/a><\/td>\n<\/tr>\n<p><!--\n\n\n<tr>\n\n\n<td>2009-01-16<\/td>\n\n\n\n\n<td><a href=\"http:\/\/www.informationweek.com\/blog\/main\/archives\/2009\/01\/thiefs_steals_s.html\" _mce_href=\"http:\/\/www.informationweek.com\/blog\/main\/archives\/2009\/01\/thiefs_steals_s.html\">Thief Steals Sony Ericsson Prototypes<\/a><\/td>\n\n\n<\/tr>\n\n\n--><\/p>\n<tr>\n<td>2009-05-13<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/8877353\">Sony Pictures Uganda website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2009-05-28<\/td>\n<td><a href=\"http:\/\/datalossdb.org\/incidents\/2072\">Unauthorized copies of customers credit cards were emailed to an outside account<\/a><\/td>\n<\/tr>\n<tr>\n<td>2009-06-03<\/td>\n<td><a href=\"http:\/\/doj.nh.gov\/consumer\/pdf\/sony.pdf\">Sony Rewards (sonyrewards.com) Breach<\/a><\/td>\n<\/tr>\n<tr>\n<td>2009-06-19<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/9008966\">Sony Music Philippines website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2009-07-31<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/9308344\">Sony BMG Brazil website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2009-07-31<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/9308343\">Sony Music Brazil website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2009-10-15<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/9774620\">Sony Music Korea website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2009-10-15<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/9776579\">Sony BMG Music Hungary website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2009-10-15<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/9776578\">Sony Music Hungary website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2009-12-06<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/9968036\">Sony Photocontest Iran website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2009-12-11<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/9987080\">Sony Walkman India website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2010-03-23<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/10406911\">Sony Pictures Argentina website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2010-03-23<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/10412379\">Sony Music Germany (afh.sonymusic.de) website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2010-05-26<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/10771505\">Sony BMG Netherlands (uc.sonybmg.nl) website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2010-09-19<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/11502173\">Sony Music Store (Celine Dione site) website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2010-09-20<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/11502172\">Sony Music Store (Bob Dylan site) website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2010-11-12<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/12239088\">Sony BMG Brazil website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2010-11-12<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/12239087\">Sony Music Brazil website defaced<\/a> (Remains <a href=\"http:\/\/wwwery.com\/2011\/06\/05\/sony-music-brazil-hacked\/\">defaced until 2011-06-05<\/a>),&nbsp;<\/p>\n<p>defacement removed ~ 2011-06-07 <a href=\"http:\/\/www.theregister.co.uk\/2011\/06\/08\/sony_brazilian_site_suspended\/\">after media attention<\/a> of the defacement.<\/p>\n<p>Site only shows a &#8220;You are not authorized to view this page&#8221; default IIS page.<\/td>\n<\/tr>\n<tr>\n<td>2010-12-01<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/12546201\">Sony Club Iran (sonyclub.sony.co.ir) website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2010-12-27<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/12775734\">Sony Iran (babyphoto.sony.co.ir) website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2011-01-17<\/td>\n<td><a href=\"http:\/\/www.joystiq.com\/2011\/01\/17\/ps3-hackers-make-modern-warfare-2-unplayable-infinity-ward-ca\/\">Sony PS3 hackers make Modern Warfare 2 &#8216;unplayable&#8217;<\/a><\/td>\n<\/tr>\n<tr>\n<td>2011-02-01<\/td>\n<td><a href=\"http:\/\/www.zone-h.org\/mirror\/id\/12989699\">Sony Music Czech Republic (sonymusic.cz) website defaced<\/a><\/td>\n<\/tr>\n<tr>\n<td>2011-02-19<\/td>\n<td><a href=\"http:\/\/www.gameinformer.com\/b\/news\/archive\/2011\/02\/19\/ps3-hackers-can-now-unban-themselves.aspx\">PS3 Hackers Can Now Unban Themselves<\/a><\/td>\n<\/tr>\n<p><!--\n\n\n<tr>\n\n\n<td><\/td>\n\n\n\n\n<td><\/td>\n\n\n<\/tr>\n\n\n--><\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Note: This list is likely incomplete, and just represents a quick search of past Sony activity related<br \/>\nto the insecurity of their networks.<\/p>\n<h4>Timeline of updates to this article:<\/h4>\n<p>Jun 4 Update: Elinor Mills pointed out the 06\/03 Europe database event<\/p>\n<p>Jun 4 Update: Kane Lightowler sent 20 legacy events<\/p>\n<p>Jun 4 Update: Gene Spafford sent a link to his blog about his testimony<\/p>\n<p>Jun 4 Update: Several pointed out Sony rootkit drama. Updated note disclaiming scope of legacy table<\/p>\n<p>Jun 4 Update: @pctservices01 provided link about PS3 Hackers Unbanning<\/p>\n<p>Jun 4 Update: Tuna informs me that Prolexic provided DDoS mitigation services only<\/p>\n<p>Jun 5 Update: Peter Downey provided link about PS3 Hackers \/ Modern Warfare 2<\/p>\n<p>Jun 5 Update: Added SNE closing stock price for the day of each incident. Idea courtesy Ryan Russell<\/p>\n<p>Jun 5 Update: @LulzSec points out two missing compromises on Jun 6<\/p>\n<p>Jun 5 Update: Sony Music Brazil defacement confirmed as happening ~ 2010-11-12, and remains unfixed since (thanks Kane Lightowler)<\/p>\n<p>Jun 6 Update: Added Network World&#8217;s timeline for the PSN breach<\/p>\n<p>Jun 6 Update: Added confirmation to Sony Russia, that @LulzSec was not responsible<\/p>\n<p>Jun 6 Update: Added clarification about LulzSec targeting elderly to 6\/2 Sony Pictures incident<\/p>\n<p>Jun 6 Update: Added entry to cover the supposed news of a LulzSec member being arrested<\/p>\n<p>Jun 9 Update: Added link to DatalossDB for #14<\/p>\n<p>Jun 9 Update: Thanks to @MasafumiNegishi and @superspryte for translation help<\/p>\n<p>&nbsp;<\/p>\n<p>Credits: <a title=\"Sownage\" href=\"http:\/\/attrition.org\/security\/rants\/sony_aka_sownage.html\" target=\"_blank\">Attrition<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the last two months, the multi-national Sony Corporation has come under a wide range of attacks from an even wider range of attackers. The backstory about what event prompted who to attack and why will make a mediocre made-for-TV movie someday. This article is not going to cover the brief history of hacks; readers can find details elsewhere.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[612],"tags":[],"class_list":["post-2005","post","type-post","status-publish","format-standard","hentry","category-sony-2"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-wl","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/2005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=2005"}],"version-history":[{"count":8,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/2005\/revisions"}],"predecessor-version":[{"id":2007,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/2005\/revisions\/2007"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=2005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=2005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=2005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}