Sony employees face 'weeks of pen and paper' after crippling network hack

Megastars' details may have been pinched – report

Sony Pictures still hasn't recovered from a comprehensive attack on its computer networks – and staff have been reduced to doing their work by hand – according to insiders.

The infiltration by hackers has left Sony employees "sitting at their desks trying to do their job with a pen and paper," a staffer told the Financial Times. "It's the same all over the world."

Bosses have told their teams that it could take three weeks to clean up the mess and get things get back to normal. Sony Pictures, which has offices globally, is best known for its Spider-Man, Men In Black and James Bond flicks.

Sony, the parent corporation, is best known for installing rootkits on people's PCs, back in the mid-2000s.

Earlier this week, miscreants calling themselves the Guardians of Peace claimed responsibility for breaking into computer systems and vandalism the intranet of Sony Pictures – an intrusion that left the firm's computers and movie-promoting Twitter accounts under outside control.

The group is also drip-feeding swiped internal documents to the online world. It's not clear if they came from individuals' PCs within Sony, or if the hackers got into protected corporate servers. These files apparently include passport scans for actors Jonah Hill, Cameron Diaz and Angelina Jolie.

A spokesperson for the media goliath said its techies are "investigating an IT matter," and would not comment further on the security breach.

The trouble at Sony may be worth bringing up the next time your managers question the IT security team's budget. Saving pennies will make firms look very, very silly when the bill comes in after a comprehensive ransacking of systems by black hats. ®

Similar topics

Broader topics

Other stories you might like

  • Israeli air raid sirens triggered in possible cyberattack
    Source remains unclear, plenty suspect Iran

    Air raid sirens sounded for over an hour in parts of Jerusalem and southern Israel on Sunday evening – but bombs never fell, leading some to blame Iran for compromising the alarms. 

    While the perpetrator remains unclear, Israel's National Cyber Directorate did say in a tweet that it suspected a cyberattack because the air raid sirens activated were municipality-owned public address systems, not Israel Defense Force alarms as originally believed. Sirens also sounded in the Red Sea port town of Eilat. 

    Netizens on social media and Israeli news sites pointed the finger at Iran, though a diplomatic source interviewed by the Jerusalem Post said there was no certainty Tehran was behind the attack. The source also said Israel faces cyberattacks regularly, and downplayed the significance of the incident. 

    Continue reading
  • Hackers weigh in on programming languages of choice
    Small, self-described sample, sure. But results show shifts over time

    Never mind what enterprise programmers are trained to do, a self-defined set of hackers has its own programming language zeitgeist, one that apparently changes with the wind, at least according to the relatively small set surveyed.

    Members of Europe's Chaos Computer Club, which calls itself "Europe's largest association of hackers" were part of a pool for German researchers to poll. The goal of the study was to discover what tools and languages hackers prefer, a mission that sparked some unexpected results.

    The researchers were interested in understanding what languages self-described hackers use, and also asked about OS and IDE choice, whether or not an individual considered their choice important for hacking and how much experience they had as a programmer and hacker.

    Continue reading
  • Stolen-data market RaidForums taken down in domain seizure
    Suspected admin who went by 'Omnipotent' awaits UK decision on extradition to US

    After at least six years of peddling pilfered personal information, the infamous stolen-data market RaidForums has been shut down following the arrest of suspected founder and admin Diogo Santos Coelho in the UK earlier this year.

    Coelho, 21, who allegedly used the mistaken moniker "Omnipotent" among others, according to the US indictment unsealed on Monday in the Eastern District of Virginia, is currently awaiting the outcome of UK legal proceedings to extradite him to the United States.

    The six-count US indictment [PDF] charges Coelho with conspiracy, access device fraud, and aggravated identity theft following from his alleged activities as the chief administrator of RaidForums, an online market for compromised or stolen databases containing personal and financial information.

    Continue reading

Biting the hand that feeds IT © 1998–2022