How The Hackers Broke Into Sony And Why It Could Happen To Any Company

Advertisement

hackerPichi Chuang/Reuters

What hackers have done to Sony Pictures is astounding. How did they do it?

Advertisement

There have been just enough details leaked to the press and analyzed by security experts to put it together:

This was something called a "targeted attack." That means the hackers specifically set out to break into Sony. A targeted attack is the hardest to stop.

Complimentary Tech Event
Transform talent with learning that works
Capability development is critical for businesses who want to push the envelope of innovation.Discover how business leaders are strategizing around building talent capabilities and empowering employee transformation.Know More

"Against a sufficiently skilled, funded and motivated attacker, all networks are vulnerable," wrote renowned security expert Bruce Schneier about the Sony attack.

The hackers said they gained access to Sony's networks from inside Sony. In November, after the attack was made public, several journalists said they contacted the group that claimed responsibility, "Guardians of Peace" (GOP).

Advertisement

"Sony left their doors unlocked, and it bit them. They don't do physical security anymore," a GOP member known as "Lena" told CSO Magazine.

"Physical security" is hacker-speak for things like doors, windows, keycards, and video cameras.

The hackers said sympathetic employees let them into the building. "Lena" told The Verge, "Sony doesn't lock their doors, physically, so we worked with other staff with similar interests to get in." We don't know whether these employees were knowingly helping hackers or were tricked into helping.

The hackers reportedly stole a key password from someone in IT. US investigators told CNN that the hackers stole the computer credentials of a system administrator, which gave them broad access to Sony's computer systems.

One on the network, they planted malware. Some security experts as well as documents obtained by Ars Technica say that that this was a form of "wiper" malware. Generally that refers to malware designed to destroy the data, although in this case they used malware to collect data, too. The malware used Microsoft Windows management and network file sharing features to spread, shut down the network, and reboot computers, reports Ars Technica.

Advertisement

This "wiper" was apparently a variant of the type that a group called DarkSeoul used on South Korean banks last year. The FBI confirmed that the Sony malware found resembled that used in the bank hack.

The malware found and stole other passwords. The GOP told Sony it had grabbed private files, computer source code files for software, and files that held passwords for Oracle and SQL databases, among other documents. With access to that, the GOP grabbed data on movie production schedules, emails, financial documents and much more and published much of it.

Security experts say this is where Sony was particularly weak. It could have used layers of security which would have prevented them from grabbing so much information even after breaking in. Many companies don't want to spend money on extra security that would specially protect email servers, password files, databases. That's a big lesson any company can learn. Use layers of security protection that can stop hackers after they break in.

The malware transmitted information back to other computers. The malware was communicating to computers elsewhere, including in Japan - possibly other computers on Sony's own network. Some of the malware was written in Korean, Ars Technica and others report.

On the day of the hack, employees turned on computers and found this message on their screens, according to emails of the message sent to various journalists.

Advertisement

Sony Pictures hackImgur

Ultimately the hackers threatened Sony with a terrorist attack if they didn't pull the move "The Interview" from theaters. It was a comedy about trying to assassinate North Korean dictator Kim Jong-un.

Sony bowed to the pressure and pulled the picture, and on Friday, the FBI reported that "the North Korean government is responsible" for the hack.

Not everyone believes that North Korea was responsible, though.

Sony hasn't issued technical details about the attack, but it is busy trying to spin the situation, especially after President Obama himself said on Friday that the company should not have caved and yanked the movie from theaters.

Advertisement