Shocking: Sony Learned No Password Lessons After The 2011 PSN Hack
from the sony-is-as-sony-does dept
The great Sony hack of 2014: what's it all about? Is it a subversive plot by North Koreans operating out of China in revenge for a film starring two guys from Freaks and Geeks? Or maybe it's simply fodder for stupid politicians to remind us that all the world's ills could be cured if only internet service providers took on the challenge of fixing all the things in all the places? No, my dear friends, no. The Sony hack of 2014 is a beautiful Christmas gift (your religious holiday may vary) of a wake-up call to anyone silly enough to think that Sony would bother to learn the lessons very recent history has tried to teach it.
To prove this, one need only review the latest file dump in the leak, which features the wonderful naivete of whatever bright minds are in charge of Sony's internal password conventions and storage policies.
In a small file titled "Bonus.rar," hackers included a folder named "Password." It's exactly what it sounds like: 140 files containing thousands upon thousands of private passwords, virtually all of them stored in plaintext documents without protection of any kind. Some seem personal in nature ("karrie's Passwords.xls") while others are wider in scope ("YouTube login passwords.xls"). Many are tied to financial accounts like American Express, while others provide access to corporate voicemail accounts or internal servers, and come conveniently paired with full names, addresses, phone numbers, and emails.
In case you're unfamiliar with the hack against Sony's Playstation Network a mere three years ago, the problem was -- you guessed it -- the exact same thing. In that case, the hack produced customer names, addresses, emails and login/password information because that information was stored in plain text, contrary to the advice of every competent network security person on the planet. Take, for instance, one security researcher quoted in the link above:
Passwords in plaintext? These guys are pretty bad - I don't think I've ever encountered this before. What's the point of using common password storage/hashing techniques if your staff is keeping all your passwords in plain text on open fileshares? Shit, why bother having locks on the doors at all?The worst of all the problem's this hack revealed is that this question should have been answered in the wake of the events of three years ago. It's one thing to screw up. It's quite another to screw up in a manner that went public in a spectacular way and simply refuse to take measures to ensure it doesn't happen again. But that's Sony for you: long live plain text.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: hack, password, sony hack
Companies: sony, sony pictures
Reader Comments
Subscribe: RSS
View by: Time | Thread
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
There's a truism in the security world: if something can be accessed legally, it can be accessed illegally. My personal corollary to that is: even if you can't stop the intruder, you can at least make his life harder.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
Everyone can look up on the interwebs how to make a tumbler lock. But best of luck to you in opening a 7 lever one without the key!
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
X is an amount where shareholders might lose value, or actually take the board to task if they figure out they did nothing after the last time.
So first it was random hackers, then North Korea, then a variant of some other malware... anyone notice a theme?
Facing harsh well financed hackers their systems fell after the security was breached.
They spent more on PR after Sownage than on fixing the issues. They will never have to pay themselves for the failures, the costs will be passed down to those people they managed to screw while keeping the bosses country club memberships up to date. Politicians are blaming anything remotely related to the internet as being at fault, it lets them push other pet projects they have going.
This company failed to learn from over 20 lessons, and once again wants to play the we are the poor victims card. If you forget to lock your door and get robbed, you are a victim. If you fail to lock your door 23 times, you are an idiot... especially in a world where you can buy a lock off the shelf that self locks... but that was to expensive to bother with, and now you want people to feel sorry for you.
Perhaps one should question any pay raises or bonuses that were given, and ask could they have paid for actual security with it. But multimillion dollar liability and lawsuits from not only the little people but other millionaires perhaps maybe the message will make it across exactly how badly they screwed this up and THIS time they might tie a string on their finger to remind them to lock the door.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
This is different.
Target had their customer's credit card information exposed. The news of this directly impacted their revenues and profits. Subsequently this led to their executive overseeing IT leaving the company. The liability of this is over customer protection laws.
Now Sony had their HR and payroll data exposed. That won't impact their customers directly. But it will affect their workforce morale. Can't say how much this will indirectly impact their revenues or costs. Any liability here will be over worker protection laws...
The effect of having their internal people up in arms over IT will be interesting to observe.
[ link to this | view in chronology ]
If one division in a large corporation sneezes, it does not mean the rest gets shots
[ link to this | view in chronology ]
Re: If one division in a large corporation sneezes, it does not mean the rest gets shots
I also believe that this hack and the sorts of data that were stolen is far less due to it being Sony and more a common problem with movie studios. The people who work at studios are extremely both non-technical and not interested in becoming technical. Passwords only exist because the IT nerds like making everyone else's life miserable. So the simplest way to keep track of multiple passwords is to put them in a text file and share them. What I find far more unfathomable is why were there DVD quality digital copies of upcoming movies accessible on a network connected to the internet? Normally one would expect those sorts of assets to be kept isolated via an air gap.
[ link to this | view in chronology ]
Re: Re: If one division in a large corporation sneezes, it does not mean the rest gets shots
[ link to this | view in chronology ]
Time for a change of viewpoint
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Disagree with the anonymous security researcher
[ link to this | view in chronology ]
Re: Disagree with the anonymous security researcher
There is no valid excuse/reason to store passwords in plain text.
Why is a company like Sony, with lots of money, not implementing Two-Factor authentication? Passwords will get compromised, if you do not have protections against that you will get P0wned.
Reading some RSA token device and typing the code IS too hard for some drones. There are other two factor devices such as Yubikeys that even a monkey could be taught to do, plug into USB port, press button.
There is no excuse to NOT have two-factor auth. Technology is readily available and cheap.
[ link to this | view in chronology ]
Re: Re: Disagree with the anonymous security researcher
[ link to this | view in chronology ]
Re: Re: Disagree with the anonymous security researcher
If you are using a common password for a group of people you already lack any real security.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Put the Company on the line
Bottom line: Everyone is going to get hacked sometime. The real issue is how quickly do you discover it, and how do you handle it once you find out?
If your company sucks at security, so should your business prospects.
[ link to this | view in chronology ]
Re: Put the Company on the line
With this, Sony has proven themselves to be a menace to the community. If I were a regulator, I'd be looking real hard right about now at the possibility of revoking their corporate charter.
[ link to this | view in chronology ]
Re: Put the Company on the line
Absolutely. Don't buy anything from Sony and this will be the result.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Only logical
:)
[ link to this | view in chronology ]
When I hear "The Great Sony Hack"
[ link to this | view in chronology ]
Double Bogey is par
[ link to this | view in chronology ]
I really need to upgrade to a computer with hardware visualization support. Then I can run my password manager in a virtual machine that has no network access. Then just copy/paste username/passwords between VMs using the clipboard. Hackers might intercept a few of my passwords through the clipboard, but at least they won't get my master password.
A more secure alternative is buying a dedicated offline computer for password management. This approach is rather inconvenient though. I'd have to manually type each username/password in by hand, in order to transfer the passwords between the offline machine and the online machine.
Perhaps I can refactor a smartphone into an offline computer for dedicated password management. I'd have to disable the the cellular baseband modem, wifi, and bluetooth on the phone. But at least it's small enough for me to carry around so I have my passwords everywhere I go.
I think I'll go with the dedicated computer method. That way I always have my passwords on me in the form of a pocket sized offline computer. Now I just need to find a reliable password manager compiled for Arm processors.
The only thing to watch out for is losing your pocket sized computer which holds all your passwords on it. I'll have to make regular backups of the password manager's encrypted database, stored on the phone's SD card, and store it in the cloud or a some other location in case my house burns down.
I'm learning a lot for the Sony breach. I wonder if Sony is too.
[ link to this | view in chronology ]
Re:
Or maybe get out an old smartphone and physically disconnect the antennas.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Why aren't average_joe and Rudyard Holmbast up in arms about this copyright infringement?
[ link to this | view in chronology ]
Sony mobile service center in chennai
Sony mobile Service center in Chennai
[ link to this | view in chronology ]
[ link to this | view in chronology ]
thanks
[ link to this | view in chronology ]
add me
[ link to this | view in chronology ]