×

Warning

JUser: :_load: Unable to load user with ID: 4269

How Sony Pictures was hacked and how it can happen to you.

Published: 24 December 2014

It’s unclear who hacked Sony Pictures Entertainment on Nov. 24, but there are the telltale signs of a carefully orchestrated attack.

Rick Crouch, founder and owner of Rick Crouch & Associates said “Sony Pictures Entertainment appears to have been victimized by what experts call an advanced persistent threat. (APT)”

“The attack has the hallmarks of an A.P.T.,” he explained. “The hackers had a specific target in mind. It’s not like they were after just any company or studio, it looks like they specifically went after Sony”

But in his estimation there’s nothing the studios — or any company — can do to completely eliminate the threat of hackers.

“We need to re-think our perceptions about cyber-security. This is not something where you can achieve 100 percent security,” he explained. “As long as you are online there will be threats. In some cases they will already be inside your company or organisation, like a disgruntled employee who could be anyone from a personal assistant, a manager to an IT employee.  Once someone gets inside your systems they shouldn't have the keys to the kingdom. They shouldn't be able to go anywhere and everywhere within your system.”

The way Sony was hacked was actually quite simple and is a method that is used by many hackers involved in corporate espionage.

In this case they looked for names of employees that worked on this particular movie, just watching the movie credits or a simple Google search would have given them that information, they would then have narrowed that list down to high ranking IT personnel, because IT people usually have access to the entire network. The next step would have been to send an email to that employee and spoofing it so that it appeared to come from a co-worker, the content of the email would have contained a link and a reason for that person to click on the link, which they would have because it was from a co-worker.

That link would have then taken them to a website which would, within seconds, have downloaded malware to that computer. That malware would then enable the hacker’s computer to “mirror” the infected computer. The hacker would be able to see everything that is typed on the infected computer as if they were sitting in front of the target computer, including usernames and passwords.

That is a simplistic explanation of what happened to Sony and can happen just as easily to your company or your personal computer. Ensure that you employ defences to this type of hack, most importantly educating staff on these tactics and how to respond.

What happens when there is no competition and the government of the day has socialist leanings?

Published: 05 January 2010
{pp}The Eskom debacle is a prime example of what happens when there is no competition and the government of the day has socialist leanings wanting to centralize everything to consolidate its power.

Government should encourage people to be self sufficient

Published: 05 January 2010
{pp}Socialist type governments continue to think that they can tax themselves out of debt, the working person can only sustain so much taxation, especially with the large increase in electricity looming.

Government should get out of the business of doing business.

Published: 05 January 2010
{pp}The current financial woes of the SABC is a prime example of why government should get out of the business of doing business.

Making a mockery of democracy

Published: 05 January 2010
{pp}We have to get rid of the system that rewards party loyalty or we will never have a true democracy.