Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Obama: U.S. Will Respond 'Proportionately' To Sony Cyber Attack
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2014 | 10:45:28 AM
Re: Go offensive
True. They must have been downloading data for a while. This is not something that can be downloaded quickly unless they compromised physical backup types or disks they must have been working on it quite some time, giving the fact that wide area bandwidth is not generally high.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2014 | 10:42:04 AM
Re: Sony is just another company that is wide open
Malware similarities are mainly irrelevant if it is already released to public. There has to be better evidence than that to convince other about it.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2014 | 10:39:27 AM
Re: Sony is just another company that is wide open
There may not be any opportunities after all. The risk is that if we constantly get what the treat is wrong, it is not going to be easy go us to avoid them in the future, simply because we could not be building an international coalition to overcome difficulties.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2014 | 10:35:19 AM
Get even?
There is growing group of experts believe that there is no enough evidence that two my attack is dine by North Korea. So our focus should be offensive for sure but not attacking to other countries infrastructure. We need to our offensive approaches to close the vulnerability holes including super admins being fired and going against the company assets.
SgS125
50%
50%
SgS125,
User Rank: Ninja
12/23/2014 | 8:55:54 AM
Re: Sony is just another company that is wide open
OH my, I'm not saying any three letter agency has hacked anyone, just pointing out that an opportunity like this one never gets wasted.  By either side.
ODA155
50%
50%
ODA155,
User Rank: Ninja
12/22/2014 | 2:51:14 PM
Re: Sony is just another company that is wide open
@SgS125... stevew928... Personally, I believe what I see and not the person who yells the loudest or tries to insult the worst, what I do believe is that Sony has (currently) and has had poor security practices for a while. Again, as I've mentioned this is not their first or second rodeo. Nobody can 100% protect their networks from intrusion, but in my opinion three hacks in 5 years lays the problem squarley at Sony's doorstep, regardless who hacked them.

Here's a question(s) for you... what would any "three letter agency" have to gain by hacking Sony and blaming in on N.K.? This can out today... "The North Koreans said they didn't hack Sony, but be prepared for more."... if they didn't do it, why would they make that threat... are they working with our "three letter agencies"...? Why Sony and not a sewage treatment plant or some power generation plant in Montana or Washington?

Oh yeah, I did see the reports of"Regin".
SgS125
50%
50%
SgS125,
User Rank: Ninja
12/22/2014 | 2:03:20 PM
Re: Sony is just another company that is wide open
https://firstlook.org/theintercept/2014/11/24/secret-regin-malware-belgacom-nsa-gchq/

 

So on November 24th we hear about US Malware, then on Dec 1st we hear warnings about "new" malware threat that turns into Sony hack.

Plenty of other news artciles out there on interesting structure of the malware found to be close to stuxnet with signitures supposodly tying the brits.  But hey who should we believe these days? right?  Becuase our three letter agencies have always been truthiness in their answers.  
stevew928
50%
50%
stevew928,
User Rank: Strategist
12/22/2014 | 1:45:12 PM
Re: Go offensive
Inside job.
stevew928
50%
50%
stevew928,
User Rank: Strategist
12/22/2014 | 1:43:53 PM
Re: Sony is just another company that is wide open
I think so. You've been listening to too much media, I suppose and possibly trusting the President. Check the link I posted above to get you started.
stevew928
50%
50%
stevew928,
User Rank: Strategist
12/22/2014 | 1:41:16 PM
Re: Sony is just another company that is wide open
Not necessarily. They've cooked up some talking points, for sure. Beyond that, who (that can actually make a difference) is going to question it?

You might want to follow this:

marcrogers (dot) org/2014/12/18/why-the-sony-hack-is-unlikely-to-be-the-work-of-north-korea/
Page 1 / 2   >   >>


5 Ways to Up Your Threat Management Game
Wayne Reynolds, Advisory CISO, Kudelski Security,  2/26/2020
Google Adds More Security Features Via Chronicle Division
Robert Lemos, Contributing Writer,  2/25/2020
Cybersecurity Industry: It's Time to Stop the Victim Blame Game
Jessica Smith, Senior Vice President, The Crypsis Group,  2/25/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9463
PUBLISHED: 2020-02-28
Centreon 19.10 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the server_ip field in JSON data in an api/internal.php?object=centreon_configuration_remote request.
CVE-2020-5247
PUBLISHED: 2020-02-28
In Puma (RubyGem) before 4.3.2 and 3.12.2, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This...
CVE-2020-9447
PUBLISHED: 2020-02-28
The file-upload feature in GwtUpload 1.0.3 allows XSS via a crafted filename.
CVE-2019-10064
PUBLISHED: 2020-02-28
hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.
CVE-2019-8741
PUBLISHED: 2020-02-28
A denial of service issue was addressed with improved input validation.