SlideShare a Scribd company logo
SONY PICTURES CRIPPLED BY GOP HACKERS, 2014
Overview
• Attack on Sony Pictures…Nov 24, 2014 by GOP - “Guardians of Peace”
• 111 Terabytes of Data Stolen
• Suspected Origin: North Korea
• 7 lawsuits filed against Sony, so far
• Controversy over “The Interview” which made $46 million to date
• Trojan designed for Sony’s network.
Sony Pictures hack
• On November 24, 2014, a hacker group which identified
name "Guardians of Peace" (GOP) leaked a release of
data from the film studio Sony Pictures.
itself by the
confidential
• The data included personal information about Sony Pictures
employees and their families, e-mails between employees,
information about executive salaries at the company, copies of then-
unreleased Sony films, and other information.
• The perpetrators then employed a variant of
the Shamoon wiper malware to erase Sony's computer infrastructure.
The Shamoon Wiper Malware
• Shamoon ,also known as W32.DisTrack,is a modular computer virus
targeting recent 32-bit NT kernel versions of Microsoft Windows. The
virus has been noted to have behaviour differing from other malware
attacks, due to the destructive nature and the cost of the attack and
recovery.Shamoon can spread from an infected machine to other
computers on the network. Once a system is infected, the virus
continues to compile a list of files from specific locations on the
system, upload them to the attacker, and erase them.
• A wiper is a class of malware whose intention is to wipe the hard
drive of the computer it infects.
Demands of GOP
• In November 2014, the GOP group demanded that Sony withdraw its
film The Interview , a comedy about a plot to assassinate North
Korean leader Kim Jong-un , and threatened terrorist attacks at
cinemas screening the film.
• After major U.S. cinema chains opted not to screen the film in
response to these threats, Sony elected to cancel the film's formal
premiere and mainstream release, opting to skip directly to a
downloadable digital release followed by a limited digital theatrical
release the next day.
Attack Timeline for Sony Pictures, Nov – Dec
2014
Data stolen and leaked
• Personal data on employees
• Movies and Scripts
• Performance reports and salary information
• Source code, Private keys, passwords, certificates
• Production schedules, Box office projections
• Executives email correspondence
• Brad Pitt phone number
Movie Leaks
• A few days after the the initial breach report was announced, four torrent
links were published to torrent trackers that contained unreleased movies
from Sony, obtained by GOP during the attack. According to several
torrent tracking sites, these files have been downloaded over 100,000
times.
• NBC News aired a segment reporting that the FBI were investigating the
breach and the possibility that North Korea was involved. North Korea has
a clear motive in attacking Sony. Sony is releasing a movie called The
Interview , which follows the story of two celebrity TV hosts that get a
chance to interview Kim Jong-un. Before heading to North Korea, they are
asked by the C.I.A. to assassinate him. Despite the movie being labelled a
comedy, North Korea has stated that if the movie is released, they would
consider it an “act of war”.
Conclusion
• United States intelligence officials, after evaluating the software,
techniques, and network sources used in the hack, alleged that the
attack was sponsored by north korea.

More Related Content

What's hot

Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
Santhosh Prabhu
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Cyber Agency
 
Social engineering
Social engineeringSocial engineering
Social engineering
Vishal Kumar
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
Jawhar Ali
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
Kirti Ahirrao
 
Social engineering
Social engineeringSocial engineering
Social engineering
Maulik Kotak
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
phexcom1
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
mohamed nasri
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
scoopnewsgroup
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
Ahmed Hashem El Fiky
 
Social engineering
Social engineeringSocial engineering
Social engineering
ankushmohanty
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
NTT Innovation Institute Inc.
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
Luke Rusten
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
msaksida
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
OWASP Delhi
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threat
zhihaochen
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
Deepak Kumar
 

What's hot (20)

Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threat
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 

Similar to Sony pictures crippled by gop hackers, 2014 cs ala

On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdf
aabdin101
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
accuraprintengineers
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case AAshley Chase
 
a. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfa. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdf
anupamele
 
The Tech section in Forbes magazine reported that the crimi.pdf
The Tech section in Forbes magazine reported that the crimi.pdfThe Tech section in Forbes magazine reported that the crimi.pdf
The Tech section in Forbes magazine reported that the crimi.pdf
abyssiniaimpex1
 
APT & Data Breach - Lesson Learned
APT & Data Breach - Lesson LearnedAPT & Data Breach - Lesson Learned
APT & Data Breach - Lesson Learned
Ade Ismail Isnan
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docx
joshua2345678
 
The Hack of the Century - Sony Hack
The Hack of the Century -  Sony HackThe Hack of the Century -  Sony Hack
The Hack of the Century - Sony Hack
Zayed Iqbal Abir
 
According to an online article titled ‘The Interview A guide to t.docx
According to an online article titled ‘The Interview A guide to t.docxAccording to an online article titled ‘The Interview A guide to t.docx
According to an online article titled ‘The Interview A guide to t.docx
nettletondevon
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15haney888
 
Go to the CNN Money website to read the article titled What caused .docx
Go to the CNN Money website to read the article titled What caused .docxGo to the CNN Money website to read the article titled What caused .docx
Go to the CNN Money website to read the article titled What caused .docx
starkeykellye
 
Does a Bear Leak in the Woods?
Does a Bear Leak in the Woods?Does a Bear Leak in the Woods?
Does a Bear Leak in the Woods?
ThreatConnect
 
Software Security & Network Security
Software Security & Network SecuritySoftware Security & Network Security
Software Security & Network Security
Maruf Hasan
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
Raghunath G
 
Anonymous
AnonymousAnonymous
Anonymousdiscon
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
Dylan Holbrook
 
Anonymous
AnonymousAnonymous
Anonymous
neovas
 
Current issues on cyber terror presentation
Current issues on cyber terror presentationCurrent issues on cyber terror presentation
Current issues on cyber terror presentation
Brian_Andre
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSecPositive Hack Days
 

Similar to Sony pictures crippled by gop hackers, 2014 cs ala (19)

On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdf
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case A
 
a. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfa. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdf
 
The Tech section in Forbes magazine reported that the crimi.pdf
The Tech section in Forbes magazine reported that the crimi.pdfThe Tech section in Forbes magazine reported that the crimi.pdf
The Tech section in Forbes magazine reported that the crimi.pdf
 
APT & Data Breach - Lesson Learned
APT & Data Breach - Lesson LearnedAPT & Data Breach - Lesson Learned
APT & Data Breach - Lesson Learned
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docx
 
The Hack of the Century - Sony Hack
The Hack of the Century -  Sony HackThe Hack of the Century -  Sony Hack
The Hack of the Century - Sony Hack
 
According to an online article titled ‘The Interview A guide to t.docx
According to an online article titled ‘The Interview A guide to t.docxAccording to an online article titled ‘The Interview A guide to t.docx
According to an online article titled ‘The Interview A guide to t.docx
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15
 
Go to the CNN Money website to read the article titled What caused .docx
Go to the CNN Money website to read the article titled What caused .docxGo to the CNN Money website to read the article titled What caused .docx
Go to the CNN Money website to read the article titled What caused .docx
 
Does a Bear Leak in the Woods?
Does a Bear Leak in the Woods?Does a Bear Leak in the Woods?
Does a Bear Leak in the Woods?
 
Software Security & Network Security
Software Security & Network SecuritySoftware Security & Network Security
Software Security & Network Security
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
 
Anonymous
AnonymousAnonymous
Anonymous
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
 
Anonymous
AnonymousAnonymous
Anonymous
 
Current issues on cyber terror presentation
Current issues on cyber terror presentationCurrent issues on cyber terror presentation
Current issues on cyber terror presentation
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSec
 

More from vaibhav tailor

Numerical integration;Gaussian integration one point, two point and three poi...
Numerical integration;Gaussian integration one point, two point and three poi...Numerical integration;Gaussian integration one point, two point and three poi...
Numerical integration;Gaussian integration one point, two point and three poi...
vaibhav tailor
 
Flow of viscous fluid through circular pipe
Flow of viscous fluid through circular pipeFlow of viscous fluid through circular pipe
Flow of viscous fluid through circular pipe
vaibhav tailor
 
Series solutions at ordinary point and regular singular point
Series solutions at ordinary point and regular singular pointSeries solutions at ordinary point and regular singular point
Series solutions at ordinary point and regular singular point
vaibhav tailor
 
Recapitulation of carnot,otto and diesel cycle, dual cycle,comparison of ott...
Recapitulation of  carnot,otto and diesel cycle, dual cycle,comparison of ott...Recapitulation of  carnot,otto and diesel cycle, dual cycle,comparison of ott...
Recapitulation of carnot,otto and diesel cycle, dual cycle,comparison of ott...
vaibhav tailor
 
Gibbs phase rule and lever rule
Gibbs phase rule and lever ruleGibbs phase rule and lever rule
Gibbs phase rule and lever rule
vaibhav tailor
 
Money
MoneyMoney
Cases of eccentric loading in bolted joints
Cases of eccentric loading in bolted jointsCases of eccentric loading in bolted joints
Cases of eccentric loading in bolted joints
vaibhav tailor
 
Flow through pipes
Flow through pipesFlow through pipes
Flow through pipes
vaibhav tailor
 
The taylor hobson talysurf surface roughness tester
The taylor hobson talysurf surface roughness testerThe taylor hobson talysurf surface roughness tester
The taylor hobson talysurf surface roughness tester
vaibhav tailor
 
Physical significance of non dimensional numbers
Physical significance of non dimensional numbersPhysical significance of non dimensional numbers
Physical significance of non dimensional numbers
vaibhav tailor
 
Operation of reciprocating pump
Operation of reciprocating pumpOperation of reciprocating pump
Operation of reciprocating pump
vaibhav tailor
 
Intro to production management and plant layout
Intro to production management and plant layoutIntro to production management and plant layout
Intro to production management and plant layout
vaibhav tailor
 
Concentric springs, surge phenomenon in spring, helical torsion, spiral spring
Concentric springs, surge phenomenon in spring, helical torsion, spiral springConcentric springs, surge phenomenon in spring, helical torsion, spiral spring
Concentric springs, surge phenomenon in spring, helical torsion, spiral spring
vaibhav tailor
 
Classification of clutches, torque transmission capacity, considerations for ...
Classification of clutches, torque transmission capacity, considerations for ...Classification of clutches, torque transmission capacity, considerations for ...
Classification of clutches, torque transmission capacity, considerations for ...
vaibhav tailor
 
USM Ultra Sonic Machinig
USM Ultra Sonic MachinigUSM Ultra Sonic Machinig
USM Ultra Sonic Machinig
vaibhav tailor
 
Refrigerant condenser and its types
Refrigerant condenser and its typesRefrigerant condenser and its types
Refrigerant condenser and its types
vaibhav tailor
 
Surface Hardening of Steel
Surface Hardening of SteelSurface Hardening of Steel
Surface Hardening of Steel
vaibhav tailor
 
Milling cutters
Milling cuttersMilling cutters
Milling cutters
vaibhav tailor
 
Laplace transform & fourier series
Laplace transform & fourier seriesLaplace transform & fourier series
Laplace transform & fourier series
vaibhav tailor
 
Graphical interfacing standards
Graphical interfacing standardsGraphical interfacing standards
Graphical interfacing standards
vaibhav tailor
 

More from vaibhav tailor (20)

Numerical integration;Gaussian integration one point, two point and three poi...
Numerical integration;Gaussian integration one point, two point and three poi...Numerical integration;Gaussian integration one point, two point and three poi...
Numerical integration;Gaussian integration one point, two point and three poi...
 
Flow of viscous fluid through circular pipe
Flow of viscous fluid through circular pipeFlow of viscous fluid through circular pipe
Flow of viscous fluid through circular pipe
 
Series solutions at ordinary point and regular singular point
Series solutions at ordinary point and regular singular pointSeries solutions at ordinary point and regular singular point
Series solutions at ordinary point and regular singular point
 
Recapitulation of carnot,otto and diesel cycle, dual cycle,comparison of ott...
Recapitulation of  carnot,otto and diesel cycle, dual cycle,comparison of ott...Recapitulation of  carnot,otto and diesel cycle, dual cycle,comparison of ott...
Recapitulation of carnot,otto and diesel cycle, dual cycle,comparison of ott...
 
Gibbs phase rule and lever rule
Gibbs phase rule and lever ruleGibbs phase rule and lever rule
Gibbs phase rule and lever rule
 
Money
MoneyMoney
Money
 
Cases of eccentric loading in bolted joints
Cases of eccentric loading in bolted jointsCases of eccentric loading in bolted joints
Cases of eccentric loading in bolted joints
 
Flow through pipes
Flow through pipesFlow through pipes
Flow through pipes
 
The taylor hobson talysurf surface roughness tester
The taylor hobson talysurf surface roughness testerThe taylor hobson talysurf surface roughness tester
The taylor hobson talysurf surface roughness tester
 
Physical significance of non dimensional numbers
Physical significance of non dimensional numbersPhysical significance of non dimensional numbers
Physical significance of non dimensional numbers
 
Operation of reciprocating pump
Operation of reciprocating pumpOperation of reciprocating pump
Operation of reciprocating pump
 
Intro to production management and plant layout
Intro to production management and plant layoutIntro to production management and plant layout
Intro to production management and plant layout
 
Concentric springs, surge phenomenon in spring, helical torsion, spiral spring
Concentric springs, surge phenomenon in spring, helical torsion, spiral springConcentric springs, surge phenomenon in spring, helical torsion, spiral spring
Concentric springs, surge phenomenon in spring, helical torsion, spiral spring
 
Classification of clutches, torque transmission capacity, considerations for ...
Classification of clutches, torque transmission capacity, considerations for ...Classification of clutches, torque transmission capacity, considerations for ...
Classification of clutches, torque transmission capacity, considerations for ...
 
USM Ultra Sonic Machinig
USM Ultra Sonic MachinigUSM Ultra Sonic Machinig
USM Ultra Sonic Machinig
 
Refrigerant condenser and its types
Refrigerant condenser and its typesRefrigerant condenser and its types
Refrigerant condenser and its types
 
Surface Hardening of Steel
Surface Hardening of SteelSurface Hardening of Steel
Surface Hardening of Steel
 
Milling cutters
Milling cuttersMilling cutters
Milling cutters
 
Laplace transform & fourier series
Laplace transform & fourier seriesLaplace transform & fourier series
Laplace transform & fourier series
 
Graphical interfacing standards
Graphical interfacing standardsGraphical interfacing standards
Graphical interfacing standards
 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 

Sony pictures crippled by gop hackers, 2014 cs ala

  • 1. SONY PICTURES CRIPPLED BY GOP HACKERS, 2014
  • 2. Overview • Attack on Sony Pictures…Nov 24, 2014 by GOP - “Guardians of Peace” • 111 Terabytes of Data Stolen • Suspected Origin: North Korea • 7 lawsuits filed against Sony, so far • Controversy over “The Interview” which made $46 million to date • Trojan designed for Sony’s network.
  • 3. Sony Pictures hack • On November 24, 2014, a hacker group which identified name "Guardians of Peace" (GOP) leaked a release of data from the film studio Sony Pictures. itself by the confidential • The data included personal information about Sony Pictures employees and their families, e-mails between employees, information about executive salaries at the company, copies of then- unreleased Sony films, and other information. • The perpetrators then employed a variant of the Shamoon wiper malware to erase Sony's computer infrastructure.
  • 4. The Shamoon Wiper Malware • Shamoon ,also known as W32.DisTrack,is a modular computer virus targeting recent 32-bit NT kernel versions of Microsoft Windows. The virus has been noted to have behaviour differing from other malware attacks, due to the destructive nature and the cost of the attack and recovery.Shamoon can spread from an infected machine to other computers on the network. Once a system is infected, the virus continues to compile a list of files from specific locations on the system, upload them to the attacker, and erase them. • A wiper is a class of malware whose intention is to wipe the hard drive of the computer it infects.
  • 5. Demands of GOP • In November 2014, the GOP group demanded that Sony withdraw its film The Interview , a comedy about a plot to assassinate North Korean leader Kim Jong-un , and threatened terrorist attacks at cinemas screening the film. • After major U.S. cinema chains opted not to screen the film in response to these threats, Sony elected to cancel the film's formal premiere and mainstream release, opting to skip directly to a downloadable digital release followed by a limited digital theatrical release the next day.
  • 6. Attack Timeline for Sony Pictures, Nov – Dec 2014
  • 7. Data stolen and leaked • Personal data on employees • Movies and Scripts • Performance reports and salary information • Source code, Private keys, passwords, certificates • Production schedules, Box office projections • Executives email correspondence • Brad Pitt phone number
  • 8. Movie Leaks • A few days after the the initial breach report was announced, four torrent links were published to torrent trackers that contained unreleased movies from Sony, obtained by GOP during the attack. According to several torrent tracking sites, these files have been downloaded over 100,000 times. • NBC News aired a segment reporting that the FBI were investigating the breach and the possibility that North Korea was involved. North Korea has a clear motive in attacking Sony. Sony is releasing a movie called The Interview , which follows the story of two celebrity TV hosts that get a chance to interview Kim Jong-un. Before heading to North Korea, they are asked by the C.I.A. to assassinate him. Despite the movie being labelled a comedy, North Korea has stated that if the movie is released, they would consider it an “act of war”.
  • 9.
  • 10. Conclusion • United States intelligence officials, after evaluating the software, techniques, and network sources used in the hack, alleged that the attack was sponsored by north korea.