SlideShare a Scribd company logo
1 of 10
SONY PICTURES CRIPPLED BY GOP HACKERS, 2014
Overview
• Attack on Sony Pictures…Nov 24, 2014 by GOP - “Guardians of Peace”
• 111 Terabytes of Data Stolen
• Suspected Origin: North Korea
• 7 lawsuits filed against Sony, so far
• Controversy over “The Interview” which made $46 million to date
• Trojan designed for Sony’s network.
Sony Pictures hack
• On November 24, 2014, a hacker group which identified
name "Guardians of Peace" (GOP) leaked a release of
data from the film studio Sony Pictures.
itself by the
confidential
• The data included personal information about Sony Pictures
employees and their families, e-mails between employees,
information about executive salaries at the company, copies of then-
unreleased Sony films, and other information.
• The perpetrators then employed a variant of
the Shamoon wiper malware to erase Sony's computer infrastructure.
The Shamoon Wiper Malware
• Shamoon ,also known as W32.DisTrack,is a modular computer virus
targeting recent 32-bit NT kernel versions of Microsoft Windows. The
virus has been noted to have behaviour differing from other malware
attacks, due to the destructive nature and the cost of the attack and
recovery.Shamoon can spread from an infected machine to other
computers on the network. Once a system is infected, the virus
continues to compile a list of files from specific locations on the
system, upload them to the attacker, and erase them.
• A wiper is a class of malware whose intention is to wipe the hard
drive of the computer it infects.
Demands of GOP
• In November 2014, the GOP group demanded that Sony withdraw its
film The Interview , a comedy about a plot to assassinate North
Korean leader Kim Jong-un , and threatened terrorist attacks at
cinemas screening the film.
• After major U.S. cinema chains opted not to screen the film in
response to these threats, Sony elected to cancel the film's formal
premiere and mainstream release, opting to skip directly to a
downloadable digital release followed by a limited digital theatrical
release the next day.
Attack Timeline for Sony Pictures, Nov – Dec
2014
Data stolen and leaked
• Personal data on employees
• Movies and Scripts
• Performance reports and salary information
• Source code, Private keys, passwords, certificates
• Production schedules, Box office projections
• Executives email correspondence
• Brad Pitt phone number
Movie Leaks
• A few days after the the initial breach report was announced, four torrent
links were published to torrent trackers that contained unreleased movies
from Sony, obtained by GOP during the attack. According to several
torrent tracking sites, these files have been downloaded over 100,000
times.
• NBC News aired a segment reporting that the FBI were investigating the
breach and the possibility that North Korea was involved. North Korea has
a clear motive in attacking Sony. Sony is releasing a movie called The
Interview , which follows the story of two celebrity TV hosts that get a
chance to interview Kim Jong-un. Before heading to North Korea, they are
asked by the C.I.A. to assassinate him. Despite the movie being labelled a
comedy, North Korea has stated that if the movie is released, they would
consider it an “act of war”.
Conclusion
• United States intelligence officials, after evaluating the software,
techniques, and network sources used in the hack, alleged that the
attack was sponsored by north korea.

More Related Content

What's hot

Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
 
Social engineering
Social engineeringSocial engineering
Social engineeringMaulik Kotak
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptxSanthosh Prabhu
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliAhtasham Ali
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesLearningwithRayYT
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 

What's hot (20)

Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
Ransomware
RansomwareRansomware
Ransomware
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 

Similar to Sony pictures crippled by gop hackers, 2014 cs ala

On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfaabdin101
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfaccuraprintengineers
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case AAshley Chase
 
a. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfa. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfanupamele
 
The Tech section in Forbes magazine reported that the crimi.pdf
The Tech section in Forbes magazine reported that the crimi.pdfThe Tech section in Forbes magazine reported that the crimi.pdf
The Tech section in Forbes magazine reported that the crimi.pdfabyssiniaimpex1
 
APT & Data Breach - Lesson Learned
APT & Data Breach - Lesson LearnedAPT & Data Breach - Lesson Learned
APT & Data Breach - Lesson LearnedAde Ismail Isnan
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxjoshua2345678
 
The Hack of the Century - Sony Hack
The Hack of the Century -  Sony HackThe Hack of the Century -  Sony Hack
The Hack of the Century - Sony HackZayed Iqbal Abir
 
According to an online article titled ‘The Interview A guide to t.docx
According to an online article titled ‘The Interview A guide to t.docxAccording to an online article titled ‘The Interview A guide to t.docx
According to an online article titled ‘The Interview A guide to t.docxnettletondevon
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15haney888
 
Go to the CNN Money website to read the article titled What caused .docx
Go to the CNN Money website to read the article titled What caused .docxGo to the CNN Money website to read the article titled What caused .docx
Go to the CNN Money website to read the article titled What caused .docxstarkeykellye
 
Does a Bear Leak in the Woods?
Does a Bear Leak in the Woods?Does a Bear Leak in the Woods?
Does a Bear Leak in the Woods?ThreatConnect
 
Software Security & Network Security
Software Security & Network SecuritySoftware Security & Network Security
Software Security & Network SecurityMaruf Hasan
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecRaghunath G
 
Anonymous
AnonymousAnonymous
Anonymousdiscon
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case StudyDylan Holbrook
 
Anonymous
AnonymousAnonymous
Anonymousneovas
 
Current issues on cyber terror presentation
Current issues on cyber terror presentationCurrent issues on cyber terror presentation
Current issues on cyber terror presentationBrian_Andre
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSecPositive Hack Days
 

Similar to Sony pictures crippled by gop hackers, 2014 cs ala (19)

On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdf
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case A
 
a. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfa. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdf
 
The Tech section in Forbes magazine reported that the crimi.pdf
The Tech section in Forbes magazine reported that the crimi.pdfThe Tech section in Forbes magazine reported that the crimi.pdf
The Tech section in Forbes magazine reported that the crimi.pdf
 
APT & Data Breach - Lesson Learned
APT & Data Breach - Lesson LearnedAPT & Data Breach - Lesson Learned
APT & Data Breach - Lesson Learned
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docx
 
The Hack of the Century - Sony Hack
The Hack of the Century -  Sony HackThe Hack of the Century -  Sony Hack
The Hack of the Century - Sony Hack
 
According to an online article titled ‘The Interview A guide to t.docx
According to an online article titled ‘The Interview A guide to t.docxAccording to an online article titled ‘The Interview A guide to t.docx
According to an online article titled ‘The Interview A guide to t.docx
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15
 
Go to the CNN Money website to read the article titled What caused .docx
Go to the CNN Money website to read the article titled What caused .docxGo to the CNN Money website to read the article titled What caused .docx
Go to the CNN Money website to read the article titled What caused .docx
 
Does a Bear Leak in the Woods?
Does a Bear Leak in the Woods?Does a Bear Leak in the Woods?
Does a Bear Leak in the Woods?
 
Software Security & Network Security
Software Security & Network SecuritySoftware Security & Network Security
Software Security & Network Security
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
 
Anonymous
AnonymousAnonymous
Anonymous
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
 
Anonymous
AnonymousAnonymous
Anonymous
 
Current issues on cyber terror presentation
Current issues on cyber terror presentationCurrent issues on cyber terror presentation
Current issues on cyber terror presentation
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSec
 

More from vaibhav tailor

Numerical integration;Gaussian integration one point, two point and three poi...
Numerical integration;Gaussian integration one point, two point and three poi...Numerical integration;Gaussian integration one point, two point and three poi...
Numerical integration;Gaussian integration one point, two point and three poi...vaibhav tailor
 
Flow of viscous fluid through circular pipe
Flow of viscous fluid through circular pipeFlow of viscous fluid through circular pipe
Flow of viscous fluid through circular pipevaibhav tailor
 
Series solutions at ordinary point and regular singular point
Series solutions at ordinary point and regular singular pointSeries solutions at ordinary point and regular singular point
Series solutions at ordinary point and regular singular pointvaibhav tailor
 
Recapitulation of carnot,otto and diesel cycle, dual cycle,comparison of ott...
Recapitulation of  carnot,otto and diesel cycle, dual cycle,comparison of ott...Recapitulation of  carnot,otto and diesel cycle, dual cycle,comparison of ott...
Recapitulation of carnot,otto and diesel cycle, dual cycle,comparison of ott...vaibhav tailor
 
Gibbs phase rule and lever rule
Gibbs phase rule and lever ruleGibbs phase rule and lever rule
Gibbs phase rule and lever rulevaibhav tailor
 
Cases of eccentric loading in bolted joints
Cases of eccentric loading in bolted jointsCases of eccentric loading in bolted joints
Cases of eccentric loading in bolted jointsvaibhav tailor
 
The taylor hobson talysurf surface roughness tester
The taylor hobson talysurf surface roughness testerThe taylor hobson talysurf surface roughness tester
The taylor hobson talysurf surface roughness testervaibhav tailor
 
Physical significance of non dimensional numbers
Physical significance of non dimensional numbersPhysical significance of non dimensional numbers
Physical significance of non dimensional numbersvaibhav tailor
 
Operation of reciprocating pump
Operation of reciprocating pumpOperation of reciprocating pump
Operation of reciprocating pumpvaibhav tailor
 
Intro to production management and plant layout
Intro to production management and plant layoutIntro to production management and plant layout
Intro to production management and plant layoutvaibhav tailor
 
Concentric springs, surge phenomenon in spring, helical torsion, spiral spring
Concentric springs, surge phenomenon in spring, helical torsion, spiral springConcentric springs, surge phenomenon in spring, helical torsion, spiral spring
Concentric springs, surge phenomenon in spring, helical torsion, spiral springvaibhav tailor
 
Classification of clutches, torque transmission capacity, considerations for ...
Classification of clutches, torque transmission capacity, considerations for ...Classification of clutches, torque transmission capacity, considerations for ...
Classification of clutches, torque transmission capacity, considerations for ...vaibhav tailor
 
USM Ultra Sonic Machinig
USM Ultra Sonic MachinigUSM Ultra Sonic Machinig
USM Ultra Sonic Machinigvaibhav tailor
 
Refrigerant condenser and its types
Refrigerant condenser and its typesRefrigerant condenser and its types
Refrigerant condenser and its typesvaibhav tailor
 
Surface Hardening of Steel
Surface Hardening of SteelSurface Hardening of Steel
Surface Hardening of Steelvaibhav tailor
 
Laplace transform & fourier series
Laplace transform & fourier seriesLaplace transform & fourier series
Laplace transform & fourier seriesvaibhav tailor
 
Graphical interfacing standards
Graphical interfacing standardsGraphical interfacing standards
Graphical interfacing standardsvaibhav tailor
 

More from vaibhav tailor (20)

Numerical integration;Gaussian integration one point, two point and three poi...
Numerical integration;Gaussian integration one point, two point and three poi...Numerical integration;Gaussian integration one point, two point and three poi...
Numerical integration;Gaussian integration one point, two point and three poi...
 
Flow of viscous fluid through circular pipe
Flow of viscous fluid through circular pipeFlow of viscous fluid through circular pipe
Flow of viscous fluid through circular pipe
 
Series solutions at ordinary point and regular singular point
Series solutions at ordinary point and regular singular pointSeries solutions at ordinary point and regular singular point
Series solutions at ordinary point and regular singular point
 
Recapitulation of carnot,otto and diesel cycle, dual cycle,comparison of ott...
Recapitulation of  carnot,otto and diesel cycle, dual cycle,comparison of ott...Recapitulation of  carnot,otto and diesel cycle, dual cycle,comparison of ott...
Recapitulation of carnot,otto and diesel cycle, dual cycle,comparison of ott...
 
Gibbs phase rule and lever rule
Gibbs phase rule and lever ruleGibbs phase rule and lever rule
Gibbs phase rule and lever rule
 
Money
MoneyMoney
Money
 
Cases of eccentric loading in bolted joints
Cases of eccentric loading in bolted jointsCases of eccentric loading in bolted joints
Cases of eccentric loading in bolted joints
 
Flow through pipes
Flow through pipesFlow through pipes
Flow through pipes
 
The taylor hobson talysurf surface roughness tester
The taylor hobson talysurf surface roughness testerThe taylor hobson talysurf surface roughness tester
The taylor hobson talysurf surface roughness tester
 
Physical significance of non dimensional numbers
Physical significance of non dimensional numbersPhysical significance of non dimensional numbers
Physical significance of non dimensional numbers
 
Operation of reciprocating pump
Operation of reciprocating pumpOperation of reciprocating pump
Operation of reciprocating pump
 
Intro to production management and plant layout
Intro to production management and plant layoutIntro to production management and plant layout
Intro to production management and plant layout
 
Concentric springs, surge phenomenon in spring, helical torsion, spiral spring
Concentric springs, surge phenomenon in spring, helical torsion, spiral springConcentric springs, surge phenomenon in spring, helical torsion, spiral spring
Concentric springs, surge phenomenon in spring, helical torsion, spiral spring
 
Classification of clutches, torque transmission capacity, considerations for ...
Classification of clutches, torque transmission capacity, considerations for ...Classification of clutches, torque transmission capacity, considerations for ...
Classification of clutches, torque transmission capacity, considerations for ...
 
USM Ultra Sonic Machinig
USM Ultra Sonic MachinigUSM Ultra Sonic Machinig
USM Ultra Sonic Machinig
 
Refrigerant condenser and its types
Refrigerant condenser and its typesRefrigerant condenser and its types
Refrigerant condenser and its types
 
Surface Hardening of Steel
Surface Hardening of SteelSurface Hardening of Steel
Surface Hardening of Steel
 
Milling cutters
Milling cuttersMilling cutters
Milling cutters
 
Laplace transform & fourier series
Laplace transform & fourier seriesLaplace transform & fourier series
Laplace transform & fourier series
 
Graphical interfacing standards
Graphical interfacing standardsGraphical interfacing standards
Graphical interfacing standards
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Sony pictures crippled by gop hackers, 2014 cs ala

  • 1. SONY PICTURES CRIPPLED BY GOP HACKERS, 2014
  • 2. Overview • Attack on Sony Pictures…Nov 24, 2014 by GOP - “Guardians of Peace” • 111 Terabytes of Data Stolen • Suspected Origin: North Korea • 7 lawsuits filed against Sony, so far • Controversy over “The Interview” which made $46 million to date • Trojan designed for Sony’s network.
  • 3. Sony Pictures hack • On November 24, 2014, a hacker group which identified name "Guardians of Peace" (GOP) leaked a release of data from the film studio Sony Pictures. itself by the confidential • The data included personal information about Sony Pictures employees and their families, e-mails between employees, information about executive salaries at the company, copies of then- unreleased Sony films, and other information. • The perpetrators then employed a variant of the Shamoon wiper malware to erase Sony's computer infrastructure.
  • 4. The Shamoon Wiper Malware • Shamoon ,also known as W32.DisTrack,is a modular computer virus targeting recent 32-bit NT kernel versions of Microsoft Windows. The virus has been noted to have behaviour differing from other malware attacks, due to the destructive nature and the cost of the attack and recovery.Shamoon can spread from an infected machine to other computers on the network. Once a system is infected, the virus continues to compile a list of files from specific locations on the system, upload them to the attacker, and erase them. • A wiper is a class of malware whose intention is to wipe the hard drive of the computer it infects.
  • 5. Demands of GOP • In November 2014, the GOP group demanded that Sony withdraw its film The Interview , a comedy about a plot to assassinate North Korean leader Kim Jong-un , and threatened terrorist attacks at cinemas screening the film. • After major U.S. cinema chains opted not to screen the film in response to these threats, Sony elected to cancel the film's formal premiere and mainstream release, opting to skip directly to a downloadable digital release followed by a limited digital theatrical release the next day.
  • 6. Attack Timeline for Sony Pictures, Nov – Dec 2014
  • 7. Data stolen and leaked • Personal data on employees • Movies and Scripts • Performance reports and salary information • Source code, Private keys, passwords, certificates • Production schedules, Box office projections • Executives email correspondence • Brad Pitt phone number
  • 8. Movie Leaks • A few days after the the initial breach report was announced, four torrent links were published to torrent trackers that contained unreleased movies from Sony, obtained by GOP during the attack. According to several torrent tracking sites, these files have been downloaded over 100,000 times. • NBC News aired a segment reporting that the FBI were investigating the breach and the possibility that North Korea was involved. North Korea has a clear motive in attacking Sony. Sony is releasing a movie called The Interview , which follows the story of two celebrity TV hosts that get a chance to interview Kim Jong-un. Before heading to North Korea, they are asked by the C.I.A. to assassinate him. Despite the movie being labelled a comedy, North Korea has stated that if the movie is released, they would consider it an “act of war”.
  • 9.
  • 10. Conclusion • United States intelligence officials, after evaluating the software, techniques, and network sources used in the hack, alleged that the attack was sponsored by north korea.