Tuesday, December 30, 2014

Sony Hack Updates ( December 30 , 2014 ) - As new evidence points to the hack being an inside job , Government investigators still hold onto view North Korea was involved - even if that just involved hiring mercenaries ( still a big shift from prior view of FBI )

Update - North Korea angle not going away apparently ....


Anti War.....


FBI Spurns Evidence on Sony Hack, Blames North Korea Again

Insists Everything Pointing Away From North Korea Not Credible

by Jason Ditz, December 30, 2014
Security experts are putting out a growing mountain of evidence in the Sony Pictures hack which points to the incident being an insider attack. and discrediting FBI allegations against North Korea.
The FBI has already made up their minds, however, and they’re not going to change them, loudly spurning all the evidence as non-credible, and insisting again that they are certain of North Korea’s guilt.
The evidence that has been released to the public points to insiders with broad knowledge of Sony Pictures’ internal network configuration, and experts say the group may have included as few as six hackers.
The FBI fixated on North Korea as the culprit from the start, and ignored all evidence to the contrary. The North Korea allegation, and the connection to the Interview movie, were not even suggested by hackers until after such allegations were made.


AND....



(  Actually , it's a bit more nuanced than the Anti War story would suggest ) 

The Bureau keeps publicly condemning Pyongyang for the Sony hack. But privately, it is listening to other theories, including those about an inside job.

****





Tweets....

NK angle going away ? 




FBI agent confirmed: no longer looking at a North Korean angle for the Sony hack but...an insider.








***


Senior vice president at Norse Kurt Stammberger told the Security Ledger late Sunday the company has identified six people “with direct involvement in the hack,” two of whom are based in the U.S. along with one in Canada, Singapore and Thailand.
The list also includes a former decade-long Sony veteran who “worked in a technical role” and was laid off in May. Norse previously identified the ex-employee as “Lena,” and said she claimed to have connection to the “Guardians of Peace” hacker group that took credit for the attack against Sony, which has so far resulted in leaked employee information, executives’ emails, unreleased films and the limiting of “The Interview” theatrical release in response to a terrorist threat.



****

Using Sony human resources documents leaked in the hack itself, researches looked back through employees with the background and motivation that would likely preclude such an attack. One with a “very technical background” included on a list of layoffs from earlier this spring stood out, and a follow up investigation of the individual’s online communications revealed disgruntled posts on social media referencing the layoffs.
After examining intercepted communications of other individuals engaged in contact with hacker and hacktivist groups in Europe and Asia (where the Sony hack was routed through), Norse connected one of those individuals with the Sony employee on a server that featured the earliest-known version of the malware used against Sony.
Stammberger said the company would report its findings to the FBI Monday.
“They’re the investigators,” Stammberger said. “We’re going to show them our data and where it points us. As far as whether it is proof that would stand up in a court of law? That’s not our job to determine, it is theirs.”
Stammberger also said Norse found evidence linking the employee to well-known illegal media download hubs like Pirate Bay, which frequently features free downloads of big-budget Hollywood films.










Sony Hack: New Evidence Points to Inside Job Say Security Experts










Cybersecurity Firm Identifies Six In Sony Hack — One A Former Company Insider




FBI hears evidence questioning North Korea's role







New from Reuters: FBI still says the Sony hack was North Korea, but could have hired outsiders

No comments:

Post a Comment