Archive

Login Form

Search

Categories

Blogroll

Monday, June 6, 2011

image

"LulzSec was compromised and a member of the group, Robert Cavanaugh, was arrested by the FBI on June 6. Meanwhile, LulzSec hacked Sony again, this time leaking the Sony Developer Network source code through file sharing websites."

 

Access to the source code would allow hackers to be able to reverse-engineer the network and spawn new sites similar to Sony's, as well as perhaps "fork" the software to create new versions of it. In addition, the fact that hackers have been able to access the source code for Sony's internal servers indicates that they may also be able change the source code on Sony's servers, thus changing how the official developer network operates.
They would also be able use the source code to find and perhaps even create more security holes in the system and exploit them, wreaking further havoc on Sony’s already battered network security team.
Although previous hacks into the network allowed many people to illegally download games for free and access Sony programming resources, it is possible that by being able to access the servers and the source code of the systems, a hacker could potentially create a sort of "wormhole" or portal to the servers that would allow him or her to have constant real-time access to it.
LulzSec has been targeting Sony in particular due to legal action that Sony took in January against hacker George “GeoHot” Hotz for jailbreaking the PlayStation 3 system.
LulzSec, alongside other individual hackers, have compromised Sony computer networks multiple times in the past few weeks following the highly publicized PlayStation Network hack.
They recently breached Sony Pictures and stole 150,000 records, claiming they had access to a database with more than 4.5 million records. LulzSec stated “SonyPictures.com was owned by a very simple SQL injection, one of the most primitive and common vulnerabilities, as we should all know by now. From a single injection, we accessed EVERYTHING. Why do you put such faith in a company that allows itself to become open to these simple attacks?”

0 comments:

Post a Comment

New Block

Enter Block content here...

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Etiam pharetra, tellus sit amet congue vulputate, nisi erat iaculis nibh, vitae feugiat sapien ante eget mauris.