Sony Pictures Entertainment may be the reluctant star of a real-life drama involving cybercriminals who reportedly hacked into its computer systems.

The Los Angeles Times reported that email, network access and other employee-facing technology was rendered useless to Sony Pictures staff earlier this week. Those logging on were greeted by a message from a group that calls itself the Guardians of Peace, which made threatening remarks about releasing information it had stolen from the company unless it received a ransom.

So far, Sony has only said it is “investigating an IT matter,” according to Help Net Security, but staff were reportedly sent home after learning that the company’s computer security had been compromised. However, a thread on the popular online forum Reddit by someone claiming to be a former Sony employee shows an image of a red skeleton with the words “Hacked by #GOP” across it. Those posting to the thread say the hack has affected logins on employee computer screens across the United States.

Although the Guardians of Peace set a deadline of Nov. 24 for its demands to be met, the precise details of what it wanted are unknown. An anonymous source told The Next Web that the attack began with a single server and may have led to private keys and financial information being stolen via a zip file.

In an email to The Verge, meanwhile, someone claiming responsibility for the attack referenced inequality at Sony Pictures and suggested insiders were also involved. The message also indicated that weak physical security may have allowed the cybercriminals to carry out the network attack with relative ease.

Cybercriminals have demanded payment or made other ultimatums before, but the victims are usually more widespread and targeted through malicious software or ransomware that makes smartphones inoperable or steals data from them. The Sony Entertainment attack is notable because its impact was far more public. As Business 2 Community showed in a post, messages blasting the company’s executives as “criminals” were posted via Twitter accounts associated with some of its films.

For chief information security officers at other large enterprises, the main takeaway might be that it doesn’t take much to infiltrate a computer system to wreak widespread havoc. No matter what happens next, far too many people have gotten a front-row seat to how much damage a small group can inflict on a high-profile company.

Image Source: Wikimedia Commons

More from

Security Awareness Training 101: Which Employees Need It?

4 min read - To understand why you need cybersecurity awareness training, you must first understand employees' outsized roles in security breaches. “People remain — by far — the weakest link in an organization’s cybersecurity defenses,” noted Verizon on the release of their 2022 Data Breach Investigations Report (DBIR). They elaborate that 25% of all breaches covered in the report were the result of social engineering attacks, and when you add human errors and misuse of privilege, the human element accounts for 82% of…

4 min read

Beyond Requirements: Tapping the Business Potential of Data Governance and Security

3 min read - Doom and gloom. Fear, uncertainty and doubt. The "stick" versus the "carrot". What do these concepts have in common? They have often provided the primary motivation for organizations’ data governance and security strategies. For the enterprise, this mindset has perpetuated the idea that data governance, data security and data privacy are reactive cost centers existing due to externally imposed requirements or mandates. Yet, what if data governance and security practices could upend the prevailing paradigm and demonstrate direct business value?…

3 min read

Protecting Against Remote Monitoring and Management Phishing

3 min read - You use remote monitoring and management (RMM) software to closely monitor your cyber environment and keep your organization safe. But now cyber criminals are specifically targeting these tools, causing legitimate software to become a vulnerability. This is the latest type of attack in an increase in a recent trend of disruptive software supply chain attacks. The Cybersecurity and Infrastructure Security Agency (CISA) recently released an alert about the malicious use of legitimate remote monitoring and management (RMM) software. Last fall,…

3 min read

Secure-by-Design: Which Comes First, Code or Security?

4 min read - For years, developers and IT security teams have been at loggerheads. While developers feel security slows progress, security teams assert that developers sacrifice security priorities in their quest to accelerate production. This disconnect results in flawed software that is vulnerable to attack. While advocates for speed and security clash, consumers must often pay the price when threat actors strike. 48% of developers admitted they were still shipping code with vulnerabilities in 2022. It’s clearly time for a change. Many believe…

4 min read