By using this site, you agree to our Privacy Policy and our Terms of Use. Close

Forums - Sony - VGC Official PSN/SOE Info/Updates Thread.

Mirson said:
Pristine20 said:

What amazes me most about all this is how many are already acting like their info as stolen and I bet their facebook pages already has all said info as wel and chances are they also have lots of people as "friends" that they dont realy know. Drama queens...

l

Yeah, I'm sure facebook pages have home addresses, e-mails, passwords, bank account numbers, cc, and other info for the public to see. Also, you're forgetting that not everyone who are at risk have a Facebook account.

Anyways, corporations have a duty to keep customer's information secured, and they must notify their customers in a timely matter whenver a breach occurs. Sony, on the other hand, took about a week to notify their customers, and they barely found that SOE was affected as well (almost two weeks since it happened).

Pretty sure PSN doesn't use bank account #s either. And yes, facebook potentially has all the other info. You'd be surprised how many use their birthdate as a password.

About the week notification, judging by the nature of people's response, I'd say sony was justified in waiting a week. You know why? Lots of tin foil hat wearers tend to panic for no reason. You can't release such info till you're absolutely sure that's the case. People were mad at the JP govt for withholding info on the extent of the radiation leak at fukushima. I understood why the JP govt did it when I heard of people hoarding KI in California.

I may seem like a sony bot to you but I actually agree that sony f'd up if they really didn't fully secure the data but I'm not sure what is truth from what's a rumor anymore. I also read a min ago that SOE had just laid off 200 people the week of the hack so chances are that it could be an inside job. If thats the case, I dont think any security software would've made a difference.

The most important thing is to take every situation for what it is instead of blowing it out of proportion. Is there any news of fradulent activity on anyones CC related to the breach as of this moment? No. Is there any news of I dentity theft related to the breach (IDK how this one would even be possible w/o an SSN which sony doesnt collect)? No. So why are people acting like they got robbed already?



"Dr. Tenma, according to you, lives are equal. That's why I live today. But you must have realised it by now...the only thing people are equal in is death"---Johann Liebert (MONSTER)

"WAR is a racket. It always has been.

It is possibly the oldest, easily the most profitable, surely the most vicious. It is the only one international in scope. It is the only one in which the profits are reckoned in dollars and the losses in lives"---Maj. Gen. Smedley Butler

Around the Network
CGI-Quality said:
Pristine20 said:

The most important thing is to take every situation for what it is instead of blowing it out of proportion. Is there any news of fradulent activity on anyones CC related to the breach as of this moment? No. Is there any news of I dentity theft related to the breach (IDK how this one would even be possible w/o an SSN which sony doesnt collect)? No. So why are people acting like they got robbed already?

This bit is my main issue regarding this whole fiasco.

ditto



goforgold said:
CGI-Quality said:
Pristine20 said:

The most important thing is to take every situation for what it is instead of blowing it out of proportion. Is there any news of fradulent activity on anyones CC related to the breach as of this moment? No. Is there any news of I dentity theft related to the breach (IDK how this one would even be possible w/o an SSN which sony doesnt collect)? No. So why are people acting like they got robbed already?

This bit is my main issue regarding this whole fiasco.

dittto

same here



BOSTON / NEW YORK, May 3 (Reuters) - Sony has hired outside investigators to help clean its networks and catch the people behind a massive breach that exposed the personal data of more than 100 million video game users.  

The Japanese electronics giant has retained a team from privately held data that Forte is led by a former special agent with the U.S. Naval Criminal Investigative Service to work alongside the FBI agents, who are thus probing the matter.

 

Sony (6758.T) (SNE.N) said on Tuesday that it has thus brought on cyber-security detectives from Guidance Software (GUID.O) and consultants from Robert Half International Inc's (RHI.N) Protiviti subsidiary to help with the clean-up.

http://translate.googleusercontent.com/translate_c?hl=de&ie=UTF-8&sl=de&tl=en&u=http://uk.reuters.com/article/2011/05/04/sony-idUKN0311649920110504&prev=_t&rurl=translate.google.com&usg=ALkJrhjC7oVU0v_tlY-JKmyyqDA6hRwJrQ



In-Kat-We-Trust Brigade!

"This world is Merciless, and it's also very beautiful"

For All News/Info related to the PlayStation Vita, Come and join us in the Official PSV Thread!

No PSN in South Africa yet :(

Was hoping to play some Demon's Souls online. It's funny, I'm at Soul level 50 and haven't experienced the online at all

:( :( :(



Around the Network

Today, the Subcommittee on Commerce, Manufacturing and Trade of the U.S. House of Representatives Committee on Energy and Commerce held a hearing in Washington, DC on “The Threat of Data Theft to American Consumers.”

Kazuo Hirai, Chairman of the Board of Directors of Sony Computer Entertainment America, submitted written answers to questions posed by the subcommittee about the large-scale, criminal cyber-attack we have experienced. We wanted to share those answers with you (click here).

In summary, we told the subcommittee that in dealing with this cyber attack we followed four key principles:

  1. Act with care and caution.
  2. Provide relevant information to the public when it has been verified.
  3. Take responsibility for our obligations to our customers.
  4. Work with law enforcement authorities.

We also informed the subcommittee of the following:

  • Sony has been the victim of a very carefully planned, very professional, highly sophisticated criminal cyber attack.
  • We discovered that the intruders had planted a file on one of our Sony Online Entertainment servers named “Anonymous” with the words “We are Legion.”
  • By April 25, forensic teams were able to confirm the scope of the personal data they believed had been taken, and could not rule out whether credit card information had been accessed. On April 26, we notified customers of those facts.
  • As of today, the major credit card companies have not reported any fraudulent transactions that they believe are the direct result of this cyber attack.
  • Protecting individuals’ personal data is the highestpriority and ensuring that the Internet can be made secure for commerce is also essential. Worldwide, countries and businesses will have to come together to ensure the safety of commerce over the Internet and find ways to combat cybercrime and cyber terrorism.
  • We are taking a number of steps to prevent future breaches, including enhanced levels of data protection and encryption; enhanced ability to detect software intrusions, unauthorized access and unusual activity patterns; additional firewalls; establishment of a new data center in an undisclosed location with increased security; and the naming of a new Chief Information Security Officer.

We told the subcommittee about our intent to offer complimentary identity theft protection to U.S. account holders and detailed the “Welcome Back” program that includes free downloads, 30 days of free membership in the
PlayStation Plus premium subscription service; 30 days of free service for Music Unlimited subscribers; and extending PlayStation Plus and Music Unlimited subscriptions for the number of days services were unavailable.

We are working around the clock to have some PlayStation Network services restored and we’ll be providing specific details shortly. We hope this update is helpful to you, and we will continue to keep you posted as we work to restore our network and provide you with both the entertainment and the security you deserve.

http://blog.us.playstation.com/2011/05/04/sonys-response-to-the-u-s-house-of-representatives/



source

House hearing blasts Sony's "half-hearted, half-baked" hack response

Despite suffering massive breaches that made national news, neither Sony nor Epsilon showed up to a House hearing on data theft this morning—the predictable result of which was that both firms were just trashed in absentia.

Rep. Mary Bono Mack (R-CA), chair of the Subcommittee on Commerce, Manufacturing, and Trade, opened the hearing with a sustained attack on both companies. After saying that both Sony and Epsilon were also "victims," Bono Mack stopped sympathizing with the firms. And she made clear that she's no fan of using "a blog" for public disclosure of a breach:

But they also must shoulder some of the blame for these stunning thefts, which shake the confidence of everyone who types in a credit card number and hits "enter"…

As Chairman of this Subcommittee, I am deeply troubled by these latest data breaches, and the decision by both Epsilon and Sony not to testify today. This is unacceptable.

According to Epsilon, the company did not have time to prepare for our hearing—even though its data breach occurred more than a month ago. Sony, meanwhile, says it’s too busy with its ongoing investigation to appear. Well, what about the millions of American consumers who are still twisting in the wind because of these breaches? They deserve some straight answers, and I am determined to get them…

Yet for me, the single most important question is simply this: Why weren’t Sony’s customers notified sooner of the cyberattack? I fundamentally believe that all consumers have a right to know when their personal information has been compromised, and Sony - as well as all other companies—have an overriding responsibility to alert them... immediately.

In Sony’s case, company officials first revealed information about the data breach on their blog. That’s right. A blog. I hate to pile on, but—in essence—Sony put the burden on consumers to "search" for information, instead of accepting the burden of notifying them. If I have anything to do with it, that kind of half-hearted, half-baked response is not going to fly in the future.

Panelists joined in. Dr. Gene Spafford of Purdue testified that Sony's system was weak, and that those weaknesses had been revealed on security mailing lists months before the breach. According to Spafford, key parts of Sony's PlayStation Network ran on Apache servers that "were unpatched and had no firewall installed." This was reported in a forum known to be frequented by Sony employees, he said, though no changes were made in the months leading up to the attack.

Without Sony or Epsilon present, much of the hearing focused on potential data protection legislation that would create some kind of process for auditing a company's data security measures to make sure they conform to best practices. Breach notification rules were also discussed, and the Federal Trade Commission pushed for Congress to give it civil penalty authority to go after companies that lose data through carelessness; in the last 10 years, the FTC has brought cases against 34 such companies, though it is currently limited in the penalties it can seek.

Can better standards really protect against such breaches? A Secret Service investigator at the hearing said that they could, adding that in his view, 96 percent of such breaches could have been avoided through straightforward, well-known security techniques. Sophisticated hackers do exist, of course, but they are rare. If companies can simply cut off script kiddie access to their systems, it will be a big step toward better data security.



Pristine20 said:
Mirson said:
Pristine20 said:

What amazes me most about all this is how many are already acting like their info as stolen and I bet their facebook pages already has all said info as wel and chances are they also have lots of people as "friends" that they dont realy know. Drama queens...

l

Yeah, I'm sure facebook pages have home addresses, e-mails, passwords, bank account numbers, cc, and other info for the public to see. Also, you're forgetting that not everyone who are at risk have a Facebook account.

Anyways, corporations have a duty to keep customer's information secured, and they must notify their customers in a timely matter whenver a breach occurs. Sony, on the other hand, took about a week to notify their customers, and they barely found that SOE was affected as well (almost two weeks since it happened).

Pretty sure PSN doesn't use bank account #s either. And yes, facebook potentially has all the other info. You'd be surprised how many use their birthdate as a password.

About the week notification, judging by the nature of people's response, I'd say sony was justified in waiting a week. You know why? Lots of tin foil hat wearers tend to panic for no reason. You can't release such info till you're absolutely sure that's the case. People were mad at the JP govt for withholding info on the extent of the radiation leak at fukushima. I understood why the JP govt did it when I heard of people hoarding KI in California.

I may seem like a sony bot to you but I actually agree that sony f'd up if they really didn't fully secure the data but I'm not sure what is truth from what's a rumor anymore. I also read a min ago that SOE had just laid off 200 people the week of the hack so chances are that it could be an inside job. If thats the case, I dont think any security software would've made a difference.

The most important thing is to take every situation for what it is instead of blowing it out of proportion. Is there any news of fradulent activity on anyones CC related to the breach as of this moment? No. Is there any news of I dentity theft related to the breach (IDK how this one would even be possible w/o an SSN which sony doesnt collect)? No. So why are people acting like they got robbed already?

So you're saying that Sony waited a week to notified their customers because people would panic? Notifying them a week after the attack only hurts Sony because it shows how slow they are and how little they care about their customers. And the fact that they barely found out about the SOE breach, almost two weeks after it happened, is embarrasing.

The SOE hack had bank account numbers in there. Not sure if they were encrypted, but Sony has confirmed that most of the data from PSN was unencrypted, except for the credit card numbers. But then again, you can out a new credit card with such information. I don't remember providing my SSN when I applied for a credit card from a major cc provider.

Identity theft victims don't tend to realize they've been a victim until a few months after their identities being stolen. It takes a few months until the damage is done, and some companies don't require your SSN to take out a loan or get a credit card. They have every right to be worried.

- PS3, PS2 & PSP owner
- Forensic course taker



A summary with timeline.

source

They Knew For Six Days: The PlayStation Network Hack Timeline

According to details from Sony themselves in a letter to congressional subcommittee, Sony was aware that data had been removed from their systems six days before warning customers that accounts had been compromised. All dates and times from Sony's missive to Congress.

April 19, 2011. 4:15PM PDT – Sony Network Entertainment America (SNEA) network team detects unauthorized activity in the network of 130 servers. Specifically, machines were "rebooting when not scheduled to do so." Analysis begins.

April 20, 2011. Early Afternoon – SNEA engineers discover evidence of "unauthorized intrusion" and that data had been removed from PlayStation Network servers. PlayStation Network shut down by engineers, taking 77 million registered PlayStation Network and Qriocity accounts offline. Sony retains service of computer security and forensic consulting firm.

April 21, 2011 – Sony retains services of second computer security and forensic consulting firm.

April 22, 2011 – Nine of ten compromised servers are mirrored by Sony and security firms. Sony Computer Entertainment America (SCEA) general counsel provides FBI with information about the intrusion. A meeting with the FBI is scheduled for Wednesday, April 27th, 2011. Sony acknowledges on their blog that their system had an "external intrusion", but mentions nothing about the loss of data and issues no warning to customers

April 23, 2011. Afternoon – Forensic teams confirm that intruders used "very sophisticated and aggressive techniques to obtain unauthorized access, hide their presence from system administrators, and escalate privileges inside the server."

April 24, 2011. Easter Sunday – Sony retains additional forensic team with "highly specialized skills" to "determine the scope of the data theft".

April 25, 2011 – Teams confirm account details compromised, including name, address, country, email, birthdate, PlayStation Network/Qriocity password, login, handle and network ID, but remain unsure if any of the 12.3 million global credit cards stored on the servers were compromised.

April 26, 2011 – Sony Network Entertainment and Sony Computer Entertainment America provide public notice of the intrusion and alert regulatory authorities in New Jersey, Maryland, and New Hampshire.

April 27, 2011 – SCEA alert regulatory authorities in Hawaii, Louisiana, Maine, Massachusetts, Missouri, New York, North Carolina, South Carolina, Virginia, and Puerto Rico.

May 3rd, 2011 – Sony Chairman Kaz Hirai sends letter to Congressional Subcommittee on Commerce, Manufacturing, and Trade explaining details of intrusion.



Some users are syncing trophies in Japan.

http://www.playstationjunkie.co.uk/ps3/trophies-syncd-in-japan/564/

I checked my Facebook PSN App and show trophies just for Japan (US and UK shows nothing).

I can post pictures.

Japan ranking now is:

1. Japan PixelJunk™ Shooter 2
2. トロともりもり (some random game in JP)
3. SOCOM 4: U.S. Navy SEALs
4. GTA IV
5. NO GAME

But one hour ago GTA IV was the second in that ranking.