Sunday, May 1, 2011

77 Million PS3 accounts conned by professionals?

My son after doing more researching on this subject is finding that there is no real evidence (only rumors) of people losing money through their credit card accounts. So it is likely a Con. The people who stole this information couldn't get credit card numbers because they are encrypted. But they did get names and passwords and personal information connecting names and emails and possibly some passwords of clients it is believed at present. However, the whole thing might be run by a dirty tricks campaign by a competitor of Sony's just as easily, or by an unfriendly government or governments to try to put Sony out of business.

So, life on anything connected to the internet goes on, hopefully more carefully and thoughtfully this time.

Later: I found this article and it might clarify the problems a little:

 http://www.computerworld.com/s/article/9216311/Sony_apologizes_details_PlayStation_Network_attack
begin quote from above web address:

Sony apologizes, details PlayStation Network attack

By Martyn Williams
May 1, 2011 04:45 AM ET
IDG News Service - Sony's PlayStation Network and Qriocity online services will begin a phased resumption this week, after the company took them offline in response to a "very sophisticated" intrusion, the company said Sunday.
Online gaming and access to unexpired movie rentals will be the first services to return on the PlayStation Network, while Qriocity users will be able to use the Music on Demand service. Other functions, including the PlayStation Store, will be available by mid-May, said Kaz Hirai, head of Sony's gaming division, during a rare Sunday news conference.
"We'd like to extend our apologies to the many PlayStation Network and Qriocity users who we worried," said Hirai. "We potentially compromised their customer data. We offer our sincerest apologies."
Sony took the two services offline on April 20 after an intrusion was detected on the network's servers, which live in an AT&T data center in San Diego. Sony discovered the intrusion after it was alerted to unusual network activity a day earlier, said Hirai.
Sony initially responded by asking a computer security company to investigate the intrusion. When it became apparent that customer information could have been stolen, Sony employed a second specialist company, said Hirai.
The U.S. Federal Bureau of Investigations has launched a criminal investigation into the attack, he said.
Sony's investigation is still continuing and, as such, the company still doesn't have a clear picture of what exactly was stolen and how many accounts were affected. The company believes there is a high probability that personal information was taken, including usernames for the service and associated passwords in encrypted form, names, addresses, birthdates and e-mail addresses. Sony hasn't determined how many accounts were hit, but the attack could potentially affect all 77 million accounts.
About 10 million accounts have credit card numbers associated with them, but Sony said it had no evidence those numbers were stolen. The credit card numbers, unlike the personal information, are stored in an encrypted database, although Sony has not said what encryption system was used.
Nevertheless, Sony advised customers to watch out for unusual activity on their credit card accounts. It has discovered no such cases so far, said Hirai. Sony will pay the cost of reissuing credit cards based on user requests.
The attack was launched from an application server that sits behind a web server and two firewalls on Sony's network, said Shinji Hasejima, Sony's chief information officer.
"It was a very sophisticated technique that was used to access our system," said Hasejima.
The initial attack was disguised as a purchase, so wasn't flagged by network security systems. It exploited a known vulnerability in the application server to plant software that was used to access the database server that sat behind the third firewall, said Hasejima.

News

Sony apologizes, details PlayStation Network attack

By Martyn Williams
May 1, 2011 04:45 AM ET
Management at Sony Network Entertainment International, the company that manages the network platform for the two services, wasn't aware of the vulnerability, said Hasejima.
The appointment of a chief information security officer will be one of the measures taken by Sony to ensure such a mistake doesn't happen again, the company said. It also plans to add automated software monitoring systems to help guard against future attacks and to spot unusual network activity.
When services return, Sony will ask all users to change their account passwords.
The company is also planning to offer selected software downloads at no charge and an one month extension for users on the subscription-based PlayStation Plus service.
Martyn Williams covers Japan and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is martyn_williams@idg.com

No comments: