by Robert Westervelt
An attacker rented space on Amazon’s EC2 service to wage cyber attacks on Sony Corp., according to a report.
Sony restarted its PlayStation Network and Qriocity services over the weekend and investigators have reportedly traced the attack to servers hosted on Amazon’s EC2 service.
Sony’s computer forensics team, which is investigating a massive data breach of its systems, believes the intruder rented space on Amazon’s cloud-based hosting service under a bogus name, according to a report from Bloomberg citing an anonymous source close to the investigation.
The attacker used the service as a platform to wield several attacks that crippled Sony Corp., and affected more than 100 million users of its gaming services. The breach is believed to be the largest data breach in the U.S. since the massive data breach at Heartland Payment Systems in 2009.
On Saturday, Sony partially restarted its PlayStation Network and Qriocity services, which were shut down since April 20, while the forensics team investigated the scope of the massive Sony breach.
The initial Sony breach exposed sensitive data on about 77 million Sony users. The company then discovered an outdated database from 2007, which included more than 12,000 non-U.S. credit and debit card numbers and 10,700 debit cards of users in Austria, Germany, the Netherlands and Spain.
The company has created the position of chief information security officer and implemented a number of steps to bolster security.
In a message to customers, the company said it added automated software monitoring and configuration management and bolstered encryption of passwords and other sensitive data. The company is also adding network security, boosting the number of firewalls and improving their effectiveness by ensuring they are configured properly. The company also said it added network monitoring technology that has the ability to detect software intrusions and network anomalies that could be suspicious activity.
(IP) Identity Theft in Cloud Computing Environments
SYS-CON Media (press release) (blog)
#devops #infosec Shared resources do benefit organizations, there's no arguing about that. But when resources forming the basis of identity are trusted and then inadvertently shared, you may find your (IP) identity misappropriated. ...
Posted by InfoSec News on May 15http://www.telegraph.co.uk/sport/othersports/cycling/8512926/David-Millar-reacts-angrily-to-UCIs-secret-Tour-de-France-doping-investigation-leaked-by-LEquipe.html
Posted by InfoSec News on May 15http://www.timescolonist.com/Internet+attack+files+sent+RCMP/4784705/story.html
Posted by InfoSec News on May 15http://www.bankinfosecurity.com/articles.php?art_id=3639
Posted by InfoSec News on May 15http://www.computerworld.com/s/article/9216742/Sony_resuming_PlayStation_Network_Qriocity_services
Posted by InfoSec News on May 15http://www.informationweek.com/news/229500572
Posted by InfoSec News on May 15http://www.bangkokpost.com/tech/computer/237244/square-enix-customer-data-leaked-after-sony-problems
Posted by InfoSec News on May 15http://www.wired.com/threatlevel/2011/05/dropbox-ftc/