--Sony Pictures Employees Threatened; Execs Received Extortion eMails
Prior to Attack
(December 8, 2014)
Additional information about the Sony Pictures attack is emerging. The
attackers appear to have used the network of a fancy hotel in Bangkok,
Thailand, to leak stolen data (ed: but the attack as been variously
attributed to North Korea and others). Reports also say that Sony
Pictures executives received extortion emails three days before the
initial attack. Employees of Sony Pictures have reported receiving
threatening email messages.
http://www.eweek.com/security/hacker-gr ... oyees.htmlhttp://www.computerworld.com/article/28 ... ttack.html[Editor's Note (Pescatore): Since it is often executive admins that read
executive emails first, this is a good reminder that those admins should
get some specific education on what to do if they see a ransomware-type
email, as well as more concentrated phishing recognition education since
execs will get the most targeted types of malicious emails.
(Honan): For me one of the biggest lessons from this attack is how
important it is for the victim organisation to communicate often and
clearly on the breach. The lack of information from Sony about the
attack has led to many wild speculations in various media outlets as to
who is behind the attack and what their motivations are.]