{"id":4411,"date":"2014-12-19T10:00:16","date_gmt":"2014-12-19T15:00:16","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=4411"},"modified":"2020-08-28T11:51:46","modified_gmt":"2020-08-28T07:51:46","slug":"sony-hack-north-korea","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/sony-hack-north-korea\/4411\/","title":{"rendered":"Is North Korea Really Behind the Sony Breach?"},"content":{"rendered":"<p>The Sony breach certainly seems to be the gift that keeps on giving this holiday season. And if the commonly accepted narrative reflects the truth, this whole nightmare scenario stems from what promised to be a puerile comedy titled \u201cThe Interview.\u201d The premise of the movie revolves around a pair of journalists who are granted a rare interview with North Korean supreme leader, Kim Jong-Un, and the subsequent plot to assassinate the Hermit Kingdom\u2019s despotic dictator.<\/p>\n<p><a href=\"https:\/\/me-en.kaspersky.com\/blog\/files\/2014\/12\/Sony-hack-1024x767-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-7074\" src=\"https:\/\/me-en.kaspersky.com\/blog\/files\/2014\/12\/Sony-hack-1024x767-1-1024x767.png\" alt=\"Sony-hack\" width=\"1024\" height=\"767\"><\/a><\/p>\n<p>Sony, having clearly failed to learn its lesson after <a href=\"https:\/\/threatpost.com\/sony-fined-250000-uk-over-failures-playstation-network-breach-012413\/77446\" target=\"_blank\" rel=\"noopener nofollow\">attackers hacked its PlayStation Network into a month-long coma in the spring of 2011<\/a>, is the main character in yet another serious and humiliating security incident.<\/p>\n<p>Here\u2019s a rough and heavily abridged timeline of events:<\/p>\n<p>First Sony Pictures Entertainment gets hacked by a group widely believed to be allied with the Democratic People\u2019s Republic of Korea. Then, in no particular order, the hackers start releasing troves of stolen proprietary information, including but not limited to movies, scripts for future movies, sensitive employee healthcare information and internal email spools. Finally the hackers threaten to attack movie theaters on the release of \u201cThe Interview,\u201d Regal Cinemas \u2013 among the largest movie theater chains in the United States \u2013 says it will not play the movie and Sony ultimately decides to delay its release.<\/p>\n<div class=\"pullquote\">In general, when a nation-state sponsored hacking group carries out an attack, they do so as secretly as possible.<\/div>\n<p>The popular opinion is that North Korea is behind the attacks. There\u2019s been a healthy amount of skepticism towards that position though \u2013 and with good reason. In general, when a nation-state sponsored hacking group carries out an attack, they do so as secretly as possible. You can generally look at an advanced persistent threat group or campaign and say that a certain country was <em>probably<\/em> responsible for a given attack. But the goal, typically, from the attacker\u2019s perspective is to never allow for 100 percent clear attribution. That goal is aided by the reality that attribution is a naturally imperfect science on the Internet anyway.<\/p>\n<p>In this case, the group that claimed responsibility for the attack apparently posted a showy and, frankly, ridiculous graphic of a spooky looking skeleton on a number of owned desktops on Sony\u2019s network. Most APT groups aren\u2019t in the business of announcing their presence on a compromised network. This Guardians of Peace group has since issued some serious threats against Sony, moviegoers and the broader American public.<\/p>\n<p>The question remains: is North Korea in some way behind the attack on Sony? Threatpost and scores of other news outlets are following the U.S. Government\u2019s lead today and reporting that <a href=\"https:\/\/threatpost.com\/white-house-to-blame-sony-hack-on-north-korea\/109945\" target=\"_blank\" rel=\"noopener nofollow\">North Korea is in fact \u201ccentrally involved\u201d in the attack<\/a>. Details of what the U.S. Government knows remain scant at the time of publication, but there is supposed to be a White House announcement later in the day.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>There\u2019s as much room for skepticism as there is to believe that North Korea is responsible for the #Sony hack<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FWV55&amp;text=There%26%238217%3Bs+as+much+room+for+skepticism+as+there+is+to+believe+that+North+Korea+is+responsible+for+the+%23Sony+hack\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Wired, on the other hand, is sticking to its guns, and continues to suggest that <a href=\"http:\/\/www.wired.com\/2014\/12\/evidence-of-north-korea-hack-is-thin\/\" target=\"_blank\" rel=\"noopener nofollow\">there is little evidence linking the Sony hack to North Korea<\/a>. Wired cites the difficulty of attribution as well as statements from Sony and the FBI \u2013 who have both stated publicly that there is no evidence to link this attack to North Korea \u2013 as reasons for skepticism. It\u2019s hard to disagree with Wired. Why would a foreign government very publicly attack a foreign corporation over an intentionally absurd movie?<\/p>\n<p>There could be a number of reasons actually.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The Sony hack is extremely worrying. Hackers using real-world terror threats and achieving their goal is really bad for everyone<\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/545549242430144512?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 18, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Some observers believe anger over \u201cThe Interview\u201d is an excuse for North Korea to flex its cyber-muscle.<\/p>\n<p>\u201cIt\u2019s not about a movie or even Sony, at all,\u201d <a href=\"http:\/\/seclists.org\/dailydave\/2014\/q4\/70\" target=\"_blank\" rel=\"noopener nofollow\">wrote Immunity CEO and former NSA scientist Dave Aitel on the Daily Dave mailing list<\/a>. \u201cWhen you build a nuclear program, you have to explode at least one warhead so that other countries see that you can do it. The same is true with Cyber.\u201d<\/p>\n<p>As Threatpost reported this morning, Aitel was one of the first to publicly theorize that North Korea was behind the Sony hack and likened it to Iran\u2019s alleged involvement in the Shamoon attacks that <a href=\"https:\/\/threatpost.com\/saudi-aramco-confirms-scope-malware-attack-082712\/76954\" target=\"_blank\" rel=\"noopener nofollow\">destroyed 30,000 workstations at the Saudi state-run oil manufacturer, Saudi Aramco, in 2012<\/a>.<\/p>\n<p><iframe loading=\"lazy\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/3249661\/height\/270\/width\/270\/theme\/standard\/direction\/no\/autoplay\/no\/autonext\/no\/thumbnail\/yes\/preload\/no\/no_addthis\/no\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"270px\" height=\"270px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n<p>\u201cIran did this exact same near-mortal blow to Saudi Aramco, as a way of demonstrating that they could and would,\u201d Aitel said. \u201cThat\u2019s what just happened to Sony.\u201d<\/p>\n<p>Those are perfectly reasonable, although speculative, explanations for why or how North Korea could be motivated to launch such an attack. However, there is real, forensic and contextual evidence pointing to North Korea as well.<\/p>\n<p>Kaspersky Lab researcher, Kurt Baumgartner pointed out <a href=\"https:\/\/securelist.com\/blog\/research\/67985\/destover\/\" target=\"_blank\" rel=\"noopener\">a number of similarities between the Sony hack and other hacks generally attributed to North Korea<\/a> in a Securelist article earlier this month. Baumgartner notes that the attackers covered their tracks by deploying a destructive wiper malware, called Destover, that overwrote hard drives company-wide. The very same malware was reportedly used in the DarkSeoul attacks targeting South Korea, which were attributed to that country\u2019s northern neighbor.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Just like Shamoon, Just like DarkSeoul \u2013 lot of similarities revealed by <a href=\"https:\/\/twitter.com\/k_sec?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@k_sec<\/a> in Sony Picture hack samples analysis <a href=\"http:\/\/t.co\/DJE6hdkV72\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/DJE6hdkV72<\/a><\/p>\n<p>\u2014 codelancer (@codelancer) <a href=\"https:\/\/twitter.com\/codelancer\/status\/540597006717419520?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 4, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>This Sony attack saga is far from over as a number of questions remain unanswered. This story is definitely worth following in the coming days, and hopefully we\u2019ll learn more about who is behind the attack and what their true motivations are.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the second time in three years, Sony is the main character in a massive and humiliating cyberattack.<\/p>\n","protected":false},"author":42,"featured_media":4412,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[872,767,870,78,36,871,161],"class_list":{"0":"post-4411","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-breach","9":"tag-cyberattack","10":"tag-hack","11":"tag-hackers","12":"tag-malware-2","13":"tag-north-korea","14":"tag-sony"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/sony-hack-north-korea\/4411\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/sony-hack-north-korea\/4477\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/sony-hack-north-korea\/4948\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/sony-hack-north-korea\/6496\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/sony-hack-north-korea\/7072\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/sony-hack-north-korea\/5858\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/sony-hack-north-korea\/6496\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/sony-hack-north-korea\/7072\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/sony-hack-north-korea\/7072\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/breach\/","name":"breach"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4411"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4411\/revisions"}],"predecessor-version":[{"id":17202,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4411\/revisions\/17202"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4412"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}