Sony pictures hacked by north korea-black market malware

Assignment Help Operation Management
Reference no: EM132300729

Sony Pictures Hacked by North Korea – Black Market Malware

A strange turn of events all began with a conversation that ultimately turned into one of the worst hacks in recent history. The conversation was between screenwriter Evan Goldberg and actor Seth Rogen, joking about making a comedy about assassinating the leader of North Korea, Kim Jong-un. On March 2013, this joke became reality when Sony Pictures Entertainment announced that both Goldberg and Rogen would direct the comedy movie, The Interview.

They thought they had tremendous potential working with Seth Rogen, who seemed to be popular everywhere, and James Franco taking the lead in a “comedy” targeted for Christmas 2014 release. The plot of The Interview is now well known. A doltish tabloid talk-show host played by James Franco and his bosom-buddy producer (Seth Rogen) are invited to North Korea to interview Kim Jong-un, who’s a secret fan of their program. The CIA then enlists the pair to assassinate Kim. It all ends with Kim’s fiery death in a helicopter, which Franco’s and Rogen’s characters gun down from a commandeered tank. Needless to say, North Korea saw no humor what-so-ever in a movie depicting the killing of their country’s leader.

On Monday, Nov. 24, 2014, a crushing cyberattack was launched on Sony Pictures Entertainment in Hollywood, California. Employees logging on to their network were met with the sound of gunfire, scrolling threats, and the menacing image of a fiery skeleton looming over the tiny zombified heads of the studio’s top two executives.

Before Sony’s IT staff could pull the plug, the hackers’ malware had leaped from machine to machine throughout the lot and across continents, wiping out half of Sony’s global network. It erased everything stored on 3,262 of the company’s 6,797 personal computers and 837 of its 1,555 servers. To make sure nothing could be recovered, the attackers had even added a little extra poison: a special deleting algorithm that overwrote the data seven different ways. When that was done, the code zapped each computer’s startup software, rendering the machines brain-dead.

The hackers had actually first “broke in” to Sony’s internal systems a few months earlier to plant pieces of the malware, then, from the moment the malware was launched, it took just one hour to throw Sony Pictures back into their 1980’s era of the Betamax. The studio was reduced to using fax machines, communicating through posted messages, and paying its 7,000 employees with paper checks.

That was only the beginning of Sony’s horror story. Before destroying the company’s data, the hackers had stolen it. Over the next three weeks they dumped nine batches of confidential files onto public file-sharing sites: everything from unfinished movie scripts and mortifying emails to salary lists and more than 47,000 Social Security numbers. Five Sony films, four of them unreleased, were leaked to piracy websites for free viewing.

Then the hackers threatened a 9/11-style attack against theaters, prompting Sony to abandon The Interview’s Christmas release. A week later, after an uproar, the studio announced it would make the movie available, after all, through video on demand and in a few hundred theaters.

On Dec. 19 the FBI blamed the hack on North Korea, which had issued threats over the film. The White House followed with economic sanctions. Sony was pilloried both for horrendous judgment (for making a comedy depicting the killing of North Korea’s sovereign leader) and its seeming capitulation (for its initial refusal to show the film). In its darkest hours Sony drew zero support from Hollywood—and a blast from President Obama. Sony’s traumatized employees face an ongoing threat of identity theft.

In Sony’s view, the company is a blameless victim. In a Dec 2014 interview with National Public Radio, Sony Pictures CEO, Michael Lynton, insisted his company was “extremely well prepared for conventional cybersecurity,” but faced “the worst cyberattack in U.S. history.” Lynton has no plans to fire or discipline anyone. The CEO’s reasoning rests on the belief that because Sony’s assailant was a foreign government, with far more resources than a renegade band of hackers, what happened was unstoppable. His view was that the studio simply faced an unfair fight.

The FBI released a statement also in Dec 2014, saying, “In close collaboration with other U.S. government departments and agencies, the FBI now has enough information to conclude that the North Korean government is responsible for these actions.” The FBI cited technical analysis that showed similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks along with several Internet protocol (IP) addresses associated with known North Korean infrastructure.

What happened at Sony stands as a landmark event. It struck terror in boardrooms throughout corporate America. Countless large companies have been victimized by hacking on a massive scale, including Target, Anthem Health Care, Home Depot, and J.P. Morgan, suffering incursions for profit-oriented data theft or corporate espionage. But for the most part, previous corporate invasions have afflicted customers and employees, not the businesses directly. The Sony Pictures hack showed how attackers could bring a company itself to its knees.

Sony had the information for the Critical Controls identified by the US Government Office of Cybercrime or a myriad of Security consulting companies. Utilizing even a few of the Critical Controls such as malware defenses, monitoring, audit logs, encryption, controlled use of administrative credentials, and incident response could have provided the necessary defenses to prevent this 1990’s hacker movie from turning into reality.

1a. Was Sony negligent for getting hacked? Explain techniques Sony could have utilized to better protect its digital systems from hackers. [Students may research the latest security techniques organizations (including Sony) use to protect themselves from hackers.]

b. When should the U.S. government get involved? When it did, earlier, later, not at all?

c. Should threats of cyber-destruction be taken as seriously as threats of direct physical attacks? Explain with an example.

Reference no: EM132300729

Questions Cloud

The way in which customers are sold on products : I do believe that technology has changed the way in which customers are sold on products in today's age.
What is the voice of the customer saying : A lady gets her car serviced at the dealership where she bought it. Using what you know about QFD, what is the voice of the customer saying?
Concept of modularization be applied to package holidays : How can the concept of modularization be applied to package holidays sold through an online travel agent?
Human health-environmental impacts of hazardous chemicals : Where can you find detailed information about potential human health and environmental impacts of hazardous chemicals?
Sony pictures hacked by north korea-black market malware : A strange turn of events all began with a conversation that ultimately turned into one of the worst hacks in recent history.
The greatest strength of mixed-methods research : What do you see as the greatest strength of mixed-methods research? The greatest weakness?
Use to measure its safety and health performance : What are ?ve leading indicators that a company can use to measure its safety and health performance?
Create your own idea for innovation along with model : Create your own idea for an innovation along with a model they find useful for evaluating its merits
Global unified technology sales : Global Unified Technology Sales (GUTS) is moving toward a “bring your own device” (BYOD) model for employee computing.

Reviews

Write a Review

Operation Management Questions & Answers

  Book review - the goal

Operations Management is about a book review. Title of the book is "Goal". This book has been written by Dr. Eliyahu Goldartt. The book has been appreciated by many as one of those books which offers an insight into the operations and strategic capac..

  Operational plan in hospitality enterprise

Operational plan pertaining to a hospitality enterprise is given in detail in the solution. The operational plan is an important plan or preparation which gives guidelines regarding the role and responsibilities of each and every operation at all lev..

  Managing operations and information

Recognise the importance of a strategic approach to the development and deployment of organisational information systems. Demonstrate an understanding of the importance of databases and their integration to the organisation's overall information mana..

  A make-or-buy analysis

An analysis of the holding costs, including the appropriate annual holding cost rate.

  Evolution and contributor of operations management

Briefly explain Evolution and contributor of Operations management.

  Functions and responsibilities of an operations manager

A number of drivers of change have transformed the roles, functions and responsibilities of an operations manager over recent years. These drivers have not only been based on technological innovations but also on the need for organisations to develop..

  Compute the optimal order quantity

Compute the Optimal Order quantity of DVD players. Determine the appropriate reorder point.

  Relationship to operations practice in the organisation

Evaluate problems in operations and identify approaches to overcoming them. Critically evaluate operating plans and identify areas for improvement. Justify, implement and evaluate changes to operations in line with modern approaches.

  A make or buy analysis

Develop a report for Figi Fabricating that will address the question of whether the company should continue to purchase the part from the supplier or begin to produce the part itself.

  Prepare a staffing plan

Prepare a staffing plan showing the change of your unit from medical/surgical staffing to oncology staffing.

  Leadership styles in different organizations

Ccompare the effectiveness of different leadership styles in different organizations

  Risk management tools and models

Be able to understand the concept of risk, roles and responsibilities for risk management and risk management tools and models.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd