North Korea unlikely to be behind Sony Pictures attacks

The tactics and publicity around the stolen documents are more in line with hacktivists, experts said

North Korea is most likely not responsible for the cyberattacks against Sony Pictures Entertainment, which saw thousands of sensitive internal documents released on the Web in a high-profile strike, experts said.

The secretive nation has been fingered in part because the same malware was used against Sony that crippled South Korea in March 2013. Those attacks, dubbed "Dark Seoul," wiped data from banks' computers, disabled ATMs and crippled websites.

It was also theorized that North Korea was angry about a forthcoming movie in the U.S., "The Interview," a comedy in which two show business reporters travel to North Korea to interview leader Kim Jong Un.

But the Sony attacks have been a more public affair, with taunting images displayed on hacked PCs, sensitive company documents posted online and gigabytes of leaked documents sent to journalists.

They are not tactics normally associated with state-sponsored attacks, said Lucas Zaichkowsky, an enterprise defense architect with Resolution1 Security.

"That is almost certainly a hacktivist play," said Zaichkowsky in a phone interview Wednesday.

Zaichkowsky used for work for Mandiant, the computer forensics company now owned by FireEye that has been reportedly contracted by Sony to investigate the attacks. He said the release of gigabytes of data seems more like a move that would come from hacktivists, possibly with connections to disgruntled employees.

A hacking group calling itself the Guardians of Peace (GOP) has claimed responsibility, and a self-proclaimed leader of the group has been sending data to reporters, including IDG News Service.

The group said in an email it was not working on behalf of any state and said its actions against Sony were in part related to the company's restructuring efforts and labor issues.

"Sony and Sony Pictures have made terrible racial discrimination and human rights violation, indiscriminate tyranny and restructuring in recent years," GOP wrote. "It has brought damage to a lot of people, some of whom are among us."

The group said corporate restructuring was the "decisive motive of our action" and called on Sony to "stop this and pay proper monetary compensation to the victims."

"We have another plan to correct the incidents of Michael Brown," the email to reporters added, referring to the fatal shooting of an unarmed man by a police officer in Ferguson, Missouri.

These are hardly the normal concerns of North Korea, and the message doesn't mention "The Interview" at all. It's more consistent with attacks by activist hackers due to its attention-seeking nature, public posting of links to stolen files on Pastebin and reference to social causes.

Jamie Blasco, director of AlienVault Labs, has been analyzing the malware and said the attackers seem to have had knowledge of Sony's internal network.

"The malware samples contain hardcoded names of servers inside Sony's network and even credentials/usernames and passwords that the malware uses to connect to systems inside the network," he said.

Former Sony employees might have that kind of network knowledge, but hackers also often do reconnaissance on networks prior to an attack, looking for weak points to exploit.

Although attributing cyberattacks is difficult, it's unlikely North Korea is behind Sony's troubles, said Scot. A. Terban, a threat intelligence analyst who writes under the Twitter handle @krypt3ia.

The style of malware used against Sony, which corrupts a computer's master boot record, has been around for 16 years, Terban said in a phone interview Wednesday.

It is possible that the Sony attackers obtained the same malware that was used against South Korea last year, as the malware is available on the internet. The attackers may have changed it a bit to avoid security software and then repurposed it, he said.

Terban said the use of Korean language encoding in the malware is still "not a lot to hang your hat on as far as attribution goes."

If North Korea had indeed struck Sony, "there would be no evidence of Korean coding" in the malware, Terban said.

Read more: Sony Hack Attack

McAfee, a computer security company now owned by Intel, did extensive research into the Dark Seoul attacks, publishing a technical report on the malware in July 2013.

Its analysts wrote the March 2013 attacks were actually the conclusion of a four-year covert espionage campaign that also sought classified military data.

Two groups, called the Whois Hacking Team and the NewRomanic Cyber Army Team, conducted the Dark Seoul attacks, but McAfee concluded they were likely part of the same team since they used similar attack code.

McAfee declined an interview request Thursday asking if its researchers were still tracking the groups.

Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is martyn_williams@idg.com

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags AccessDatamcafeesecuritydata breachSony Pictures Entertainment

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?