Sony said to be using DDoS attacks to slow the spread of stolen data

Shawn Knight

Posts: 12,999   +130
Staff member
Sony Pictures is still reeling from the hack on its computer network in which a group calling itself the Guardians of Peace made off with loads of personal data on employees and celebrities. The sensitive data has since shown up...

[newwindow="https://www.techspot.com/news/59140-sony-using-ddos-attacks-slow-spread-stolen-data.html"]Read more[/newwindow]
 

JohnCB

Posts: 118   +62
I'm supposed to believe that the company incapable of encrypting passwords is sophisticated enough to have their own botnet available on demand to DDOS others? C'mon....

And even if they do... it's pointless. The data has already leaked all over the place. You can never put those worms back in the can.
 

seefizzle

Posts: 422   +292
Hasn't sony learned their lesson? At one point Sony installed root-kit viruses on audio cd's. **** sony.

I can't think of the last sony anything I've bought.
 

abysal

Posts: 126   +46
I've thought of Sony as piece of sh** of a company, ever since they sold rootkit DRM infected CDs. I refused to buy any of Sony's crap since then. Karma is a b**ch. I wonder the legality of them using DDoS against other web entities? I'm sure anyone of us would go to jail for cyber crimes doing such things.
 

Evernessince

Posts: 5,464   +6,145
Sony really wants to make itself a target, doesn't it? This is like a kid flailing wildly at a bee-hive. Their willingness to resort to illegal measures will draw the ire of even more hacker groups. It's no surprise that they are hacked all the time.

To me, Sony is worse than any pirate or hacker group out there. They DDoS and block websites with competing material, punish real customers with demanding DRM, and actively manipulate laws to continue their behavior.
 

Evernessince

Posts: 5,464   +6,145
I'm supposed to believe that the company incapable of encrypting passwords is sophisticated enough to have their own botnet available on demand to DDOS others? C'mon....

And even if they do... it's pointless. The data has already leaked all over the place. You can never put those worms back in the can.

The article mentioned that they weren't using their own servers. I would not be surprised if they were using the Anon DDoS tool the hacker group release to the public last year.
 

JohnCB

Posts: 118   +62
The article mentioned that they weren't using their own servers. I would not be surprised if they were using the Anon DDoS tool the hacker group release to the public last year.

You're going to need to cite source.

Unless you're referencing something else, "Anon" isn't really a "hacker group". Additionally their "weapon of choice" is nothing more than LOIC which still requires a large group of computers to flood the target's connections.
 

Evernessince

Posts: 5,464   +6,145
You're going to need to cite source.

Unless you're referencing something else, "Anon" isn't really a "hacker group". Additionally their "weapon of choice" is nothing more than LOIC which still requires a large group of computers to flood the target's connections.

Just found out that they are not using DDoS. They are seeding fake files instead.

Anon is short for anonymous. LOIC is a DDoS utility

http://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon
 
G

Guest

Oh joy, a new friend is attempting to explain how knowledgable he is in regards of "Anonymous."