Yeah your right, searched on IMDB and found what looks like to be a perfect match.
Probably going to be a abysmal movie (political drama -- sound like fun, lol) but is a funny coincidence on the title.
Update: PSN is now back online in Japan, and Kaz Harai has made available a http://blip.tv/play/h5NMgr6pNgI statement with all the related details.
Following news that PSN internal testing is currently underway, today the official PlayStation Japan site has issued an update regarding the PlayStation Network outage alongside details from the official letter Sony sent out to their publishing partners.
To quote, roughly translated: "PlayStation Network” and “Qriocity” and continued failure, I am sorry indeed. As we told the other day with the latest information in regard to future service restart, will be conducted in stages on a regional basis to ensure the safety of our customers.
We are preparing to be able to resume service as soon as possible in Japan, and is now doing the verification stage for ensuring the safety and security, providing more advanced. Server to complete the relocation of more secure facilities, further strengthening the encryption, firewalls and expansion of new customers with peace of mind again on “PlayStation Network” and “Qriocity” to stay.
We also are supporting the monitoring and the introduction of warning systems to facilitate early detection of cyber attacks, subjected to a system upgrade intended to eliminate vulnerabilities, established a system to ensure information management to protect important personal information of customers.
For those of you committed to ensuring safety, but would take some time for some time now, humbly thank you for your understanding. For the latest information, this website will guide you at any time. To everyone of our customers and partners, we deeply apologize for the inconvenience and inconvenience."
In related news, http://www.industrygamers.com/news/playstation-network-heres-the-official-letter-sony-sent-to-publishing-partners-exclusive/ has shared a copy of the official letter Sony SVP Rob Dyer sent out regarding PSN to their publishing partners, as detailed below:
As you know, certain PlayStation Network, Qriocity and Sony Online Entertainment service user account information was compromised in criminal attacks against our networks. I want to assure you, as a PlayStation partner, that it is Sony’s top priority to restore our network operations and see that business is returned to usual as soon as possible.
We are working around the clock to restore service, but will do so only when we can ensure that the network can operate safely and securely. In the meantime, we greatly appreciate your patience, understanding and goodwill.
What Data Are Affected?
- On Tuesday, April 19, 2011, Sony discovered that several PlayStation Network servers unexpectedly rebooted themselves and that unplanned and unusual activity was taking place on the network. This activity triggered an immediate response.
- Sony mobilized a larger internal team to assist the investigation of the four suspect servers. That team discovered the first credible indications that an intruder had been in the PlayStation Network system, and six more servers were identified as possibly being compromised. Sony immediately decided to shut down all of the PlayStation Network services in order to prevent any additional damage.
- The scope and complexity of the investigation grew substantially as additional evidence about the attack developed.
- The forensic teams were able to confirm that intruders had used very sophisticated and aggressive techniques to obtain unauthorized access, hide their presence from system administrators and escalate privileges inside the servers. Among other things, the intruders deleted log files in order to hide the extent of their work and activity within the network.
- On Sunday May 1, using information uncovered by the forensic teams, engineers at Sony Online Entertainment (SOE) discovered that data had also been taken from their servers. They, too, shut down operations and on Monday, May 2, announced the discovery.
As you may know, personal data was stolen from approximately 77 million PlayStation network and Qriocity service accounts.
As of this writing, there remains no evidence that the credit card information was stolen and the major credit card companies are still reporting that they have not seen an increase in fraudulent transactions due to this event.
What Steps Are Being Taken?
We have taken aggressive action to give consumers peace of mind, protect them against the abuse of their data, and enhance our security systems moving forward.
We have already advised our consumers in the U.S. that we will offer complimentary identity theft protection services through a leading provider, including an insurance program of up to $1 million. Similar programs are being developed in other markets around the world.
In addition, Sony is taking a series of steps to enhance security of our network infrastructure. They include but are not limited to:
Finally, to thank our customers for their patience and loyalty, we are offering them “welcome back” packages as soon as the networks are restored, including free downloads of selected PlayStation entertainment, 30 days of free service as well as service extensions for the number of days PSN and Qriocity services were unavailable, with similar benefits for Music Unlimited subscribers.
- adding additional automated software monitoring and configuration management to help defend against new attacks;
- enhanced levels of data protection and encryption, as well as additional penetration and vulnerability testing;
- enhanced capabilities to detect software intrusions within the network, unauthorized access and unusual activity patterns;
- implementation of additional firewalls;
- expediting a planned move of the system to a new data center in a different location with enhanced security; and
- appointment of a new Chief Information Security Officer.
We of course deeply regret that this incident has occurred. We are working closely with the FBI to identify and apprehend the culprits who committed this crime against our consumers, our partners and our company. I know you can appreciate how widespread the problem of cybercrime is in society today. Although no company is immune, we are confident our consumer data will be protected by some of the best security measures available today.
As a valued partner we aim to keep the lines of communication open so that you are aware of our progress. Our focus has been to confirm the security of the networks, protect customer data and get the services back on line as quickly as possible. We will do our best to respond to all of your inquiries and we will do everything we possibly can to support you.
We are doing everything we can to bring these services back online as soon as possible. We will update you with more information as soon as we can, but please call your account executive if you have further questions. We thank you for your patience and look forward to moving ahead together in the months and years to come.
Very truly yours,
SVP, Publisher Relations
More PlayStation 3 News...
Again - just repeating the old song...
OMG this is really getting boring now, i'm sick of hearing about it. SONY hurry up and sort it out, your not building swiss watches so why is it taking so long. Grrrrrr
• appointment of a new Chief Information Security Officer.
Who's that then? Not our Geo lol.
i know right..
Source: http://www.bloomberg.com/news/2011-05-13/sony-network-said-to-have-been-invaded-by-hackers-using-amazon-com-server.htmlAmazon.com Inc. (AMZN)’s Web Services cloud- computing unit was used by hackers in last month’s attack against Sony Corp. (6758)’s online entertainment systems, according to a person with knowledge of the matter.
Hackers using an alias signed up to rent a server through Amazon’s EC2 service and launched the attack from there, said the person, who requested anonymity because the information is confidential. The account has been shut down, the person said.
The development sheds light on how hackers used the so- called cloud to carry out the second-biggest online theft of personal information to date. The incursion, which compromised the personal accounts of more than 100 million Sony customers, was “a very carefully planned, very professional, highly sophisticated criminal cyber attack,” Sony has said.
Drew Herdener, a spokesman for Seattle-based Amazon, declined to comment.
“We’re continuing to work with law enforcement in an ongoing investigation into the situation,” said Patrick Seybold, a U.S. spokesman for Tokyo-based Sony. “As such, we will not comment further on this matter.”
The hackers didn’t break into the Amazon servers, the person said. Rather, they signed up for the service just as a legitimate company would, using fake information.
Even so, the breach at Amazon is likely to call attention to concerns some businesses have voiced over the security of computing services delivered via others’ remote servers, referred to as cloud computing.
Cloud security is Amazon’s top priority, Chief Executive Officer Jeff Bezos said at an event sponsored by Consumer Reports magazine this week.
“Data security is one of these great dynamic situations where the bad guys get better, and the good guys have to keep getting better too -- it’s not a static situation,” Bezos said, Fast Company’s website reported. “I don’t think this is ever going away -- it’s like trying to say that you’re going to get crime to go away.”
The use of a hijacked or rented server to launch attacks is typical for sophisticated hackers. The proliferation of server farms around the globe has made such misdirection easier, said E.J. Hilbert, president of the security company Online Intelligence and a former FBI cyber-crime investigator.
The Federal Bureau of Investigation will likely subpoena Amazon as part of its investigation process, or it may try to obtain a search warrant, Hilbert said.
“The subpoena will give law enforcement a history of the transactions,” or who had access to the specific Internet address at that time, Hilbert said. “The search warrant will get them more detailed information, including payment information and which credit card was used.”
Herdener declined to say whether Amazon has been subpoenaed or served with a search warrant.
FBI Special Agent Darrell Foxworth, a spokesman for the agency’s San Diego office, said he couldn’t comment on whether the agency had served Amazon with a search warrant or subpoena.
“We are following up on each and every lead,” Foxworth said.
And just on the side note:
Surely only idiot would use his / her own credit card for that - it it was so "highly sophisticated criminal cyber attack" then they'd either use the stolen card or prepaid one. Either way this lead would be pretty much useless. And indeed, in the same terms - from which location / IP was the transaction performed and any consequentuall access to the rented cloud space done.“The search warrant will get them more detailed information, including payment information and which credit card was used.”
And - for those liking the bit of conspiracy - why not assume that even the Amazon "failure due the the update / backup" was not for example another part of the cover up of the attack to Sony?
Last edited by GrandpaHomer; 05-14-2011 at 07:14 AM Reason: Automerged Doublepost
Interesting indeed, +Rep for the update GrandpaHomer.