Sponsored Links

Sponsored Links

PS3 Hackers Address Potential PSN Security Issues and Bans


Sponsored Links
180w ago - Yesterday Sony addressed PS3 circumvention devices, piracy and PSN bans and today PS3 hackers SKFU among others via [Register or Login to view links] have reported on potential security risks for PlayStation Network users.

To quote: While I read about the big ban tsunami and interesting papers like [Register or Login to view links] ([Register or Login to view links]). I gone through a funny theory, I won't publish any details tho:

1) The bans are based on the users' account and console ID's.

2) We can modify all traffic sent and received by the PlayStation 3

What if some skiddies start to modify their sent traffic to appear as another user and use backups?

The PSN servers would recognize the TOS violation and check the online user database for known connections based on the ID's. The user and his consoles who really owns the ID's would be banned.

Even a simple Windows application which goes through ALL ID's may be possible. 24 hours and any console worldwide would be banned. This should definitely be double-checked by SONY.

From Ars (linked above) to quote: "A document written by the hackers has clarified what they did and what privacy and security risks they believe the PlayStation 3 poses. The PS3's connection to PSN is protected by SSL. As is common to SSL implementations, the identity of the remote server is verified using a list of certificates stored on each PS3. The credit card and other information is sent over this SSL connection. So far so good; this is all safe, and your web browser depends on the same mechanisms for online purchases.

The concern raised by the hackers is that custom firmwares could subvert this system. A custom firmware can include custom certificates in its trusted list. It can also use custom DNS servers. This raises the prospect of a malicious entity operating his own proxies to snaffle sensitive data. He would distribute a custom firmware that had a certificate corresponding to his proxy, and that used a DNS server that directed PSN connections to the proxy. His proxy would decrypt the data sent to it, and then re-encrypt it and forward it to the real PSN servers.

Such a scheme would be transparent to PSN users (except for any potential performance reduction caused by the proxying), and would give the attacker access to all the information that the PS3 sends to Sony. This information is shown to be extensive, but apart from the credit card data, probably not too sensitive or unreasonable.

As flaws go, the risks here are not substantial. There is no generalized ability for hackers to grab credit cards from PSN users; only those using specially devised custom firmwares would be at risk. Essentially the same risk could be faced by anyone downloading a pirated version of Windows: extra certificates could be added to those normally trusted, along with suitable DNS entries, to allow interception of any traffic destined for, say, amazon.com. In practice, the risk of either of these is slight, and in any case, trivially avoided: don't use custom firmware.

The original story is below, but note that the claims originally made by the hacker quoted in the article are unsubstantiated.

Sony has officially stated that anyone using hacked firmware or any sort of circumvention technology will have their console banned for life from the PlayStation Network, but how does the company know when such a console logs in? One person claims to have broken into the PlayStation Network, and what he has found is rather shocking. If his findings are accurate, your credit card information is being sent to Sony as an unencrypted text file, and Sony is watching every single thing you do with your system, keeping detailed records all the while.

"Sony is the biggest spy ever... they collect so much data. All connected devices return values sent to Sony's servers," the hacker said. He claims that Sony knows what controllers you're using, what USB devices are plugged in, what sort of television you're using–everything. Here's another section of the chat log:

• user2: another funny function i found is regarding psn downloads
• user2: its when a pkg game is requested from the store
• user2: in the url itself you can define if you get the game free or not. requires some modification in hashes and so on tho
• user3: ..
• user2: is like
• user8:
• user3: my god
• user2: drm: off

That's not all: your credit card information is apparently being sent as an unencrypted text file. This is how the code is being sent to Sony:

creditCard.paymentMethodId=VISA&creditCard.holderName=Max&creditCard.
cardNumber=45581234567812345678&creditCard.expireYear=2012&creditCard.
expireMonth=2&creditCard.securityCode=214&creditCard.address.address1=
example street%2024%20&creditCard.address.city=city1%
20&creditCard.address.province=abc%
20&creditCard.address.postalCode=12345%20

This information is allegedly being stored online and is updated every time you turn on your system. We've been receiving reports from various sources that e-mails are being sent to those with hacked firmware even before they log back into the PlayStation Network, which is even more evidence that Sony is grabbing information from your system just from being connected to your wireless network.

The ability to enable free downloads is likewise unsurprising, as there may be a way for some users, such as press and developers, to access the PlayStation Network without needing to pay for content.

While other console manufacturers may keep free, pre-review content in a separate, closed-off network, it's possible Sony keeps everything in one place, and controls who pays and who doesn't via a simple toggle. That would be unsafe from a security standpoint, but when has that stopped anyone from stupid mistakes in the past?

It's also very possible this is all fake, but much of what the unnamed hacker is saying links up with what we know from other sources about the behavior of the PlayStation Network. It's worth treating this as a very real threat: use PSN cards instead of credit cards on the PlayStation Network, and make sure you don't share any passwords or login information between your PSN account and other accounts.

We've contacted Sony for comment, but have not received a reply at time of publication. The hackers joked that the next update will remove the PlayStation Network, just as Sony removed the Other OS feature when it became compromised."

Finally, [Register or Login to view links] has tweeted the full log [Register or Login to view links] for those interested.





Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!

Comments 41 Comments - Go to Forum Thread »

• Please Register at PS3News.com or Login to make comments on Site News articles. Thanks!

SinnerShanky's Avatar
#31 - SinnerShanky - 180w ago
If the cc info really does goto the sony servers in unencrypted form then intercepting that is a piece of cake.. Anyone on your network can use packet sniffers to intercept, view and save the data sent and received by your internet connection.. Moreover if you use a cable connection then everyone who has their cable connected to the same hub or default gateway can intercept that data.

Its a very big issue if the info is sent in txt format.. What is usually done by applications is that they make their own two way algorithm and the decryption end is stored in a highly secure environment so as to prevent its leak and compromise the security of the info.. The cc info received is then decrypted by that algorithm and the transaction is processed.. Also if you want the cc info to be stored on the server then it is stored in encrypted form not a simple text file...!!!

NoZart's Avatar
#30 - NoZart - 180w ago
Ooops, overread that they are GUIDs. But how about the User IDs? Those should be collectible somehow, no?

NoZart's Avatar
#29 - NoZart - 180w ago
First off all: Sony is not intrusive. The sort of data they collect are nowhere out the norm. That is just within the normal logging. And does it really bother you that some machine somewhere knows what TV you have? They do not send videostreams of your living room somewhere, as MS does with kinect.

And regardign CC info: as long as you are on OFW, your Data is secure. When you are on OFW, your CC info is actually a few steps MORE secure then when you shop on your PC. Sony is not responsible for what happens when you decide to mess up your system with a CFW.

PiMpD's Avatar
#28 - PiMpD - 180w ago
Among other titles.. I am almost sure we used to network the XBOX through Gamespy on our PCs and play HALO 1 online against other players.. and I am almost positive Halo wasnt even an online game. I am sure the devs can think of something as far as a P2P Online community for HomeBrew users.

BryanNitro's Avatar
#27 - BryanNitro - 180w ago
Could this be enough to call a Class Action suite for reckless endangerment and invasion of privacy?
I plan on going to my lawyer tomorrow if Sony wants to play hardball then we need to make sure we get hit with a pitch if you know what I mean and hey if enough people take hits we can win the game.

Identity theft is VERY BIG right now and Sony doesn't want to back down which one is more of a threat to society.

Sponsored Links

Sponsored Links
Sponsored Links

Sponsored Links







Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News