135w ago - As a follow-up to yesterday's PSN updates, Sony's Senior Director of Corporate Communications & Social Media Patrick Seybold has posted another brief PlayStation Network update as follows:
As you may know, we've begun the process of restoring the service through internal testing of the new system. We're still working to confirm the security of the network infrastructure, as well as working with a variety of outside entities to confirm with them of the security of the system. Verifying the system security is vital for the process of restoration. Additional comprehensive system checks and testing are still required, and we must complete that process before bringing the systems online.
As you've heard us say, our utmost priorities are the security of the network and ensuring your data is safe. We won't restore the services until we can test the system's strength in these respects.
When we held the press conference in Japan last week, based on what we knew, we expected to have the services online within a week. We were unaware of the extent of the attack on Sony Online Entertainment servers, and we are taking this opportunity to conduct further testing of the incredibly complex system.
We know many of you are wanting to play games online, chat with your friends and enjoy all of the services PlayStation Network and Qriocity services have to offer, and trust me when I say we're doing everything we can to make it happen. We will update you with more information as soon as we have it. We apologize for the delay and inconvenience of this network outage.
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
Also - one quite suspicious aspect about all this is the "moving to the more secure location" - why would they need to do that if it was purelly outside attack? Or did they hosted it untill now in somebody's bedroom or what??
“a very carefully planned, very professional, highly sophisticated criminal cyber attack,”
This may be true Sony, but they would of needed some small amount of inside help one way or another, whether you admit that or not.
I still do not believe the group that allegedly did this will harm anyone other than pissing off Sony, and if reports come out that they are selling this info, then it will most likely to be fake or some kind of entrapment lol.
Sony was told about this months ago, they didn't find this, Sony didn't know they had a shadow on their system nor would they have, until they was told.
If I remember they was told Sony's system was insecure and needed addressing for the public's safety, and Sony being Sony thought they knew best and did nothing, so the group being the Jedi's nights luckily in this matter have saved the day and saved the data from the evil Sony empire and the black market, and made Sony sit up and smell the coffee and take note to stop this data getting into the wrong hands.
Surely only idiot would use his / her own credit card for that - it it was so "highly sophisticated criminal cyber attack" then they'd either use the stolen card or prepaid one. Either way this lead would be pretty much useless. And indeed, in the same terms - from which location / IP was the transaction performed and any consequentuall access to the rented cloud space done.
And - for those liking the bit of conspiracy - why not assume that even the Amazon "failure due the the update / backup" was not for example another part of the cover up of the attack to Sony?