182w ago - Playstation Blog updated with latest info:
Thank you for your patience while we work to resolve the current outage of PlayStation Network & Qriocity services. We don't have an exact date to share at this moment as to when we will have the services turned on, but are working day and night to ensure it is as quickly as possible. We are currently working to send the following message via email to all of our registered account holders regarding a compromise of personal information as a result of this malicious attack on our servers, so please look for this information via email as well. Please note that we are as upset as you are regarding this attack and are going to proceed aggressively to track down those that are responsible.
Source, full text and letter (plus interresting comments below) here: [Register or Login to view links]
Valued PlayStation Network/Qriocity Customer,
We have discovered that between April 17 and April 19, 2011, certain PlayStation Network and Qriocity service user account information was compromised in connection with an illegal and unauthorized intrusion into our network. In response to this intrusion, we have:
1) Temporarily turned off PlayStation Network and Qriocity services;
2) Engaged an outside, recognized security firm to conduct a full and complete investigation into what happened; and
3) Quickly taken steps to enhance security and strengthen our network infrastructure by re-building our system to provide you with greater protection of your personal information.
We greatly appreciate your patience, understanding and goodwill as we do whatever it takes to resolve these issues as quickly and efficiently as practicable.
Although we are still investigating the details of this incident, we believe that an unauthorized person has obtained the following information that you provided: name, address (city, state/province, zip or postal code), country, email address, birthdate, PlayStation Network/Qriocity passwords and login, and handle/PSN online ID. It is also possible that your profile data, including purchase history and billing address (city, state, zip), and your PlayStation Network/Qriocity password security answers may have been obtained. If you have authorized a sub-account for your dependent, the same data with respect to your dependent may have been obtained. While there is no evidence that credit card data was taken at this time, we cannot rule out the possibility. If you have provided your credit card data through PlayStation Network or Qriocity, to be on the safe side we are advising you that your credit card number (excluding security code) and expiration date may also have been obtained.
For your security, we encourage you to be especially aware of email, telephone, and postal mail scams that ask for personal or sensitive information. Sony will not contact you in any way, including by email, asking for your credit card number, social security, tax identification or similar number or other personally identifiable information. If you are asked for this information, you can be confident Sony is not the entity asking. When the PlayStation Network and Qriocity services are fully restored, we strongly recommend that you log on and change your password. Additionally, if you use your PlayStation Network or Qriocity user name or password for other unrelated services or accounts, we strongly recommend that you change them, as well.
To protect against possible identity theft or other financial loss, we encourage you to remain vigilant to review your account statements and to monitor your credit or similar types of reports.
We thank you for your patience as we complete our investigation of this incident, and we regret any inconvenience. Our teams are working around the clock on this, and services will be restored as soon as possible. Sony takes information protection very seriously and will continue to work to ensure that additional measures are taken to protect personally identifiable information. Providing quality and secure entertainment services to our customers is our utmost priority. Please check [Register or Login to view links] should you have any additional questions.
Sony Network Entertainment and Sony Computer Entertainment Teams
Sony Network Entertainment Europe Limited (formerly known as PlayStation Network Europe Limited) is a subsidiary of Sony Computer Entertainment Europe Limited the data controller for PlayStation Network/Qriocity personal data.
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
Also - one quite suspicious aspect about all this is the "moving to the more secure location" - why would they need to do that if it was purelly outside attack? Or did they hosted it untill now in somebody's bedroom or what??
“a very carefully planned, very professional, highly sophisticated criminal cyber attack,”
This may be true Sony, but they would of needed some small amount of inside help one way or another, whether you admit that or not.
I still do not believe the group that allegedly did this will harm anyone other than pissing off Sony, and if reports come out that they are selling this info, then it will most likely to be fake or some kind of entrapment lol.
Sony was told about this months ago, they didn't find this, Sony didn't know they had a shadow on their system nor would they have, until they was told.
If I remember they was told Sony's system was insecure and needed addressing for the public's safety, and Sony being Sony thought they knew best and did nothing, so the group being the Jedi's nights luckily in this matter have saved the day and saved the data from the evil Sony empire and the black market, and made Sony sit up and smell the coffee and take note to stop this data getting into the wrong hands.
Amazon.com Inc. (AMZN)’s Web Services cloud- computing unit was used by hackers in last month’s attack against Sony Corp. (6758)’s online entertainment systems, according to a person with knowledge of the matter.
Hackers using an alias signed up to rent a server through Amazon’s EC2 service and launched the attack from there, said the person, who requested anonymity because the information is confidential. The account has been shut down, the person said.
The development sheds light on how hackers used the so- called cloud to carry out the second-biggest online theft of personal information to date. The incursion, which compromised the personal accounts of more than 100 million Sony customers, was “a very carefully planned, very professional, highly sophisticated criminal cyber attack,” Sony has said.
Drew Herdener, a spokesman for Seattle-based Amazon, declined to comment.
“We’re continuing to work with law enforcement in an ongoing investigation into the situation,” said Patrick Seybold, a U.S. spokesman for Tokyo-based Sony. “As such, we will not comment further on this matter.”
The hackers didn’t break into the Amazon servers, the person said. Rather, they signed up for the service just as a legitimate company would, using fake information.
Even so, the breach at Amazon is likely to call attention to concerns some businesses have voiced over the security of computing services delivered via others’ remote servers, referred to as cloud computing.
Cloud security is Amazon’s top priority, Chief Executive Officer Jeff Bezos said at an event sponsored by Consumer Reports magazine this week.
“Data security is one of these great dynamic situations where the bad guys get better, and the good guys have to keep getting better too -- it’s not a static situation,” Bezos said, Fast Company’s website reported. “I don’t think this is ever going away -- it’s like trying to say that you’re going to get crime to go away.”
The use of a hijacked or rented server to launch attacks is typical for sophisticated hackers. The proliferation of server farms around the globe has made such misdirection easier, said E.J. Hilbert, president of the security company Online Intelligence and a former FBI cyber-crime investigator.
The Federal Bureau of Investigation will likely subpoena Amazon as part of its investigation process, or it may try to obtain a search warrant, Hilbert said.
“The subpoena will give law enforcement a history of the transactions,” or who had access to the specific Internet address at that time, Hilbert said. “The search warrant will get them more detailed information, including payment information and which credit card was used.”
Herdener declined to say whether Amazon has been subpoenaed or served with a search warrant.
FBI Special Agent Darrell Foxworth, a spokesman for the agency’s San Diego office, said he couldn’t comment on whether the agency had served Amazon with a search warrant or subpoena.
“We are following up on each and every lead,” Foxworth said.
“The search warrant will get them more detailed information, including payment information and which credit card was used.”
Surely only idiot would use his / her own credit card for that - it it was so "highly sophisticated criminal cyber attack" then they'd either use the stolen card or prepaid one. Either way this lead would be pretty much useless. And indeed, in the same terms - from which location / IP was the transaction performed and any consequentuall access to the rented cloud space done.
And - for those liking the bit of conspiracy - why not assume that even the Amazon "failure due the the update / backup" was not for example another part of the cover up of the attack to Sony?