The Ransomed.vc hacking group claimed yesterday that they successfully breached Sony’s servers. They stated they now have a substantial trove of sensitive information covering every aspect of the Japanese corporation’s operations.
Nevertheless, several malicious groups are asserting responsibility for this major data breach, further complicating matters. Moreover, many have even disseminated contradictory data to add to the confusion. Presently, Sony is conducting an investigation into the incident.
“We are currently investigating the situation, and we have no further comment at this time,” Sony released.
According to Ransomed.vc’s statement, it appears that Sony may have rejected the group’s ransom request. They have stated that if no buyer comes forward, the data will be made public on September 28.
According to Ransomed.vc’s statement, it appears that Sony may have rejected the group’s ransom request. They have stated that if no buyer comes forward, the data will be made public on September 28.
As per the multiple sources, the group is demanding $2.5 million (£1.97 million) for the data.
What has been compromised?
Even though the group asserts they have breached “all of” Sony’s systems, the evidence supporting this claim is somewhat lacking and does not entirely align with their statements.
However, a portion of the purported evidence for the hack is a file system tree displaying the extracted data. This tree seems to contain less than 6,000 files, with a significant number of them apparently in Japanese.
What has been compromised?
Even though the group asserts they have breached “all of” Sony’s systems, the evidence supporting this claim is somewhat lacking and does not entirely align with their statements.
However, a portion of the purported evidence for the hack is a file system tree displaying the extracted data. This tree seems to contain less than 6,000 files, with a significant number of them apparently in Japanese.
“We have successfully compromised [sic]
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents
Read the original article: