Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
 

Comrade Grumpy

(13,184 posts)
Thu Dec 25, 2014, 04:19 PM Dec 2014

Did North Korea really hack Sony? The New York Times and CBS News have doubts.

They're not typically considered conspiracy theory purveyors.

The Times:

http://bits.blogs.nytimes.com/2014/12/24/new-study-adds-to-skepticism-among-security-experts-that-north-korea-was-behind-sony-hack

"New Study Adds to Skepticism Among Security Experts That North Korea Was Behind Sony Hack"

CBS:

http://www.cbsnews.com/news/did-the-fbi-get-it-wrong-on-north-korea/

"Was the FBI Wrong on North Korea?"

--------

These two reports make a pretty strong case that it wasn't North Korea. Are we going to get a response from the FBI? This is serious stuff. We are accusing another country of attacking us. We should be sure we got that right.

9 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Did North Korea really hack Sony? The New York Times and CBS News have doubts. (Original Post) Comrade Grumpy Dec 2014 OP
interesting article. whoever has access to NK internet access controls them. Sunlei Dec 2014 #1
My thought was that it was an inside hack that sold the info to North Korea. kwassa Dec 2014 #2
Yes, it was a disgruntled employee PSPS Dec 2014 #4
From the CBS piece: North Korea fingerprints are "decoys or red herrings." Comrade Grumpy Dec 2014 #3
From the Times piece. Reasons for skepticism: Comrade Grumpy Dec 2014 #5
In these ElectronIc times seveneyes Dec 2014 #6
Many doubts zappaman Dec 2014 #7
In an age of absurdity CJCRANE Dec 2014 #8
Any sign of an FBI response to these doubters? Comrade Grumpy Dec 2014 #9

Sunlei

(22,651 posts)
1. interesting article. whoever has access to NK internet access controls them.
Thu Dec 25, 2014, 04:29 PM
Dec 2014

could have been an inside job, disgruntled employee or a silly movie publicity stunt that stupidly used the naughty few'"terror!!! words" that catches NSA attention.

kwassa

(23,340 posts)
2. My thought was that it was an inside hack that sold the info to North Korea.
Thu Dec 25, 2014, 04:32 PM
Dec 2014

It does sound technically impossible to come from the outside, based on the massive amount of data taken.

PSPS

(13,614 posts)
4. Yes, it was a disgruntled employee
Thu Dec 25, 2014, 05:38 PM
Dec 2014

When the data theft occurred, the only demand being made was for money. The whole "Interview" connection was created out of whole cloth by the Sony marketing department. The corporate/state media plays this angle down, of course, since it relies so much on Sony for its income through advertising. I'm sure there were plenty of high-fives around the Sony offices when they managed to even get Obama on the bandwagon.

 

Comrade Grumpy

(13,184 posts)
3. From the CBS piece: North Korea fingerprints are "decoys or red herrings."
Thu Dec 25, 2014, 05:34 PM
Dec 2014

They are quoting Kurt Stammberger, a senior vice president with Norse Security.

"Sony was not just hacked, this is a company that was essentially nuked from the inside," said Stammberger. "We are very confident that this was not an attack master-minded by North Korea and that insiders were key to the implementation of one of the most devastating attacks in history."

He says Norse data is pointing towards a woman who calls herself "Lena" and claims to be connected with the so-called "Guardians of Peace" hacking group. Norse believes it's identified this woman as someone who worked at Sony in Los Angeles for ten years until leaving the company this past May. "This woman was in precisely the right position and had the deep technical background she would need to locate the specific servers that were compromised," Stammberger told me.

Other experts in cybersecurity and private intelligence are also questioning the FBI's claim that North Korea is solely to blame for the Sony hack.

"There are certainly North Korean fingerprints on this but when we run all those leads to ground they turn out to be decoys or red herrings," said Stammberger.

<snip>

 

Comrade Grumpy

(13,184 posts)
5. From the Times piece. Reasons for skepticism:
Thu Dec 25, 2014, 05:39 PM
Dec 2014

<snip>

For one, skeptics note that the few malware samples they have studied indicate the hackers routed their attack through computers all over the world. One of those computers, in Bolivia, had been used by the same group to hack targets in South Korea. But that computer, as well as others in Poland, Italy, Thailand, Singapore, Cyprus and the United States, were all freely available to anyone to use, which opens the list of suspects to anyone with an Internet connection and basic hacking skills.

For another, Sony’s attackers constructed their malware on computers configured with Korean language settings, but skeptics note that those settings could have been reset to deflect blame. They also note the attackers used commercial software wiping tools that could have been purchased by anyone.

They also point out that whoever attacked Sony had a keen understanding of its computer systems — the names of company servers and passwords were all hard-coded into the malware — suggesting the hackers were inside Sony before they launched their attack. Or it could even have been an inside job.

And then there’s the motive. Government officials claim the Sony attacks were retaliation for “The Interview,” a feature film about two bumbling journalists hired by the C.I.A. to assassinate North Korea’s leader. In a letter last June, North Korea’s ambassador to the United Nations called the film “an act of war.” But naysayers point out that, as far as they can tell, Sony’s attackers did not mention the film as motivation until that theory percolated in the media.

The simpler explanation is that it was an angry “insider,” Mr. Rogers wrote. “Combine that with the details of several layoffs that Sony was planning, and you don’t have to stretch the imagination too far to consider that a disgruntled Sony employee might be at the heart of it all.”

On Wednesday, one alternate theory emerged. Computational linguists at Taia Global, a cybersecurity consultancy, performed a linguistic analysis of the hackers’ online messages — which were all written in imperfect English — and concluded that based on translation errors and phrasing, the attackers are more likely to be Russian speakers than Korean speakers.

<snip>

 

seveneyes

(4,631 posts)
6. In these ElectronIc times
Thu Dec 25, 2014, 05:45 PM
Dec 2014

The quantum is just a shout away. That which is possible will happen.

There are so many enlightening answers to this mystery that time is needed to answer them all. Keep the faith, keep it real and the inevitable will occur. Brothers and sisters in arms until the truth prevails.

zappaman

(20,606 posts)
7. Many doubts
Thu Dec 25, 2014, 05:48 PM
Dec 2014

“The FBI also observed significant overlap between the infrastructure used in this attack and other malicious cyber activity the U.S. government has previously linked directly to North Korea. For example, the FBI discovered that several Internet protocol (IP) addresses associated with known North Korean infrastructure communicated with IP addresses that were hardcoded into the data deletion malware used in this attack.”

What they are saying is that the Internet addresses found after the Sony Picture attack are “known” addresses that had previously been used by North Korea in other cyberattacks.

To cyber security experts, the naivety of this statement beggars belief. Note to the FBI: Just because a system with a particular IP address was used for cybercrime doesn’t mean that from now on every time you see that IP address you can link it to cybercrime. Plus, while sometimes IPs can be “permanent”, at other times IPs last just a few seconds.

It isn’t the IP address that the FBI should be paying attention to. Rather it’s the server or service that’s behind it.

http://www.thedailybeast.com/articles/2014/12/24/no-north-korea-didn-t-hack-sony.html?source=TDB&via=FB_Page

CJCRANE

(18,184 posts)
8. In an age of absurdity
Thu Dec 25, 2014, 06:03 PM
Dec 2014

common sense becomes a conspiracy theory.

Obama was allowed one and a bit terms without all the neocon BS, now they've opened the floodgates again.

Latest Discussions»General Discussion»Did North Korea really ha...