news\ Oct 12, 2011 at 10:40 am

Sony Reports Another Hack Attempt on Network, Credit Card Info "Not at Risk"


Surprise, surprise, Sony is suffering from ANOTHER hack attempt on its networks.  This seems like a weekly occurance for Sony, so you'd expect them to be adequately prepared for it.  And this time, it appears they were...well, as much as you'd expect from Sony at this point.  If you consider less than one percent of users affected as being prepared, then Sony passed test.  Sony's Chief Information Security Officer, Philip Reitinger posted on the official PlayStation blog explaining the incident.

"We want to let you know that we have detected attempts on Sony Entertainment Network, PlayStation Network and Sony Online Entertainment (“Networks”) services to test a massive set of sign-in IDs and passwords against our network database. These attempts appear to include a large amount of data obtained from one or more compromised lists from other companies, sites or other sources," explained Reitlinger.

According to Reitlinger, there were approximately 93,000 accounts globally that were affected, or roughly less than one tenth of one percent of SOny's PSN, SEN, and SOE audience.  Doesn't sound like many, but if you're one of those 93,000 accounts locked out because the attempts succeeded in verifying valid sign-in IDs and passwords, I bet your pretty pissed.

I think the important thing ot take away from all of this was that Sony was, for the first time, adequately prepared to handle the hack.  Reitinger emphasized, "if you have a credit card associated with your account, your credit card number is not at risk."  Well, that's reassuring.

As a preventative measure, Sony is requiring secure password resets for the PSN/SEN accounts that had both a sign-in ID and password match through this attempt.  Those in the .1% should get an email from Sony prompting you to reset your password.

PlayStation Network just can't catch a sure to check your emails!

About The Author
In This Article
From Around The Web
blog comments powered by Disqus