SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Update on Sony Investigation
Washington, D.C.
December 19, 2014
FBI National Press
Office(202) 324-3691
Today, the FBI would like to provide an update on the status of our investigation into
the cyber attack targeting Sony Pictures Entertainment (SPE). In late November, SPE
confirmed that it was the victim of a cyber attack that destroyed systems and stole large
quantities of personal and commercial data. A group calling itself the “Guardians of
Peace” claimed responsibility for the attack and subsequently issued threats against
SPE, its employees, and theaters that distribute its movies.
The FBI has determined that the intrusion into SPE’s network consisted of the
deployment of destructive malware and the theft of proprietary information as well as
employees’ personally identifiable information and confidential communications. The
attacks also rendered thousands of SPE’s computers inoperable, forced SPE to take its
entire computer network offline, and significantly disrupted the company’s business
operations.
After discovering the intrusion into its network, SPE requested the FBI’s assistance.
Since then, the FBI has been working closely with the company throughout the
investigation. Sony has been a great partner in the investigation, and continues to work
closely with the FBI. Sony reported this incident within hours, which is what the FBI
hopes all companies will do when facing a cyber attack. Sony’s quick reporting
facilitated the investigators’ ability to do their jobs, and ultimately to identify the source
of these attacks.
As a result of our investigation, and in close collaboration with other U.S. government
departments and agencies, the FBI now has enough information to conclude that the
North Korean government is responsible for these actions. While the need to protect
sensitive sources and methods precludes us from sharing all of this information, our
conclusion is based, in part, on the following:
▪ Technical analysis of the data deletion malware used in this attack revealed links
to other malware that the FBI knows North Korean actors previously developed.
For example, there were similarities in specific lines of code, encryption
algorithms, data deletion methods, and compromised networks.
▪ The FBI also observed significant overlap between the infrastructure used in this
attack and other malicious cyber activity the U.S. government has previously
linked directly to North Korea. For example, the FBI discovered that several
Internet protocol (IP) addresses associated with known North Korean
infrastructure communicated with IP addresses that were hardcoded into the
data deletion malware used in this attack.
▪ Separately, the tools used in the SPE attack have similarities to a cyber attack in
March of last year against South Korean banks and media outlets, which was
carried out by North Korea.
We are deeply concerned about the destructive nature of this attack on a private sector
entity and the ordinary citizens who worked there. Further, North Korea’s attack on SPE
reaffirms that cyber threats pose one of the gravest national security dangers to the
United States. Though the FBI has seen a wide variety and increasing number of cyber
intrusions, the destructive nature of this attack, coupled with its coercive nature, sets it
apart. North Korea’s actions were intended to inflict significant harm on a U.S. business
and suppress the right of American citizens to express themselves. Such acts of
intimidation fall outside the bounds of acceptable state behavior. The FBI takes
seriously any attempt—whether through cyber-enabled means, threats of violence, or
otherwise—to undermine the economic and social prosperity of our citizens.
The FBI stands ready to assist any U.S. company that is the victim of a destructive cyber
attack or breach of confidential business information. Further, the FBI will continue to
work closely with multiple departments and agencies as well as with domestic, foreign,
and private sector partners who have played a critical role in our ability to trace this and
other cyber threats to their source. Working together, the FBI will identify, pursue, and
impose costs and consequences on individuals, groups, or nation states who use cyber
means to threaten the United States or U.S. interests.

Contenu connexe

En vedette

Presentación Iriana Colina Seguridad industrial 2 semestre
Presentación Iriana Colina Seguridad industrial 2 semestrePresentación Iriana Colina Seguridad industrial 2 semestre
Presentación Iriana Colina Seguridad industrial 2 semestrealbanyta
 
Cake Phpで簡単問い合わせフォームの作り方
Cake Phpで簡単問い合わせフォームの作り方Cake Phpで簡単問い合わせフォームの作り方
Cake Phpで簡単問い合わせフォームの作り方柴田 篤志
 
Getting Started With INBOUND Marketing
Getting Started With INBOUND MarketingGetting Started With INBOUND Marketing
Getting Started With INBOUND MarketingDigital AdDoctor
 
Leveraging social media for admins
Leveraging social media for adminsLeveraging social media for admins
Leveraging social media for adminsCrystal Coleman
 
How to prepare for class 12 board exams
How to prepare for class 12 board examsHow to prepare for class 12 board exams
How to prepare for class 12 board examsEdnexa
 
Introducción a la computacón
Introducción a la computacónIntroducción a la computacón
Introducción a la computacónCabrera Miguel
 
Peter LaBrash resume
Peter LaBrash resumePeter LaBrash resume
Peter LaBrash resumePeter LaBrash
 

En vedette (10)

Presentación Iriana Colina Seguridad industrial 2 semestre
Presentación Iriana Colina Seguridad industrial 2 semestrePresentación Iriana Colina Seguridad industrial 2 semestre
Presentación Iriana Colina Seguridad industrial 2 semestre
 
Docker.io
Docker.ioDocker.io
Docker.io
 
Evolucion De La Ead
Evolucion De La EadEvolucion De La Ead
Evolucion De La Ead
 
Cake Phpで簡単問い合わせフォームの作り方
Cake Phpで簡単問い合わせフォームの作り方Cake Phpで簡単問い合わせフォームの作り方
Cake Phpで簡単問い合わせフォームの作り方
 
Getting Started With INBOUND Marketing
Getting Started With INBOUND MarketingGetting Started With INBOUND Marketing
Getting Started With INBOUND Marketing
 
Leveraging social media for admins
Leveraging social media for adminsLeveraging social media for admins
Leveraging social media for admins
 
How to prepare for class 12 board exams
How to prepare for class 12 board examsHow to prepare for class 12 board exams
How to prepare for class 12 board exams
 
Introducción a la computacón
Introducción a la computacónIntroducción a la computacón
Introducción a la computacón
 
testimonial
testimonialtestimonial
testimonial
 
Peter LaBrash resume
Peter LaBrash resumePeter LaBrash resume
Peter LaBrash resume
 

Plus de Harrison Weber

F8k072618 heliosmatheson
F8k072618 heliosmathesonF8k072618 heliosmatheson
F8k072618 heliosmathesonHarrison Weber
 
Apple Patent: WHISPERED SPEECH
Apple Patent: WHISPERED SPEECH Apple Patent: WHISPERED SPEECH
Apple Patent: WHISPERED SPEECH Harrison Weber
 
Google, Apple, Microsoft, and Amazon voice support for Obama's Clean Power Plan
Google, Apple, Microsoft, and Amazon voice support for Obama's Clean Power PlanGoogle, Apple, Microsoft, and Amazon voice support for Obama's Clean Power Plan
Google, Apple, Microsoft, and Amazon voice support for Obama's Clean Power PlanHarrison Weber
 
2015 q3 google_earnings_slides
2015 q3 google_earnings_slides2015 q3 google_earnings_slides
2015 q3 google_earnings_slidesHarrison Weber
 
Clinton Emails:Entrepreneurship summit
Clinton Emails:Entrepreneurship summitClinton Emails:Entrepreneurship summit
Clinton Emails:Entrepreneurship summitHarrison Weber
 
Hillary Clinton's email: Twitter revolution
Hillary Clinton's email: Twitter revolutionHillary Clinton's email: Twitter revolution
Hillary Clinton's email: Twitter revolutionHarrison Weber
 
Hillary Clinton's email: Internet freedom
Hillary Clinton's email: Internet freedomHillary Clinton's email: Internet freedom
Hillary Clinton's email: Internet freedomHarrison Weber
 
Hillary Clinton's email: Internet freedom 2
Hillary Clinton's email: Internet freedom 2Hillary Clinton's email: Internet freedom 2
Hillary Clinton's email: Internet freedom 2Harrison Weber
 
Hillary Clinton's email: Internet freedom 3
Hillary Clinton's email: Internet freedom 3Hillary Clinton's email: Internet freedom 3
Hillary Clinton's email: Internet freedom 3Harrison Weber
 
Hillary Clinton's email: Google sponsorship
Hillary Clinton's email: Google sponsorshipHillary Clinton's email: Google sponsorship
Hillary Clinton's email: Google sponsorshipHarrison Weber
 
FCC Net Neutrality Rules
FCC Net Neutrality RulesFCC Net Neutrality Rules
FCC Net Neutrality RulesHarrison Weber
 
Uber targets would-be drunk drivers with latest study
Uber targets would-be drunk drivers with latest studyUber targets would-be drunk drivers with latest study
Uber targets would-be drunk drivers with latest studyHarrison Weber
 
Facebook completes WhatsApp acquisition, CEO Jan Koum agrees to $1 base salary
Facebook completes WhatsApp acquisition, CEO Jan Koum agrees to $1 base salaryFacebook completes WhatsApp acquisition, CEO Jan Koum agrees to $1 base salary
Facebook completes WhatsApp acquisition, CEO Jan Koum agrees to $1 base salaryHarrison Weber
 
Building robotics sec form d
Building robotics sec form dBuilding robotics sec form d
Building robotics sec form dHarrison Weber
 
Apple — i pad — compare ipad models
Apple — i pad — compare ipad modelsApple — i pad — compare ipad models
Apple — i pad — compare ipad modelsHarrison Weber
 
American society of media photographers, inc. et al. v. google inc.
American society of media photographers, inc. et al. v. google inc.American society of media photographers, inc. et al. v. google inc.
American society of media photographers, inc. et al. v. google inc.Harrison Weber
 
Twitter Malware Patent
Twitter Malware PatentTwitter Malware Patent
Twitter Malware PatentHarrison Weber
 
Lybrate, india's ZocDoc, raises 1.2m as ZocDoc itself readies launch in the r...
Lybrate, india's ZocDoc, raises 1.2m as ZocDoc itself readies launch in the r...Lybrate, india's ZocDoc, raises 1.2m as ZocDoc itself readies launch in the r...
Lybrate, india's ZocDoc, raises 1.2m as ZocDoc itself readies launch in the r...Harrison Weber
 
Mozilla recycled pr pitch2
Mozilla recycled pr pitch2Mozilla recycled pr pitch2
Mozilla recycled pr pitch2Harrison Weber
 

Plus de Harrison Weber (20)

F8k072618 heliosmatheson
F8k072618 heliosmathesonF8k072618 heliosmatheson
F8k072618 heliosmatheson
 
Apple Patent: WHISPERED SPEECH
Apple Patent: WHISPERED SPEECH Apple Patent: WHISPERED SPEECH
Apple Patent: WHISPERED SPEECH
 
Google, Apple, Microsoft, and Amazon voice support for Obama's Clean Power Plan
Google, Apple, Microsoft, and Amazon voice support for Obama's Clean Power PlanGoogle, Apple, Microsoft, and Amazon voice support for Obama's Clean Power Plan
Google, Apple, Microsoft, and Amazon voice support for Obama's Clean Power Plan
 
2015 q3 google_earnings_slides
2015 q3 google_earnings_slides2015 q3 google_earnings_slides
2015 q3 google_earnings_slides
 
Clinton Emails:Entrepreneurship summit
Clinton Emails:Entrepreneurship summitClinton Emails:Entrepreneurship summit
Clinton Emails:Entrepreneurship summit
 
Hillary Clinton's email: Twitter revolution
Hillary Clinton's email: Twitter revolutionHillary Clinton's email: Twitter revolution
Hillary Clinton's email: Twitter revolution
 
Hillary Clinton's email: Internet freedom
Hillary Clinton's email: Internet freedomHillary Clinton's email: Internet freedom
Hillary Clinton's email: Internet freedom
 
Hillary Clinton's email: Internet freedom 2
Hillary Clinton's email: Internet freedom 2Hillary Clinton's email: Internet freedom 2
Hillary Clinton's email: Internet freedom 2
 
Hillary Clinton's email: Internet freedom 3
Hillary Clinton's email: Internet freedom 3Hillary Clinton's email: Internet freedom 3
Hillary Clinton's email: Internet freedom 3
 
Hillary Clinton's email: Google sponsorship
Hillary Clinton's email: Google sponsorshipHillary Clinton's email: Google sponsorship
Hillary Clinton's email: Google sponsorship
 
FCC Net Neutrality Rules
FCC Net Neutrality RulesFCC Net Neutrality Rules
FCC Net Neutrality Rules
 
Uber targets would-be drunk drivers with latest study
Uber targets would-be drunk drivers with latest studyUber targets would-be drunk drivers with latest study
Uber targets would-be drunk drivers with latest study
 
Facebook completes WhatsApp acquisition, CEO Jan Koum agrees to $1 base salary
Facebook completes WhatsApp acquisition, CEO Jan Koum agrees to $1 base salaryFacebook completes WhatsApp acquisition, CEO Jan Koum agrees to $1 base salary
Facebook completes WhatsApp acquisition, CEO Jan Koum agrees to $1 base salary
 
Building robotics sec form d
Building robotics sec form dBuilding robotics sec form d
Building robotics sec form d
 
Apple — i pad — compare ipad models
Apple — i pad — compare ipad modelsApple — i pad — compare ipad models
Apple — i pad — compare ipad models
 
American society of media photographers, inc. et al. v. google inc.
American society of media photographers, inc. et al. v. google inc.American society of media photographers, inc. et al. v. google inc.
American society of media photographers, inc. et al. v. google inc.
 
Twitter Malware Patent
Twitter Malware PatentTwitter Malware Patent
Twitter Malware Patent
 
Lybrate, india's ZocDoc, raises 1.2m as ZocDoc itself readies launch in the r...
Lybrate, india's ZocDoc, raises 1.2m as ZocDoc itself readies launch in the r...Lybrate, india's ZocDoc, raises 1.2m as ZocDoc itself readies launch in the r...
Lybrate, india's ZocDoc, raises 1.2m as ZocDoc itself readies launch in the r...
 
Mozilla recycled pr pitch2
Mozilla recycled pr pitch2Mozilla recycled pr pitch2
Mozilla recycled pr pitch2
 
Airbnb new funding
Airbnb new fundingAirbnb new funding
Airbnb new funding
 

Dernier

13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)ssuser583c35
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxSasikiranMarri
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road ConnectivityTransforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivitynarsireddynannuri1
 
Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.pptNandinituteja1
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxunark75
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...The Lifesciences Magazine
 
14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxdigiyvbmrkt
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptUsmanKaran
 

Dernier (14)

13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf
 
Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptx
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf
 
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road ConnectivityTransforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
 
Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.ppt
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptx
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
 
14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf
 
11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptx
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.ppt
 

FBI Statement: North Korea is responsible for Sony hack

  • 1. Update on Sony Investigation Washington, D.C. December 19, 2014 FBI National Press Office(202) 324-3691 Today, the FBI would like to provide an update on the status of our investigation into the cyber attack targeting Sony Pictures Entertainment (SPE). In late November, SPE confirmed that it was the victim of a cyber attack that destroyed systems and stole large quantities of personal and commercial data. A group calling itself the “Guardians of Peace” claimed responsibility for the attack and subsequently issued threats against SPE, its employees, and theaters that distribute its movies. The FBI has determined that the intrusion into SPE’s network consisted of the deployment of destructive malware and the theft of proprietary information as well as employees’ personally identifiable information and confidential communications. The attacks also rendered thousands of SPE’s computers inoperable, forced SPE to take its entire computer network offline, and significantly disrupted the company’s business operations. After discovering the intrusion into its network, SPE requested the FBI’s assistance. Since then, the FBI has been working closely with the company throughout the investigation. Sony has been a great partner in the investigation, and continues to work closely with the FBI. Sony reported this incident within hours, which is what the FBI hopes all companies will do when facing a cyber attack. Sony’s quick reporting facilitated the investigators’ ability to do their jobs, and ultimately to identify the source of these attacks. As a result of our investigation, and in close collaboration with other U.S. government departments and agencies, the FBI now has enough information to conclude that the North Korean government is responsible for these actions. While the need to protect sensitive sources and methods precludes us from sharing all of this information, our conclusion is based, in part, on the following: ▪ Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed. For example, there were similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks. ▪ The FBI also observed significant overlap between the infrastructure used in this attack and other malicious cyber activity the U.S. government has previously
  • 2. linked directly to North Korea. For example, the FBI discovered that several Internet protocol (IP) addresses associated with known North Korean infrastructure communicated with IP addresses that were hardcoded into the data deletion malware used in this attack. ▪ Separately, the tools used in the SPE attack have similarities to a cyber attack in March of last year against South Korean banks and media outlets, which was carried out by North Korea. We are deeply concerned about the destructive nature of this attack on a private sector entity and the ordinary citizens who worked there. Further, North Korea’s attack on SPE reaffirms that cyber threats pose one of the gravest national security dangers to the United States. Though the FBI has seen a wide variety and increasing number of cyber intrusions, the destructive nature of this attack, coupled with its coercive nature, sets it apart. North Korea’s actions were intended to inflict significant harm on a U.S. business and suppress the right of American citizens to express themselves. Such acts of intimidation fall outside the bounds of acceptable state behavior. The FBI takes seriously any attempt—whether through cyber-enabled means, threats of violence, or otherwise—to undermine the economic and social prosperity of our citizens. The FBI stands ready to assist any U.S. company that is the victim of a destructive cyber attack or breach of confidential business information. Further, the FBI will continue to work closely with multiple departments and agencies as well as with domestic, foreign, and private sector partners who have played a critical role in our ability to trace this and other cyber threats to their source. Working together, the FBI will identify, pursue, and impose costs and consequences on individuals, groups, or nation states who use cyber means to threaten the United States or U.S. interests.