Reports emerged over the weekend that Sony is considering putting what is essentially a bounty on the heads of the hacker or hackers responsible for the “external intrusion” last month that led to the still-ongoing downtime for PlayStation Network, Qriocity and Sony Online Entertainment and the theft of personal data theft from more than 100 million users. The considered reward comes after a pair of hackers from the group Anonymous, which targeted Sony after it filed a lawsuit against noted PlayStation 3 jailbreak George “GeoHot” Hotz, told the Financial Times that “the hacker that did this was supporting [Anonymous’ anti-Sony] movements.” Now the group has fired back with a lengthy official statement once again denying its role in the hacking and attacking the media for pointing fingers.
The press release, entitled “Sony, I Am Disappoint,” is a hefty read. The focus of Anonymous’ attack is Joseph Menn, the author of the Financial Times article. It is difficult to summarize without reading each point in sequence, so here is the full press release, reprinted for your perusal (via CVG):
Yesterday, an article appeared in Financial Times, alleging Anonymous’ involvement in the data and identity theft of some hundred million users of Sony’s Playstation Network and Sony Online Entertainment. This crime is now being investigated by the Homeland Security Agency (HSA), the Department of Justice (DOJ), and other legal entities.
Once again Anonymous has been blamed for a security breach, this time by the journalist Joseph Menn, in his article “Hackers point finger over Sony incursion” . Here, Anonymous wishes to lay out our case against these allegations and false assumptions:
First, let us consider a different article by Menn published on the Financial Times website and entitled “Hackers Warned of Arrest” . This poor piece of journalism has already been extensively referenced in the Sony matter and is being used by many people who oppose Anonymous as proof of guilt. The only quoted source used by Menn was the now infamous Aaron Barr, former CEO of the humiliated HBGary. Barr made the claim that a chat room called #anonymous, founded by the identity “Q”, was irrefutable proof that this “Q” began the movement known as Anonymous. Confident in his assertion, he attempted to sell this and other pieces of so-called “intelligence” about the nature of Anonymous to the U.S. FBI.
His information, however, was incorrect. It would be considered common knowledge that Anonymous began as a “meme”, or shared belief, at the turn of the century and later developed to become a “global collective conscience” in 2006. But it was not until 2008 that Anonymous became a true display of “power in numbers”. Organised protests against the “Church” of Scientology were staged in over 140 cities around the world, forever associating the Guy Fawkes mask and the right to protest with the movement.
Second, just like Anonymous, John Doe and Joe Bloggs are placeholders, rather than proper names, and are available for free use without repercussions. However because of this, there is no membership to Anonymous and anyone can claim to be a “member”. It could be said that “Anonymous is anonymous to Anonymous”.
Barr and Menn did not pause to protect the integrity of their professions, but instead made clearly misinformed assumptions, and accordingly published a factually incorrect article. The article was highly scrutinized as being blatantly biased against Anonymous and its participants, and many readers pointed out obvious inconsistencies in the technicalities, and the physical time line.
Third, in the primary article, Menn claims that a “member” of Anonymous, Kayla, made comments as an apparent admission of guilt from the “leaders”. Kayla reportedly said, “If you say you are Anonymous, and do something as Anonymous, then Anonymous did it”. This statement is inherently weak; an equivalent statement would be that “I confess to being human. Humans performed the attack”. Andy Greenburg at Forbes  got it right.
Finally, Menn’s reference to “technical details”  regarding a vulnerability in Sony’s network without revealing actual content isn’t useful. Until the forensics reports are released we don’t know which exploit was used. The forensic investigators need to conclude their work, and speculation in articles, blogs and comments brings the factual results no closer.
Menn’s anonymous source claims that “a few ops disappeared” but so has a solid chunk of software infrastructure including NickServ and channel bots over attacks during the PSN outages. Menn’s other quotes are a vague mixture of assertions and denials. During the PSN downtime, Anonymous closed #opsony and put “sony” on the automatic kick list as ‘profanity’ last week.
Is all of this attention on Anonymous acting as a distraction from other problems, and overhyping the nature of the DDoS attacks? Sony’s recurring issues are beyond providing free game credits:
In order to process credit cards, every company needs to be PCI compliant. “If you are a merchant that accepts payment cards, you are required to be compliant with the PCI Data Security Standard” . Since Sony’s network was “unpatched and had no firewall installed” , that is a clear violation of the PCI standards and ongoing reviews , thus likely to be criminal negligence [see Further Reading]. More importantly, “I can’t think of a major data breach where the company was PCI compliant,” said Ira Rothken, the lead attorney handling the class action lawsuit .
Sony has been accused of false billing, especially in the repairs department: customers who provided credit card details for an MMORPG are charged $150 for repairs to PS3s that they don’t own; repairs are double billed and then referred to retailers; equipment is charged $150 multiple times (2-4) for repairs that aren’t performed. [7 and Further Reading]
A decent credit card transaction gateway includes recurring billing as an option. Data mining by corporations has a profit motive, but as Sony has demonstrated it can be a massive liability. Why not start a discussion about corporate responsibility to protect user information, especially since they didn’t need it to begin with?
Sony’s response to the U.S. Senate  is to request more laws and further the myth of “best practices.” Since Sony was warned of security holes months in advance , one of those “best practices” would be to accept the advice of the experts. In Sony’s passing the blame there is no justification for the collection and retention of personal information they didn’t need.
Outraged about the blatant coverup and shameful misdeeds, other internet hacker groups will apparently proceed with attacks  over Sony’s mishandling of the matter. These reactions prove that requesting legislation to cover up corporate crimes and the abuse of law is frowned upon by all online communities, not just the Legion of Anonymous. Apparently Sony will have to learn the hard way that corporate malfeasance will not go unpunished. When the dust settles Sony may have more to fear from a massive class action lawsuit by their user base than the brief actions of the Global Hacker Nerd Brigade, Anonymous… Let THE GAMEs begin. :>
Knowledge is free.
We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
- The PlayStation Network is back up. Here’s the latest on the PSN outage
- Sony will censor offensive PlayStation Network IDs with temporary usernames
- Sony reverses wrongful ban of PlayStation 4 player due to ‘offensive’ PSN ID
- Here's how Anonymous hacking group members act out a political flame war
- UK law enforcement makes arrest for Christmas PlayStation and Xbox DDoS attacks