Ramblings of an old Doc

 

I’ve been watching this story evolve over the past week, and decided to warn our gamer friends about this as a Community service. I don’t know if many or, for that matter any of you folks have been impacted by this, but safe is better than sorry, and “Thou shalt not stand idly by.” seem to apply here.

Sony confirmed this penetration on Tuesday.

If you are part of Playstation Network and/or Qriocity, you should be receiving an email from Sony confirming the penetration.

"The email will tell subscribers that Sony has turned off the PlayStation Network and Qriocity cloud-music service, engaged an outside security firm and "taken steps to enhance security and strengthen our network infrastructure by re-building our system to provide you with greater protection of your personal information", per Mark Hachman at PC Magazine.

"Although we are still investigating the details of this incident, we believe that an unauthorized person has obtained the following information that you provided: name, address (city, state, zip), country, email address, birthdate, PlayStation Network/Qriocity password and login, and handle/PSN online ID. It is also possible that your profile data, including purchase history and billing address (city, state, zip), and your PlayStation Network/Qriocity password security answers may have been obtained," the email states. "If you have authorized a sub-account for your dependent, the same data with respect to your dependent may have been obtained.

While there is no evidence at this time that credit card data was taken, we cannot rule out the possibility. If you have provided your credit card data through PlayStation Network or Qriocity, out of an abundance of caution we are advising you that your credit card number (excluding security code) and expiration date may have been obtained." – Sony Spokesman

This is important:

1. Disregard any email purporting to be from Sony or any agent of Sony asking for personal or financial details.

2. You might want to set up a new identity in your email account and inform your friends of it, and shut down the old account.

3. You might want to change your Credit/Debit Card number and a simple explanation to the Credit/Debit Card Company as to why should suffice and they should be glad to help you do this. They are as interested as you in preventing fraud and abuse.

I hope you aren’t victimized by all this, but there are positive steps you can take to prevent tremendous damage to your finances and Identity.

Hope this helps!


Comments (Page 2)
4 Pages1 2 3 4 
on Apr 29, 2011

StevenAus
There might be a tendency to be lazy, but not everyone *is* lazy.

Best regards,
Steven.

And of course the irony is that the lazy spend more time fixing things due to their laziness!

on Apr 29, 2011

This is very true. Hindsight you know.

on Apr 29, 2011

Seriously glad no one in my family ever owned a PlayStation!

on Apr 29, 2011

I know a few who do. Woe are they.

on May 01, 2011

Update:

"Sony apologizes, says 10 million credit card accounts may have been exposed in network attack"

http://latimesblogs.latimes.com/technology/2011/05/sony-apologizes-says-10-million-credit-card-accounts-may-have-been-exposed-in-network-attack.html

 

Isn't that something? If I ever had an account there I'd be busy changing my credit card number (as suggested in the OP).

on May 01, 2011

DrJBHL
Update:
Isn't that something? If I ever had an account there I'd be busy changing my credit card number (as suggested in the OP).


The people this has affected in my household are doing just that.

I love this part: "Hirai said Sony would give affected customers 30 days of free access to its Qriocity music-streaming service as well as 30 days of access to its PlayStation Plus online game service."

Yeah...we're not going to take advantage of that part of the "I'm sorry" deal, since we have AT&T internet and as of today, we have an internet cap.

"In addition, Sony said it will provide credit card protection services for the 10 million customers whose data were compromised."

Well, that's a little bit of a relief.

 
on May 01, 2011

"In addition, Sony said it will provide credit card protection services for the 10 million customers whose data were compromised."

The other somewhat scary angle... how exactly will someone know if they are in fact receiving notification from Sony that they were part of the 10 million for the credit card protection services?  I'd think that I would have to provide my SSN to get said services...

on May 01, 2011

If I were you, I'd change the number and get protection on the new one. 

Also, Karen... get a new email and notify your friends. I'd also make sure to clean out that email account completely - including all sent email and contacts list before closing it down. 

 

OMG_pacov
Quoting k10w3, reply 21"In addition, Sony said it will provide credit card protection services for the 10 million customers whose data were compromised."

The other somewhat scary angle... how exactly will someone know if they are in fact receiving notification from Sony that they were part of the 10 million for the credit card protection services?  I'd think that I would have to provide my SSN to get said services...

If I were you I'd change my credit card and get rid of the old email for a new one and notify my friends of the change - see above for more advice re email.

 

on May 01, 2011

DrJBHL
If I were you I'd change my credit card and get rid of the old email for a new one and notify my friends of the change - see above for more advice re email.

ah - good point - must have overlooked that.  Thx.

on May 02, 2011

DrJBHL
Isn't that something? If I ever had an account there I'd be busy changing my credit card number (as suggested in the OP).

In a NY Minute!  Glad I do not have to (Already had to change one card twice in the past year).

on May 02, 2011

Hacked a 2nd time ...

http://e.nikkei.com/e/fr/tnks/Nni20110503D02NY878.htm

Looks like Sony is going to say 'sorry' again.

on May 03, 2011

Just came back to do the same update... thanks, taz! Good on ya!

Turns out the credit card info was "Crypto Hashed" in other words, unreadable w/o a key, but how secure is that?

http://www.pcmag.com/article2/0,2817,2384786,00.asp

 

on May 03, 2011

tazgecko
Hacked a 2nd time ...

The second time was actually the first time. First April 16, 17 - second time 17, 19. First time 74 point something million compromised. Second time 20 something compromised. I don't remember numbers. Read it in yesterday's yahoo news. I do know however that the total is over 100,000,000. 

on May 03, 2011

DrJBHL
Turns out the credit card info was "Crypto Hashed" in other words, unreadable w/o a key, but how secure is that?

Very, as long as it is not feasible to build a database of hash values to look up the original value (called a rainbow table)*. Not at all if such a database can be built and searched in a reasonable amount of time. This because hash functions are created to only be done in one direction, and finding the orignal values is far harder than it is to create the result. Kind of like taking the derivative of a mathmatical function and storing the result. Now the attacker has to find the 'antiderivative', which is much harder to do. In any case, when done right it is safer than normal encryption as it does not have to be possible to convert it back.

As a note, hashing is how passwords are stored.

* Assuming they were using one that does not exibit flaws that undermine it security bay allowing it to overcome with less exaustive methods than trying ever possiblity.

on May 03, 2011

Gwenio1

Quoting DrJBHL, reply 27Turns out the credit card info was "Crypto Hashed" in other words, unreadable w/o a key, but how secure is that?

Very, as long as it is not feasible to build a database of hash values to look up the original value (called a rainbow table)*. Not at all if such a database can be built and searched in a reasonable amount of time. This because hash functions are created to only be done in one direction, and finding the orignal values is far harder than it is to create the result. Kind of like taking the derivative of a mathmatical function and storing the result. Now the attacker has to find the 'antiderivative', which is much harder to do. In any case, when done right it is safer than normal encryption as it does not have to be possible to convert it back.

As a note, hashing is how passwords are stored.

* Assuming they were using one that does not exibit flaws that undermine it security bay allowing it to overcome with less exaustive methods than trying ever possiblity.

beat me to it!  Very good explanation.  And the 64 dollar question then is - which one?  let's hope they follow their auditors recommendations.

4 Pages1 2 3 4