Is there a database of these big corporate hacks anywhere?<p>Furthermore, is there any categorization of the method that was used? I am curious of the ratio: X% mix-configured cloud permissions, Y% bad defaults, Z% unpatched 9-year old vulnerability, N% most minimal social hacking, etc<p>Probably too much egg on everyone's face to get public post-mortems, but I would enjoy knowing more.
Is this Sony Interactive Entertainment LLC or Sony Pictures Entertainment or Sony Music Entertainment or Sony Electronics Inc. or SOA or Sony Group Corporation KK ?? What an all of sony possibly mean?
> “We have successfully [compromised] all of [Sony’s] systems,” Ransomed.vc proclaimed. “We won’t ransom them! We will sell the data. Due to Sony not wanting to pay. DATA IS FOR SALE. WE ARE SELLING IT.”<p>The key detail. If Sonys not willing to pay these 6000 files are not important.
> Within those 6,000 files are supposedly a bevy of documentation, including unknown “build log files,” a swath of Java resources, and HTML data.<p>It sounds like they compromised a backwater CI/CD system or something.
I usually feel bad about the victims of ransomware, but in this case I feel a little less bad, since in the past Sony has betrayed trust by attempting to install their own rootkits on unsuspecting user's hardware. When they got called out, they made a removal tool that collected more data from the users who used it.<p><a href="https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal" rel="nofollow noreferrer">https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootk...</a>
Sony is one of the coolest companies. Hack them, challenge them, force them to become better, harder, faster, stronger. Fuel their evolution. If there is one brand in the world that can become human again, it's Sony.