Sony Interactive Entertainment (SIE), has contacted with a total of 6,800 employees —some, even, are no longer part of the company—, to warn them that Your personal data could have been collected by hackers after an attack on one of its servers that occurred last May.
In a memo sent by Sony to its employees and seen by Bleeping Computerthe company details that the attack occurred through a vulnerability in a file sending platform called MOVEit Transfer, owned by Progress Software. The development company notified its customers – including Sony – about the security problem on May 31.
It took Sony until June 2 to verify that on May 28—days before Progress Software alerted about the vulnerability—a group of cybercriminals They downloaded personal data of employees through one of the servers. That same day, the CL0P ransomware group claimed responsibility for the attack.
On May 28, 2023, before Progress Software announced the vulnerability and we became aware of it, an unauthorized actor used the vulnerability to download some SIE files stored on our MOVEit platform. On June 2, 2023, SIE discovered the unauthorized downloads, immediately took the platform offline, and fixed the vulnerability. An investigation was subsequently launched with the help of external cybersecurity experts. We also notify security forces.
Sony, in a letter sent to its employees.
It is not the only attack on Sony
The attack on Sony Interactive Entertainment’s servers due to the vulnerability in the file transfer software is not the only one that the company has suffered in recent months. The signature lived just weeks ago a hack on servers installed in Japan which are used for internal testing for your entertainment business. In total, the attackers managed to collect 3.14 GB of data. Sony emphasizes that this has not interrupted its operations.
At the moment, there are two hackers or groups of hackers who have claimed responsibility for the attack on Sony. One of them is Ransomed.vc. Also another named MajorNelson, who claims that he is the true author and has published a sample of files as proof. In most cases, attackers usually ask for a ransom—in this case, from Sony itself. That is, money in exchange for returning the files with the stolen personal information. They also use the data to sell it to third parties in forums frequented by hackers or even to carry out phishing campaigns, among others.