Well, That Was Fast: Sony's New PSN System? Hacked!

from the hiccup dept

So, it took a few weeks for Sony to get everything in order after its er… hiccup in exposing the details of everyone on the PlayStation Network. And, now it appears that the Japanese government’s worries that Sony hadn’t really fixed the problem or made its system secure appear to be coming true. There are reports this morning that the new password reset system has been exploited, such that you could change anyone’s password if you have their email and date of birth. You know where you could have gotten that info? From the original hacked data. Right. Hic

Filed Under: ,
Companies: sony

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Well, That Was Fast: Sony's New PSN System? Hacked!”

Subscribe: RSS Leave a comment
47 Comments
Anonymous Coward says:

Re: Company-wide pattern?

to their credit the PS3 went uncracked the longest out of any game system, so the DRM wasn’t really flawed and they did fix what geohot did pretty fast and remove you from psn if you were using the modified firmware.

However their network security seems be a one step beyond saying “Just set the password to “secret” who is gonna fuck with us?”

Almost Anonymous (profile) says:

Re: Re: Company-wide pattern?

“””to their credit the PS3 went uncracked the longest out of any game system, so the DRM wasn’t really flawed and they did fix what geohot did pretty fast”””

1. Not to Sony’s credit because no one who knew what they were doing was really trying.
2. Yes, the PS3 went “uncracked the longest”, see #1.
3. The DRM was very very very flawed. Sorry, I’m not going to give a link, but the hackers’ who worked on the real crack (after Geohot) have put out a lengthy explanation.
4. They did not “fix” what Geohot did at all.

testcore (profile) says:

Re: Re: Sony IT guy

You’d be surprised at how true this really is. I used to be a game tester for them back in the PS2 days testing games for platform compliance. We were theoretically supposed to be finding bugs before a game went gold. Reality tho was that we would have to write up any and all game issues which could create a liability for Sony. 80+ Game Testers writing up “bugs” about trademarks appearing in other publishers’ titles. We worked for the Legal Dept.

pclanguy says:

Re: Re: Sony IT guy

TJX territory? They passed TJX territory at the first hiccup.

Sony needs to redesign their console with a ring of status lights and a LCD display. This way they can red ring of death their consoles while scrolling your personal and credit card information in the LCD.

That’s considered notification that your personal information has been leaked isn’t it? As an added bonus, you won’t have to wait 7 days to find out.

SD says:

Three possible explanations

1. They had the reset password auth key generator key from the previous intrusion, or got in again and stole it
The most likely scenario.

2. They found the auth keys in the confirmation page that shows after submitting an email address & DOB
Very poor design I’ve seen on some sites before but you’d have to be incompetent or negligent to code something like this.

3. They guessed it or social engineered it
Unlikely…

Josh in CharlotteNC (profile) says:

Re: Three possible explanations

Read the article.

When logging back into the PSN, Sony is forcing everyone to reset their passwords.

To verify a user, since the old passwords were stolen, they needed to use some other piece of information to confirm users.

So instead they decided to use the email and DOB. The same information that was stolen along with the passwords.

This kind of oversight is epic Picard level facepalm.

SD says:

Re: Re: Three possible explanations

I read the article and my list of possible explanations are correct.

Resetting passwords by email address alone(no DOB) is a standard way of starting a two-phase authorization.

If you read the forum thread that Kotaku linked to, you can see that someone received an initial email that said something along the lines of “Click this link to reset your password”.

Normally that’s where a fraudulent password reset request would end unless someone had access to a user’s email account, however seconds later they received another email saying the request was completed.

Sony just stated on their blog that this was a “URL exploit”, so now I present two other explanations which I forgot to list.

4. Sony set their script to automatically bypass the second phase so people wouldn’t have to check their email account.
Heads should roll if this is true, but I doubt it. Why even make a two-phase auth system if they’re going to bypass it themselves?

5. Sony let blank auth keys reset passwords (the official explanation?)
Maybe the programmer accidentally put something like a = instead of == for matching… But the structure of the links make me call bull on this.

The Buzz Saw (profile) says:

Sony should work on its fanbase...

Last I checked, having a supportive group of fans is far more effective than any amount of engineering. If the fans are on your side, you can tap into the community and summon its collective power to solve problems. Instead, Sony has built a fortress to defend itself from fans. It stays behind its walls and simply attaches bait (in the form of entertainment) to hooks and fishes for fans from the safety of its castle. Heaven forbid the fishermen have any meaningful interaction with their catch! The fish (or their money) are all that matter!

A.R.M. (profile) says:

It could be worse!

You could receive a service pack on your game console which has a chance to brick your box and it’s mandatory to enable additional copyright protection which makes reading retail disks impossible.

Though, you’ll be blessed with a free console, at least two weeks of no games, and one year of XBox Live free of charge for the “trouble” of preventing your legally purchased products from working.

Thank goodness I own a Wii! Since developers shunned this piece of crap, I’ve nothing to worry about.
😐

A.R.M. (profile) says:

It could be worse!

You could receive a service pack on your game console which has a chance to brick your box and it’s mandatory to enable additional copyright protection which makes reading retail disks impossible.

Though, you’ll be blessed with a free console, at least two weeks of no games, and one year of XBox Live free of charge for the “trouble” of preventing your legally purchased products from working.

Thank goodness I own a Wii! Since developers shunned this piece of crap, I’ve nothing to worry about.
😐

Chris in Utah (profile) says:

I think I mentioned this yesterday. Somebody needs to start a PR team in Anonymous to start getting kickstarter pools together for future projects.

Spitball caption on ad:
Brought to you by the same folks that braught you Climate-Gate. The same folks that filled the need in “Waste 60 bucks on a game I cant demo? FTS” & Sony hacks brings you….

The thing of it is the entertainment value is huge. Think about Hacker(the movie) like competitions on destroying senators that go against he public interest. I distinctly remember if the government fears the people….

Richard (profile) says:

Why they got hacked

Sony remove Other OS

Who uses Other OS? – people who make supercomputers from lots of PS3’s – what do they use them for?

security research

“On 30 December 2008, a group of researchers announced at the 25th Chaos Communication Congress how they had used MD5 collisions to create an intermediate certificate authority certificate which appeared to be legitimate when checked via its MD5 hash.[7] The researchers used a cluster of Sony Playstation 3s at the EPFL in Lausanne, Switzerland”

Irony of ironies – were Sony hacked by their own hardware?

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...