Sony, the company that distributed millions of MS Windows root kits on CD in 2005 https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal, has now been hacked through a Windows SMB exploit https://www.us-cert.gov/ncas/alerts/TA14-353A.
I don't have much sympathy with this crowd, since they cost the IT world an enormous amount of money to clean up their root kit mess and blaming their current disaster on North Korea just doesn't fly with me. I don't see how someone can download terabytes of data over the North Korean antiquated internet link.
Clearly the Sony IT staff and management were stupid in 2005 and they are still
stupid today. They haven't learned anything.
On November 4, 2005. Thomas Hesse, Sony BMG's Global Digital Business President, told reporter Neda Ulaby, "Most people, I think, don't even know what a rootkit is, so why should they care about it?"
Now suddenly, they care deeply...
If I apply Occam's Razor, then one of their clueless IT Administrators likely left SMB ports 135 to 139 open on a router and used WORKGROUP and Admin/admin as user name and password, on one or more old and unpatched Windows 2000 server(s), thus handing a gang of script kiddies access on a silver platter.
We shall see...
I don't have much sympathy with this crowd, since they cost the IT world an enormous amount of money to clean up their root kit mess and blaming their current disaster on North Korea just doesn't fly with me. I don't see how someone can download terabytes of data over the North Korean antiquated internet link.
Clearly the Sony IT staff and management were stupid in 2005 and they are still
stupid today. They haven't learned anything.
On November 4, 2005. Thomas Hesse, Sony BMG's Global Digital Business President, told reporter Neda Ulaby, "Most people, I think, don't even know what a rootkit is, so why should they care about it?"
Now suddenly, they care deeply...
If I apply Occam's Razor, then one of their clueless IT Administrators likely left SMB ports 135 to 139 open on a router and used WORKGROUP and Admin/admin as user name and password, on one or more old and unpatched Windows 2000 server(s), thus handing a gang of script kiddies access on a silver platter.
We shall see...
Comments
Post a Comment
On topic comments are welcome. Junk will be deleted.