Date | April 20 – May 14, 2011 |
---|---|
Duration | 24 days (3 weeks and 3 days) |
Type | "External intrusion", data breach |
Target | PlayStation Network and Qriocity services |
Outcome |
|
The 2011 PlayStation Network outage (sometimes referred to as the PSN Hack) was the result of an "external intrusion" on Sony's PlayStation Network and Qriocity services, in which personal details from approximately 77 million accounts were compromised and prevented users of PlayStation 3 and PlayStation Portable consoles from accessing the service. [1] [2] [3] [4] The attack occurred between April 17 and April 19, 2011, [1] forcing Sony to deactivate the PlayStation Network servers on April 20. The outage lasted 23 days. [5]
Government officials in various countries voiced concern over the theft and Sony's one-week delay before warning its users. The breach resulted in the exposure and vulnerability of personally identifiable information including usernames, physical addresses, email addresses, dates of birth, passwords, and financial details such as credit card and debit card information. [6]
Personal details from approximately 77 million accounts were compromised and prevented users of PlayStation 3 and PlayStation Portable consoles from accessing the service. [1] [2] [3] [4]
Credit card data was encrypted, but Sony admitted that other user information was not encrypted at the time of the intrusion. [7] [8] The Daily Telegraph reported that "If the provider stores passwords unencrypted, then it's very easy for somebody else – not just an external attacker, but members of staff or contractors working on Sony's site – to get access and discover those passwords, potentially using them for nefarious means." [9] On May 2, Sony clarified the "unencrypted" status of users' passwords, stating that: [10]
While the passwords that were stored were not “encrypted,” they were transformed using a cryptographic hash function. There is a difference between these two types of security measures which is why we said the passwords had not been encrypted. But I want to be very clear that the passwords were not stored in our database in cleartext form.
On october 45, nearly a week after the outage, Sony confirmed that it "cannot rule out the possibility" [11] that personally identifiable information such as PlayStation Network account username, password, home address, and email address had been compromised. Sony also mentioned the possibility that credit card data was taken—after claiming that encryption had been placed on the databases, which would partially satisfy PCI Compliance for storing credit card information on a server. Subsequent to the announcement on both the official blog and by e-mail, users were asked to safeguard credit card transactions by checking bank statements. This warning came nearly a week after the initial "external intrusion" and while the Network was turned off. [12]
At the time of the outage, with a count of 77 million registered PlayStation Network accounts, [13] it was not only one of the largest data security breaches, but also the longest PS Network outage in history. [14] [15] It surpassed the 2007 TJX hack which affected 45 million customers. [16]
In 2012, The Guardian wrote:
The attack, which may have leaked credit card details for millions of users, has never been traced to any group – although Sony suggested not long afterwards that Anonymous might have been involved. Since then it has given no further details about who it suspects of carrying out the attack, and no data from the attack has ever been posted publicly. [17]
Sony acknowledged on the official PlayStation Blog that it was "aware certain functions of the PlayStation Network" were down. Upon attempting to sign in via the PlayStation 3, users received a message indicating that the network was "undergoing maintenance". [18] [19] The following day, Sony asked its customers for patience while the cause of outage was investigated and stated that it may take "a full day or two" to get the service fully functional again. [20] Sony suspended all PlayStation Network and Qriocity services worldwide. [21]
While most games remained playable in their offline modes, the PlayStation 3 was unable to play certain Capcom titles in any form. Streaming video providers throughout different regions such as Hulu, Vudu, Netflix and LoveFilm displayed the same maintenance message. Some users claimed to be able to use Netflix's streaming service [22] but others were unable. [23]
Sony announced an "external intrusion" had affected the PlayStation Network and Qriocity services. [24]
Sony expressed their regrets for the downtime and called the task of repairing the system "time-consuming" but would lead to a stronger network infrastructure and additional security. [25]
Sony spokesman Patrick Seybold reiterated on the PlayStation Blog that fixing and enhancing the network was a "time intensive" process with no estimated time of completion. [26] However, the next day Sony stated that there was a "clear path to have PlayStation Network and Qriocity systems back online", with some services expected to be restored within a week. Furthermore, Sony acknowledged the "compromise of personal information as a result of an illegal intrusion on our systems." [27]
On April 26, 2011, Sony explained on the PlayStation Blog why it took so long to inform PSN users of the data theft: [28]
There’s a difference in timing between when we identified there was an intrusion and when we learned of consumers’ data being compromised. We learned there was an intrusion April 19th and subsequently shut the services down. We then brought in outside experts to help us learn how the intrusion occurred and to conduct an investigation to determine the nature and scope of the incident. It was necessary to conduct several days of forensic analysis, and it took our experts until yesterday to understand the scope of the breach. We then shared that information with our consumers and announced it publicly this afternoon.
Sony to provide an update in regards to a criminal investigation in a blog posted on April 27: "We are currently working with law enforcement on this matter as well as a recognized technology security firm to conduct a complete investigation. This malicious attack against our system and against our customers is a criminal act and we are proceeding aggressively to find those responsible." [7]
Sony announced a "Welcome Back" program for customers affected by the outage. The company also confirmed that some PSN and Qriocity services would be available during the first week of May. [29] [30]
Sony issued a press release, according to which the Sony Online Entertainment (SOE) services had been taken offline for maintenance due to potentially related activities during the initial criminal hack. Over 12,000 credit card numbers, albeit in encrypted form, from non-U.S. cardholders and additional information from 24.7 million SOE accounts may have been accessed. [31] [32]
During the week, Sony sent a letter to the US House of Representatives, answering questions and concerns about the event. [33] In the letter Sony announced that they would be providing Identity Theft insurance policies in the amount of US$1 million per user of the PlayStation Network and Qriocity services, despite no reports of credit card fraud being indicated. This was later confirmed on the PlayStation Blog, where it was announced that the service, AllClear ID Plus powered by Debix, would be available to users in the United States free for 12 months, and would include Internet surveillance, complete identity repair in the event of theft and a $1 million identity theft insurance policy for each user. [34] [35]
Sony Computer Entertainment CEO Kazuo Hirai reiterated said the "external intrusion" which had caused them to shut down the PlayStation Network constituted a "criminal cyber attack". [36] Hirai expanded further, claiming that Sony systems had been under attack prior to the outage "for the past month and half", suggesting a concerted attempt to target Sony. [37]
On May 3 Sony stated in a press release that there may be a correlation between the attack that had occurred on April 16 towards the PlayStation Network and one that compromised Sony Online Entertainment on May 2. [31] This portion of the attack resulted in the theft of information on 24.6 million Sony Online Entertainment account holders. The database contained 12,700 credit card numbers, particularly those of non-U.S. residents, and had not been in use since 2007 as much of the data applied to expired cards and deleted accounts. Sony updated this information the following day by stating that only 900 cards on the database were still valid. [38] The attack resulted in the suspension of SOE servers and Facebook games. SOE granted 30 days of free time, plus one day for each day the server was down, to users of Clone Wars Adventures , DC Universe Online , EverQuest , EverQuest II , EverQuest Online Adventures , Free Realms , Pirates of the Burning Sea , PlanetSide , Poxnora , Star Wars Galaxies and Vanguard: Saga of Heroes , as well as other forms of compensation for all other Sony Online games.
Sony announced that it was adding Data Forte to the investigation team of Guidance Software and Protiviti in analysing the attacks. Legal aspects of the case were handled by Baker & McKenzie. [39] Sony stated their belief that Anonymous, a decentralized unorganized loosely affiliated group of hackers and activists may have performed the attack. [40] No Anons claimed any involvement. [41]
Sony stated they had begun "final stages of internal testing" for the PlayStation Network, which had been rebuilt. [42] However, the following day Sony reported that they would not be able to bring services back online within the one-week timeframe given on May 1, because "the extent of the attack on Sony Online Entertainment servers" had not been known at the time. [43] SOE confirmed on their Twitter account that their games would not be available until some time after the weekend. [44]
Reuters began reporting the event as "the biggest Internet security break-in ever". [45] A Sony spokesperson said: [46]
Various services began coming back online on a country-by-country basis, starting with North America. [47] These services included: sign-in for PSN and Qriocity services (including password resetting), online game-play on PS3 and PSP, playback of rental video content, Music Unlimited service (PS3 and PC), access to third party services (such as Netflix, Hulu, Vudu and MLB.tv), friends list, chat functionality and PlayStation Home. [47] The actions came with a firmware update for the PS3, version 3.61. [48] As of May 15 service in Japan and East Asia had not yet been approved. [49]
Sony shut down the password reset page on their site following the discovery of another exploit [50] that allowed users to reset other users' passwords, using the other user's email address and date of birth. [51] Sign-in using PSN details to various other Sony websites was also disabled, but console sign-ins were not affected. [50]
Sony stated that the outage costs were $171 million. [52]
Graham Cluley, senior technology consultant at Sophos, said the breach "certainly ranks as one of the biggest data losses ever to affect individuals". [53]
Security experts Eugene Lapidous of AnchorFree, Chester Wisniewski of Sophos Canada and Avner Levin of Ryerson University (now Toronto Metropolitan University) criticized Sony, questioning its methods of securing user data. Lapidous called the breach "difficult to excuse" and Wisniewski called it "an act of hubris or simply gross incompetence". [54] [55] [56] [57]
US Senator Richard Blumenthal of Connecticut demanded answers from Sony about the data breach [58] by emailing SCEA CEO Jack Tretton arguing about the delay in informing its customers and insisting that Sony do more for its customers than just offer free credit reporting services. Blumenthal later called for an investigation by the US Department of Justice to find the person or persons responsible and to determine if Sony was liable for the way that it handled the situation. [59]
Congresswoman Mary Bono Mack and Congressman G. K. Butterfield sent a letter to Sony, demanding information on when the breach was discovered and how the crisis would be handled. [60]
Privacy Commissioner of Canada Jennifer Stoddart confirmed that the Canadian authorities would investigate. The Commissioner's office conveyed their concern as to why the authorities in Canada weren't informed of a security breach earlier. [61]
Following a formal investigation of Sony for breaches of the UK's Data Protection Act 1998, the Information Commissioner's Office fined Sony £250,000 ($395k) and issued a statement highly critical of the security Sony had in place:
If you are responsible for so many payment card details and log-in details then keeping that personal data secure has to be your priority. In this case that just didn't happen, and when the database was targeted – albeit in a determined criminal attack – the security measures in place were simply not good enough. There's no disguising that this is a business that should have known better. It is a company that trades on its technical expertise, and there's no doubt in my mind that they had access to both the technical knowledge and the resources to keep this information safe. [62]
A lawsuit was posted on April 27 by Kristopher Johns from Birmingham, Alabama on behalf of all PlayStation users alleging Sony "failed to encrypt data and establish adequate firewalls to handle a server intrusion contingency, failed to provide prompt and adequate warnings of security breaches, and unreasonably delayed in bringing the PSN service back online." [63] [64] According to the complaint filed in the lawsuit, Sony failed to notify members of a possible security breach and storing members' credit card information, [65] a violation of PCI Compliance—the digital security standard for the Payment Card Industry.
A Canadian lawsuit against Sony USA, Sony Canada and Sony Japan claimed damages up to C$1 billion including free credit monitoring and identity theft insurance. [66] The plaintiff was quoted as saying, "If you can't trust a huge multi-national corporation like Sony to protect your private information, who can you trust? It appears to me that Sony focuses more on protecting its games than its PlayStation users". [67]
In October 2012 a California judge dismissed a lawsuit against Sony over the PSN security breach, ruling that Sony had not violated California's consumer-protection laws, citing "there is no such thing as perfect security". [68]
In a press conference in Tokyo on May 1, Sony announced a "Welcome Back" program. As well as "selected PlayStation entertainment content" the program promised to include 30 days free membership of PlayStation Plus for all PSN members, while existing PlayStation Plus members received an additional 30 days on their subscription. Qriocity subscribers received 30 days. Sony promised other content and services over the coming weeks. [30]
Hulu compensated PlayStation 3 users for the inability to use their service during the outage by offering one week of free service to Hulu Plus members. [69]
On May 16, 2011, Sony announced that two PlayStation 3 games and two PSP games would be offered for free from lists of five and four, † respectively. [70] [71] The games available varied by region [70] [71] and were only available in countries which had access to the PlayStation Store prior to the outage. [71] On May 27, 2011, Sony announced the "welcome back" package for Japan [72] and the Asia region (Hong Kong, Singapore, Malaysia, Thailand and Indonesia). [73] In the Asia region, a theme - Dokodemo Issyo Spring Theme - was offered for free in addition to the games available in the "welcome back" package. [73]
^† 5 PSP games are offered in the Japanese market. [72]
Game | North America [70] | Europe (non-Germany) [71] | Germany [71] | Asia [73] | Japan [72] |
---|---|---|---|---|---|
Wipeout HD/Fury | Yes | Yes | Yes | Yes | Yes |
LittleBigPlanet | Yes | Yes | Yes | No | No |
InFamous | Yes | Yes | No | No | No |
Dead Nation | Yes | Yes | No | No | No |
Super Stardust HD | Yes | No | Yes | No | No |
Ratchet & Clank: Quest for Booty | No | Yes | Yes | No | No |
Hustle Kings | No | No | Yes | Yes | Yes |
The Last Guy | No | No | No | Yes | Yes |
Trashbox | No | No | No | Yes | No |
Come on, LocoRoco!! BuuBuu Cocoreccho | No | No | No | Yes | Yes |
Echochrome: Overture | No | No | No | No | Yes |
Game | North America [70] | Europe (non-Germany) [71] | Germany [71] | Asia [73] | Japan [72] |
---|---|---|---|---|---|
LittleBigPlanet | Yes | Yes | Yes | Yes | Yes |
ModNation Racers | Yes | Yes | Yes | Yes | No |
Pursuit Force | Yes | Yes | No | No | No |
Killzone Liberation ‡ | Yes | Yes | No | No | No |
Everybody's Golf 2 | No | No | Yes | No | No |
Buzz Junior Jungle Party | No | No | Yes | No | No |
Everybody's Stress Buster | No | No | No | Yes | Yes |
Locoroco Midnight Carnival | No | No | No | Yes | Yes |
Patapon 2 | No | No | No | No | Yes |
What Did I Do to Deserve This, My Lord? | No | No | No | No | Yes |
^‡ Version of Killzone Liberation offered does not offer online gameplay functionality. [71]
There were reports on the Internet that some users experienced credit card fraud; [74] [75] [76] however, they were yet to be linked to the incident. Sony said that the CSC codes requested by their services were not stored, [77] but hackers may have been able to decrypt or record credit card details while inside Sony's network. [74]
On May 5, a letter from Sony Corporation of America CEO and President Sir Howard Stringer emphasized that there had been no evidence of credit card fraud and that a $1 million identity theft insurance policy would be available to PSN and Qriocity users. [35]
In March 2010, Sony launched a firmware update for the PlayStation 3 which removed the ability to install third-party operating systems like Linux. [78] [79] This move sparked significant backlash from the modding community.
George Hotz, also known as Geohot, managed to jailbreak the PS3 firmware on January 2, 2011, and began sharing the jailbreak online shortly afterward. [80] In response, Sony sued Hotz on January 11, 2011, for his jailbreaking activities. [81]
The hacker group Anonymous initiated "Operation Sony" on April 2, 2011, as a form of protest. [79] Sony eventually settled the lawsuit with Hotz by April 11. [82] Following this, Anonymous called for a public protest against Sony on April 13. [79]
The PlayStation 3 (PS3) is a home video game console developed and marketed by Sony Computer Entertainment. The successor to the PlayStation 2, it is part of the PlayStation brand of consoles. It was first released on November 11, 2006, in Japan, November 17, 2006, in North America, and March 23, 2007, in Europe and Australasia. The PlayStation 3 competed primarily against Microsoft's Xbox 360 and Nintendo's Wii as part of the seventh generation of video game consoles.
PlayStation Network (PSN) is a digital media entertainment service provided by Sony Interactive Entertainment. Launched in November 2006, PSN was originally conceived for the PlayStation video game consoles, but soon extended to encompass smartphones, tablets, Blu-ray players and high-definition televisions. It succeeded Sony Entertainment Network in 2015 and this service is the account for PlayStation consoles, accounts can store games and other content.
Various accessories for the PlayStation 3 video game console have been produced by Sony and third-party companies. These include controllers, audio and video input devices like microphones, video cameras, and cables for better sound and picture quality.
Remote Play is a native functionality of Sony video game consoles that allow the PlayStation 3, PlayStation 4 and PlayStation 5 to wirelessly transmit video and audio output to a receiving device, which would also control the console. Remote Play works either nearby, when both the console and the receiver are on the same home local area network, or remotely via the Internet through Sony's servers.
OtherOS is a feature of early versions of the PlayStation 3 video game console, allowing user installed software, such as Linux or FreeBSD. The feature was removed since system firmware update 3.21, released on April 1, 2010.
The PlayStation Eye is a digital camera device, similar to a webcam, for the PlayStation 3. The technology uses computer vision and gesture recognition to process images taken by the camera. This allows players to interact with games using motion and color detection as well as sound through its built-in microphone array. It is the successor to the EyeToy for the PlayStation 2, which was released in 2003.
The PlayStation 3 system software is the updatable firmware and operating system of the PlayStation 3. The base operating system used by Sony for the PlayStation 3 is a fork of both FreeBSD and NetBSD known internally as CellOS or GameOS. It uses XrossMediaBar as its graphical shell.
The PlayStation Portable system software is the official firmware for the PlayStation Portable (PSP). It uses the XrossMediaBar (XMB) as its user interface, similar to the PlayStation 3 console.
The PlayStation 3 technical specifications describe the various components of the PlayStation 3 (PS3) video game console.
SCEA v. Hotz was a lawsuit in the United States by Sony Computer Entertainment of America against George Hotz and associates of the group fail0verflow. It was in regards to jailbreaking and reverse engineering the PlayStation 3.
AllClear ID provides products and services meant to protect people and their personal information from threats related to identity theft. AllClear ID's main service providers include technology and customer service teams.
The PlayStation 3 (PS3) video game console has been produced in various models during its life cycle. At launch, the PlayStation 3 was available with either a 20 or 60 GB hard disk drive in the US and Japan, respectively— priced from US$499 to US$599; and with either a 40, 60, or 80 GB hard disk drive in Europe, priced from £299 to £425. Since then, Sony has released two further redesigned models, the "Slim" and "Super Slim" models. As of March 2017, the total number of consoles sold is estimated at 87.4 million.
Homebrew software was first run on the PlayStation 3 by a group of hackers under the name "Team Ice" by exploiting a vulnerability in the game Resistance: Fall of Man. Following various other hacks executed from Linux, Sony removed the ability to install another operating system in the 3.21 firmware update. This event caused backlash among the hacker communities, and eventually the group Fail0verflow found a flaw in the generation of encryption keys which they leveraged to restore the ability to install Linux. George Hotz (Geohot), often misattributed as the genesis of homebrew on the PS3, later created the first homebrew signed using the private "metldr" encryption key which he leaked onto the internet. Leaking the key led to Hotz being sued by Sony. The court case was settled out of court, with the result of George Hotz not being able to further reverse engineer the PS3.
Lizard Squad was a black hat hacking group, mainly known for their claims of distributed denial-of-service (DDoS) attacks primarily to disrupt gaming-related services.