Holiday decorations at Sony Pictures Studios in Culver City

Holiday decorations at Sony Pictures Studios in Culver City

WITH “The Interview” — Who actually hacked Sony becomes Internet’s new mystery

  • By TAMI ABDOLLAH The Associated Press
  • Thursday, December 25, 2014 12:01am
  • News

By TAMI ABDOLLAH

The Associated Press

EDITOR’S NOTE — To follow this story and other national-international news, go to the “Nation/World” button at the top of this page

Then go to “AP News” and click. There are also still photos and video at the AP News site. The Associated Press, a nonprofit cooperative owned by U.S. newspapers, is the largest newsgathering agency in the world.

—————-

LOS ANGELES (AP) — Everyone has a theory about who really hacked Sony Pictures Entertainment Inc.

Despite President Barack Obama’s conclusion that North Korea was the culprit, the Internet’s newest game of whodunit continues.

Top theories include disgruntled Sony insiders, hired hackers, other foreign governments or Internet hooligans.

Even some experts are undecided, with questions about why the communist state would steal and leak gigabytes of data, email threats to some Sony employees and their families and then threaten moviegoers who planned to watch “The Interview” on Christmas.

“Somebody’s done it. And right now this knowledge is known to God and whoever did it,” said Martin Libicki, a cyber security expert at RAND in Arlington, Virginia, who thinks it probably was North Korea.

“So we gather up a lot of evidence, and the evidence that the FBI has shown so far doesn’t allow one to distinguish between somebody who is North Korea and somebody who wants to look like North Korea.”

Perhaps the only point of agreement among those guessing is that even the most dramatic cybercrimes can be really, really hard to solve convincingly.

When corporations are breached, investigators seldom focus on attributing the crime because their priority is assessing damage and preventing it from happening again.

“Attribution is a very hard game to play,” said Mike Fey, president of security company Blue Coat Systems Inc. and former chief technology officer at McAfee Inc.

“Like any criminal activity, how they get away with it is a very early step in the planning process, and framing another organization or individual is a great way to get away with something.

Fey added: “If they’re smart enough and capable enough to commit a high profile attack, they’re very often smart enough and capable enough to masquerade as someone else. It can be very difficult to find that true smoking gun.”

In a report earlier this month, Fey’s company described a malicious software tool called Inception, in which attackers suggested a link to China, used home routers in South Korea, included comments in Hindi, with text in Arabic, the words “God_Save_The_Queen” in another string, and used other techniques to show links to the United States, Ukraine or Russia.

Unlike crimes in the physical world, forensic investigators in the cyber world can’t dust for fingerprints or corroborate evidence by interviewing suspects. In prior closed-book cases, cyber criminals caught bragging online were only charged after evidence was found on their hard drives.

“The NSA (National Security Agency) has penetrated a lot of computers, but until Ed Snowden came around, nobody was certain because the NSA has the world’s best operational security. They know how to cover their tracks and fingerprints very well,” Libicki said.

After Sony was hacked, investigators analyzed network logs, the hacking tool and the remains of their crippled network.

The investigation began after the attackers announced themselves and wiped the systems by crippling Sony’s hard drives. Security professionals discovered that the hackers had been conducting surveillance on it since the spring. And if not for the theatrics of the Guardians of Peace, as the hackers call themselves, the breach could have easily continued for months without knowledge of the compromise.

Because North Korea is so isolated and its Internet infrastructure is not directly connected to the outside world, it’s more difficult to trace attacks originating there. North Korea has vehemently denied that it was responsible for the attack.

To complicate matters, roughly 10 percent of home computers are compromised by hackers, allowing their use to conduct attacks on others, said Clifford Neuman, a director of the University of Southern California Center for Computer Systems Security.

These compromised machines become networks of computers controlled remotely by hackers and borrowed or rented in an underground economy.

Botnets “could be used by cyber terrorists or nation states to steal sensitive data, raise funds, limit attribution of cyber attacks or

disrupt access to critical national infrastructure,” Gordon Snow, then-assistant director of the FBI’s cyber division, told a Senate panel in 2011.

The FBI worked with other U.S. agencies, including the National Security Agency, on the Sony investigation to trace the attacks.

The FBI said clues included similarities to other tools developed by North Korea in specific lines of computer code, encryption algorithms and data deletion methods. It also discovered that computer Internet addresses known to be operated by North Korea were communicating directly with other computers used to deploy and control the hacking tools and collect the stolen Sony files.

The FBI said some of its evidence against North Korea was so sensitive it couldn’t be revealed. Neuman said that could include reviewing evidence of communications or even recorded conversations between suspected hackers before or during the breach and subsequent leaks of Sony’s confidential business information.

“Attribution to any high degree of certainty will always be impossible,” said Chris Finan, a former White House cyber security adviser. “At some point these are always judgment calls. You can do things like corroborate using intelligence sources and methods. But ultimately you’re still looking at a pool of evidence and you’re drawing a conclusion.”

Even knowing North Korea was involved doesn’t mean others weren’t, too.

It’s very difficult to understand the chain of command in something like this,” Fey said. “Is this a hacking-for-hire scenario? Is it truly delivered by an organization? Or, is it possible there’s some alternate nefarious plot under way none of us understand yet.”

He later added: “One last idea. What if all this is just a movie-goer (who) can’t stand the idea of another Seth Rogen movie?”

More in News

Body found in Bogachiel River likely missing fisherman

A body recovered from the Bogachiel River this weekend is… Continue reading

Sequim’s 2026 budget is about 11 percent less than this year with fewer capital projects and a new cap on municipal funding. Staffing will increase by 1.1 full-time-equivalent employees following retirements, position changes and new hires. (Matthew Nash/Olympic Peninsula News Group)
Sequim approves $51.6M budget

Utility increases to continue for five years

Santa Claus, the Grinch and career and volunteers with Clallam County Fire District 3, IAFF Local 2933 and the Community Emergency Response Team (CERT) will accept food and toy donations this week as part of Santa’s Toy and Food Fire Brigade in Sequim. The food and toy drive will end on Friday at Sequim Walmart with donations accepted from 9 a.m. to 9 p.m., and Santa arriving to hand out candy canes and take photos from 5 p.m. to 8 p.m. (Matthew Nash/Olympic Peninsula News Group)
Toys, food to highlight Sequim Santa Brigade

Program will culminate Friday with booth at Walmart location

Sequim Museum volunteers Bob Stipe, Scott Stipe and executive director Judy Reandeau Stipe stand with Dan Bujok, VFW district commander, and Ken Bearly, Carlsborg 4760 post commander, at the museum’s Veterans Monument. It’s recently been refurbished and organizers welcome past and present veterans and their family members to apply for a tile to be placed on the east side of the wall. (Matthew Nash/Olympic Peninsula News Group)
Museum seeks veterans to add tiles to monument wall

Rededication ceremony tentatively set for early 2026

Weekly flight operations scheduled

There will be field carrier landing practice operations for aircraft… Continue reading

Denny Bellow, left, waves as he departs the Sequim Food Bank to collect food as part of the 15th annual Cranksgiving event on Nov. 22. Cranksgiving drew a record 84 cyclists and resulted in donations to the Sequim Food Bank of more than $6,400 and more than 2,000 pounds of food, Executive Director Andra Smith said. The event was open to riders of all ages and involves swag and prizes donated by local merchants and national bicycle brands. Over the years, it has brought in more than 10 tons of food and more than $27,000 in donations, with participants purchasing food from along Washington Street. (Monica Berkseth/For Olympic Peninsula News Group)
A record-setting Cranksgiving

Annual event benefiting Sequim Food Bank sees highest number of riders

Aaliyah Clark of Poulsbo (378) and Monica Castleberry of Lacey (21) lead a young runner at the start of the Jamestown S'Klallam Glow Run in Blyn late Saturday afternoon. The race had a record-breaking 900 participants this year. (Michael Dashiell/Jamestown S'Klallam Tribe)
RUN THE PENINSULA: Record-setting crowd at Jamestown Glow Run

A record-setting huge crowd of nearly 900 people ran in… Continue reading

U.S. Rep. Emily Randall.
US Rep. Randall speaks on House floor about insurance

Example of fictional family shows premium increase of more than 1,000 percent

Spending patterns led to pool audit

Office identifies $33K in unsupported payments

Comments oppose plan against Port Townsend zoning changes

Option would increase maximum limit on units per 40,000 square feet

x
Sequim program uses grant for utilities, rent

Community support through Peninsula Home Fund gives $10,000 to organization

Firefighters Tyler Gage and Tatiana Hyldahl check out the light connections on the 1956 fire truck that will travel the streets of Port Angeles during the 41st Operation Candy Cane beginning Monday. Santa and his helpers will pass out candy canes to those who donate food items or cash. The runs will begin at 5:30 p.m. and include the following areas: Monday, west of I street and M street; Tuesday, I and L streets to C street; Wednesday, C Street to Lincoln Street; Thursday, Chase Street to Chambers Street; Friday, Jones Street to Golf Course Road; Dec. 13, above Lauridsen Boulevard. It will be stationary from 5:30 p.m. to 7 p.m. on Dec. 14 at the Port Angeles Grocery Outlet and during the same time on Dec. 15 at Lower Elwha Food and Fuel. (Dave Logan/for Peninsula Daily News)
Operation Candy Cane

Firefighters Tyler Gage and Tatiana Hyldahl check out the light connections on… Continue reading