|
Sony Informs Users They Have Problems Again![/
|
|
coorva
Suspended due to non-functional email address
|
11. October 2011 @ 23:35 |
Link to this message
|
Quote:
It could not happen at a worse time, Sony is just recovering from this year's world-famous 'network breach', and here we are a few months later, and RED ALERT is on!
We want to let you know that we have detected attempts on Sony Entertainment Network, PlayStation Network and Sony Online Entertainment ("Networks") services to test a massive set of sign-in IDs and passwords against our network database.
These attempts appear to include a large amount of data obtained from one or more compromised lists from other companies, sites or other sources.
In this case, given that the data tested against our network consisted of sign-in ID-password pairs, and that the overwhelming majority of the pairs resulted in failed matching attempts, it is likely the data came from another source and not from our Networks. We have taken steps to mitigate the activity.
Less than one tenth of one percent (0.1%) of our PSN, SEN and SOE audience may have been affected. There were approximately 93,000 accounts globally (PSN/SEN: approximately 60,000 accounts; SOE: approximately 33,000) where the attempts succeeded in verifying those accounts' valid sign-in IDs and passwords, and we have temporarily locked these accounts.
Only a small fraction of these 93,000 accounts showed additional activity prior to being locked. We are currently reviewing those accounts for unauthorized access, and will provide more updates as we have them. Please note, if you have a credit card associated with your account, your credit card number is not at risk.
We will work with any users whom we confirm have had unauthorized purchases made to restore amounts in the PSN/SEN or SOE wallet.
As a preventative measure, we are requiring secure password resets for those PSN/SEN accounts that had both a sign-in ID and password match through this attempt. If you are in the small group of PSN/SEN users who may have been affected, you will receive an email from us at the address associated with your account that will prompt you to reset your password.
Similarly, the SOE accounts that were matched have been temporarily turned off. If you are among the small group of affected SOE customers, you will receive an email from us at the address associated with your account that will advise you on next steps in order to validate your account credentials and have your account turned back on.
We want to take this opportunity to remind our consumers about the increasingly common threat of fraudulent activity online, as well as the importance of having a strong password and having a username/password combination that is not associated with other online services or sites.
We encourage you to choose unique, hard-to-guess passwords and always look for unusual activity in your account.
This is sad day for all users, our heart is with them, fraud of any form is not fair, and only hurts the 'little-man'!
and like i said before sony better watch how they come after hackers,it will bite them in the ass one day,or two,or three
microsoft after a ban wave
This message has been edited since posting. Last time this message was edited on 11. October 2011 @ 23:41
|
AfterDawn Addict
1 product review
|
12. October 2011 @ 03:17 |
Link to this message
|
I guess it is time to arrest more people for developing Linux drivers...
|
bigo93
Senior Member
|
12. October 2011 @ 16:15 |
Link to this message
|
When I first saw the title on ps3hax I had a big grin on my face, but as I read through the article the grin became a little shrug instead, that is if we believe what $ony are telling us, that the hackers got the usernames and passwords from some other website or service, and as we know many people use the same email and password for multiple sites and services.
So this isnt really a hacking of $ony servers, rather the hackers seeing if people used the same details on $ony accounts. So not a big a news story as we were hoping for, but since $ony is the only company to claim the hackers tested the data on, it is $ony who is going to look a little worse off considering the previous hackings.
It is most likely the hackers tested the positive hits on other sites, but I bet those companies are going to keep quite for as long as possible.
|
Advertisement
|
|
|
AfterDawn Addict
1 product review
|
15. October 2011 @ 03:08 |
Link to this message
|
Originally posted by bigo93: When I first saw the title on ps3hax I had a big grin on my face, but as I read through the article the grin became a little shrug instead, that is if we believe what $ony are telling us, that the hackers got the usernames and passwords from some other website or service, and as we know many people use the same email and password for multiple sites and services.
So this isnt really a hacking of $ony servers, rather the hackers seeing if people used the same details on $ony accounts. So not a big a news story as we were hoping for, but since $ony is the only company to claim the hackers tested the data on, it is $ony who is going to look a little worse off considering the previous hackings.
It is most likely the hackers tested the positive hits on other sites, but I bet those companies are going to keep quite for as long as possible.
I would mostly agree...with one minor exception. Sony claims that 90,000 accounts were compromised. That means that there were probably 500,000 or more attack attempts before sony did anything.
|
|