Amazon Servers Used In Sony Playstation Hack 135
the simurgh writes "Amazon servers may have been used to carry out the massive Playstation hack that compromised the personal information of more than 100 million Playstation Network users. According to a report from Bloomberg, sources close to the ongoing investigation say the attack was mounted from Amazon Web Service's cloud computing platform."
It's a conspiracy. (Score:1)
A cloud attacks another (Score:4, Funny)
Will there be a thunderstorm?
Re: (Score:1)
Re:A cloud attacks another (Score:4, Insightful)
You mean it actually had a meaning before?
Re: (Score:2)
Re: (Score:2)
Those adverts are so fucking patronizing - I want to kill everyone involved in making them.
Re: (Score:1)
Re: (Score:2)
So Amazon brought down Sony, but their banning yaori. Are they good or evil???
Re: (Score:1)
yaoi*
Lern to spellz teh enrgish
Re: (Score:1)
Lern to spellz teh enrgish
Yaoi is a Japanese word. If u are going to be a douche, the least you could do is be right.
Nihongo superu o manabu. there fixed.
Re: (Score:2)
Re: (Score:2)
> yaori
Mmm, Maori yaoi.
So it came from an Anonymous Cloud? (Score:5, Funny)
Is it an Anonymous Cloud or Anonymous' Cloud?
So if the attack came from a cloud, then wouldn't it be a lightning attack instead of a "hacking" attack?
We really need to get this internet meteorology right.
Re: (Score:1, Informative)
I simply do not like those rules in your link. The English that I learned says that toygeek did it right. Word's ending in "s" should not get the "'s" after them, the apostrophe is sufficient.
Re: (Score:1)
Re: (Score:2)
The English that I learned says that toygeek did it right. Word's ending in "s" should not get the "'s" after them, the apostrophe is sufficient.
I do not think you learned the rule completely. Look carefully at what Strunk & White says in the linked text: "Form the possessive singular of nouns with 's." Words that end with S that are not singular still just take the apostrophe, as you say. So it would be "the witch's cauldron," but in the case of Shakespeare's MacBeth, it would be "the witches' cauldron." For singular words, though, adding the apostrophe-S is generally preferred, because it helps avoid ambiguity. If you think about it, though, t
Re: (Score:2)
An anonymou is the singular of anonymii. "that anonymou really stands out from the rest of the anonymii", and anonymous is a pejorative, like emos. "being unidentifiable is a characteristic of anonymous's"
now you know.
Re: (Score:2)
Too bad English is a living language.
Though in general things lean the way you've said it, there is definitely space to do it either way with a "polysyllabic word ending in a sibilant" (generally based on intention of how it is to be said).
And "some contemporary writers omit the extra s in all cases"
http://en.wikipedia.org/wiki/Apostrophe#Standardisation [wikipedia.org]
I don't see the issue with the "new" way of adding an apostrophe only for words ending in "s" and an "'s" for words that don't, and in 15 years, I bet that'
Re: (Score:1)
Too bad English is a living language.
\
living language= a language so butchered it has no true rules, making it illogical and inefficient.
Even at 7 i knew there was a issue with having to learn, "For every rule there is a rule breaker."
English would be much better if people just followed rules. Exceptions only when absolutely necessary. But instead we make rules then break them at our leisure and as long as others like the rule breaker, it is now considered correct. It due to this stupid mentality that i still have difficulty with the English l
Re: (Score:1)
Please don't harp on other people about the way they butcher language, and then use 'u' as a word. This isn't your little chatspeak den here.
Re: (Score:2)
And who did i correct? i dont think i even mentioned any specific rules or violations of said rules. I said the language is completely fubared. Did my use of "u" in place of "You" throw your comprehension off? I commented on the english language and the adaptive include whats popular way of evolving
Parse Error.
Re: (Score:2)
i think it's terribly efficient actually. if a little hodge-podge.
i love the fact that one can say something and completely fuck the grammar out of it, and yet still be understood.
redundancy is actually quite important in a language, especially when the phonics we've inherited from the Romans can have such similar sounds.
try distinguish between "n" and "m" over the phone. you can't.
Re: (Score:1)
Well, I had one teacher recommend it, but you're right.
I expect it to be divided like the oxford comma.
It's definitely moving towards the simple rule in think though.
lightning attack (Score:2)
we called that blitzkrieg in wwii
Re: (Score:2)
Well, if I ever get into the The Cloud business, I know what to put on my business cards...
Amazon PR Disaster (Score:1)
Retail revenue lost from consumers who will forever link one of the greatest breaches in history with the Amazon brand: Priceless
I don't see it... (Score:3)
I suspect most all of the people that are amazon customers only vaguely know what's going on and won't bother to learn the detail on the hosting provider for the attackers systems.
I suspect the minority that are that inclined almost all know that in this specific scenario, Amazon was just a hosting provider and understand that means they aren't particularly responsible for what happened any more than AT&T would be responsible for a house downloading a video illegally.
Sure, there is probably a very small
Re: (Score:1)
Competent hosting companies monitor for this abuse. Amazon doesn't, and turns a blind eye towards it (because it would greatly reduce the margin on their computing resources they sell if they had to monitor for abuse).
Re: (Score:3, Insightful)
They cannot legally monitor for abuse... Or they can then get sued for "not finding abuse fast enough" and shit like that.
It is the same reason why no shared or VPS hosting company says they actively monitor your usage / files. This is a form of liability control for them. The second they start taking responsibility for "catching pirates, hackers, crackers, and pedophiles" is the second they can then be named in a lawsuit and sued.
Re: (Score:2)
"Competent hosting companies monitor for this abuse. Amazon doesn't, and turns a blind eye towards it"
Just like competent gun makers will monitor for gun abuses? Is this the "Colt should pay for murderings produced using its weapons" argument?
Re: (Score:2)
Just like competent gun makers will monitor for gun abuses? Is this the "Colt should pay for murderings produced using its weapons" argument?
If Colt were renting out the firearms by the hour and selling ammunition by the crate, then yes, you could reasonably expect them to monitor who is using them and for what stated purpose.
Re: (Score:2)
So Hertz has to have a guy sitting in every car that people rent to prevent someone from using the rented car to commit a crime?
Re: (Score:2)
If you abuse a gun, there isn't much that can be done. You cause problems for others on the Internet? That's a fast way to get NANOG on your back and have your IP blocks and AS numbers blackholed at a variety of large networks (transit, peering fabrics, etc).
Re: (Score:2)
"No, it's the "a gun-range should monitor the weapons it gives out, and how all weapons on the grounds are used - or be liable for any killing/injuries incurred on it's land or with it's property" argument."
So a cab driver is responsible if he happens to drive an assassin to his victim. Quite understandable.
Re:I don't see it... (Score:4, Insightful)
Re: (Score:2)
calling them on the phone and verifying the signup information, much less fraud would be possible as it eliminates the anonymity. The banks have no problems doing this
And just how much bank fraud does that stop exactly? HINT: NONE.
Online games are often an used for money laundering, by putting all the ill gotten money into the
OH YAH, I can just imagine some hard looking mafia types trading gold on Runescape, with the FBI monitoring them and hiding as a noob while waiting for the transaction to complete. How totally ridiculous.
The online service pays for it, and if they are too cheap to afford it, they shouldn't be in business.
Fascism! Socialism! Unamerican! But really, that is just a way to further consolidate power and money for the large co
Re: (Score:2)
Online games are often an used for money laundering, by putting all the ill gotten money into the
OH YAH, I can just imagine some hard looking mafia types trading gold on Runescape, with the FBI monitoring them and hiding as a noob while waiting for the transaction to complete. How totally ridiculous.
Actually, that's not as utterly ridiculous as you make it out to be: http://www.policeone.com/police-technology/articles/3115040-Online-games-are-new-choice-for-money-laundering/ [policeone.com]
Re: (Score:1)
The banks in Denmark certainly doesn't require you to identify yourself over the phone, or physically. I created an account yesterday in five minutes flat.
Of course they use a digital signature that is linked to my citizen ID that all the Danish banks made together in collaboration to remove that very check you are describing.
This can however be exploited as well as you describe :S Problem here is that it's my citizen ID. It's not just money then. They can change my name, my taxes, healthcare services and a
Re: (Score:2)
If every company stepped out of this mindset and had a "human" verify every signup, eg calling them on the phone and verifying the signup information, much less fraud would be possible as it eliminates the anonymity.
You've got a lovely trust in the ability of people to spot liars over the phone there. And in the general Power of Bureaucracy to Do Good.
How many people are you going to employ doing this? How are you going to pay for them? (Hint: the cost of getting signups verified would be passed on to you.) And it wouldn't stop fraud, just give a bigger opportunity for bribery and corruption. Automated systems, for all their faults, are at least honest and fair in a limited sense (because it is hugely easier to write t
Re: (Score:2)
Or maybe they'll like the fact that they were utilized in attacking Sony.
Re: (Score:2)
Re: (Score:2)
I also think you over estimate how many people will ever even hear that Amazon was involved, much less care about it.
Re: (Score:1)
Revenue from cloud services: 1.5%
Retail revenue lost from consumers who will forever link one of the greatest breaches in history with the Amazon brand: Priceless
You mean, just like the customers are fleeing the Windows platform in droves?
Re: (Score:2)
That's like saying it's Microsoft's fault that someone used a Windows computer to write a virus.
can we leave Apple fanboys out of this, just this once? this doesn't involve them.
Liability (Score:2)
It will be interesting to see what sony does with this if it is true. I mean, it is not like they care about burning bridges. I could totally see them suing Amazon, if only to give them a PR black eye.
Re: (Score:2)
It will be interesting to see what sony does with this if it is true. I mean, it is not like they care about burning bridges. I could totally see them suing Amazon, if only to give them a PR black eye.
Your post was not totally clear. Is the intent to give Amazon a PR Black Eye, or to freshen up the Sony PR Black Eye? I think Amazon would actually end up with a PR win if they handled it right.
Re: (Score:2)
However, if Sony were smart, they would put pressure on Congress to require companies to gain stronger knowledge about those they lease server space to.
Re: (Score:1)
In other news.. (Score:1)
Thieves were recently caught shoplifting. They wearing clothes from Gap, calling into question the influence and security of such clothing.
Yes, the story makes about as much sense as that...
Re: (Score:2)
More like using a pepper spray (meant for self defence) to steal stuff from others
Re: (Score:2)
Not a very good analogy. This is more like (car analogy time) hiring a tow car for a vehicle you don't own as a way of stealing it. The tow car driver facilitates the crime without being aware that they are doing anything illicit.
Re: (Score:2)
Re: (Score:2)
Rather, it's like they were using Amazon Fresh when they suddenly learned this: http://www.smbc-comics.com/index.php?db=comics&id=876#comic [smbc-comics.com]
really? (Score:5, Interesting)
Considering how Amazon has become known for caving to the slightest pressure from law enforcement or even just a nosy senator [talkingpointsmemo.com], to host such an attack from EC2 seems extraordinarily stupid.
It would make much more sense to launch it from somewhere hosted by a company that doesn't have a reputation for giving up their customer's data and shutting down even legitimate stuff that happens to run afoul of their vague guidelines.
Re: (Score:2)
Considering how Amazon has become known for caving to the slightest pressure from law enforcement or even just a nosy senator [talkingpointsmemo.com], to host such an attack from EC2 seems extraordinarily stupid.
It would make much more sense to launch it from somewhere hosted by a company that doesn't have a reputation for giving up their customer's data and shutting down even legitimate stuff that happens to run afoul of their vague guidelines.
?? Huh?
If you're in the business of stealing credentials, why not use some of the Amazon services those credentials allow you to access in order to get even more credentials?
As a benefit this also allows moronic assumpteers to take a distracting trip down "IP + Credentials == People" or "Shoot the Messenger" lane. If UPS delivers you a bomb or an envelope full of anthrax, it's not UPS's fault -- It's the malcontent that sent the package (Well, it's partially your fault too for accepting mail from a com
Re:really? (Score:5, Insightful)
Considering how Amazon has become known for caving to the slightest pressure from law enforcement or even just a nosy senator [talkingpointsmemo.com], to host such an attack from EC2 seems extraordinarily stupid.
It would make much more sense to launch it from somewhere hosted by a company that doesn't have a reputation for giving up their customer's data and shutting down even legitimate stuff that happens to run afoul of their vague guidelines.
Nah, once you do something on the scale of the PSN hack, it doesn't matter if the service provider caves too easily or not, because everyone gives up information when they get served a warrant. And there will be warrants. They just had to make sure Amazon has no way to trace it back to them, and it seems very unlikely the perpetrators accessed Amazon's servers from anything other than a laptop bought at a yard sale with a fake MAC address on a public wi-fi hotspot.
And the cloud services were paid for with a Visa gift card that was bought with cash.
Re: (Score:3)
Nah, once you do something on the scale of the PSN hack, it doesn't matter if the service provider caves too easily or not, because everyone gives up information when they get served a warrant. And there will be warrants. They just had to make sure Amazon has no way to trace it back to them, and it seems very unlikely the perpetrators accessed Amazon's servers from anything other than a laptop bought at a yard sale with a fake MAC address on a public wi-fi hotspot.
You'd like to think so but hackers can do stupid things, or fail to cover their tracks sufficiently, e.g. can't wipe logs. It's also possible that if anonymous were responsibles that internal ructions over the attack could lead to the person being identified via an informant which in turn leads to a raid which in turn leads to information being found that way.
Re: (Score:2)
The last time I purchased a Visa gift card with cash, I had to show ID.
Re: (Score:1)
Which wasn't yours. So, there.
Re: (Score:2)
Re: (Score:2)
If CSI taught me anything, it's that there's a traffic camera picture of the person having purchased the VISA gift card that the authorities will use to run a visual basic interface on it to cross-check with their "everyone on the planet" database.
Re: (Score:2)
Re: (Score:3)
Why? If you stole the credit card numbers before to buy the computation time, its not a big deal it they later fine the virtual machine afterwards. I would obviously only use the EC2 to collect and encrypt the data, but obviously not process it. If you need a lot of bandwidth to handle the incoming data, but you can afford a few days to transfer them out.
Lieberman and PNAC, Version 2.0 (Score:2)
Recently, they have financed a pile of drivel, in support of the Cheney-Rumsfeld conspiracy theory on 9/11, and attacking all those critics who know stuff like math, science, engineering, aviation and are retired intelligence professionals and military professionals, as well as former heads of state (i.e., really "flaky" guys as opposed to goatherds like Ch
Re: (Score:2)
Considering how Amazon has become known for caving to the slightest pressure from law enforcement or even just a nosy senator [talkingpointsmemo.com], to host such an attack from EC2 seems extraordinarily stupid.
You're probably right, but I had to laugh that just a few posts up someone was complaining that they're not trigger-happy enough. Maybe they really have found a middle-ground.
It would make much more sense to launch it from somewhere hosted by a company that doesn't have a reputation for giving up their customer's data and shutting down even legitimate stuff that happens to run afoul of their vague guidelines.
I expect the doer[s] knew the hack would be done-and-over by the time anyone was issuing shut-downs. I'd guess the way to find them now has everything to do with the stolen data. Where it went, where it's being sold or used, etc.
DANGER! Corny alert (Score:1)
Was the cloud hacked too? (Score:4, Interesting)
Wait a minute... Amazon's cloud crashed 4/21, the day after Sony realized they'd been pwned and took down PSN.
Is there something Amazon isn't saying, like maybe they were pwned too??
Re:Was the cloud hacked too? (Score:5, Funny)
Wait a minute... Amazon's cloud crashed 4/21, the day after Sony realized they'd been pwned and took down PSN.
Is there something Amazon isn't saying, like maybe they were pwned too??
And it was the day after 4/20 - therefore it had something to do with stoners.
George Bush didn't support legalization of marijuana.
Goddamnit. It's GEORGE BUSH'S FAULT!
Re: (Score:2)
Finally someone with some sense and logic posting on this story. I wish more people realized it was all his fault.
Re: (Score:2)
Re: (Score:2)
Ronald Regan is George Bush's fault!
Temporally, I'd be a little happier if it were the other way around. If Ronald Regan is George Bush's fault we have a problem in the Time Tunnel.
Re: (Score:1)
Or maybe Sony fought back? :-)
sources close to the investigation (Score:2)
> sources close to the ongoing investigation say the attack was mounted from Amazon Web Service's cloud computing platform ..
What evidence is there that Amazon Cloud was the source and why the need to keep the source of these allegations anonymous.
Web Services cloud- computing unit was used by hackers in last month’s attack against Sony Corp. (6758)’s online entertainment systems, according to a person with knowledge of the matter
I see, asome 'person'
Re: (Score:3)
In other words, about as much evidence as other claims that Anonymous, PS3 hackers, or Osama bin Laden were involved.
Hey, gotta fill that news cycle. Gotta draw eyeballs for advertisers. Content is just a vehicle for making money. Truth is incidental, and at this point often accidental.
Re: (Score:3)
TFA is totally bullshit.
I think that the hackers used a few open L1 proxies on Amazon AWS.
In my list of open proxies, there are around 20 proxies on Amazon AWS, of the form
ec2-??-??-??-???.us-west-1.compute.amazonaws.com:80
ec2-??-??-??-??.ap-southeast-1.compute.amazonaws.com:80
ec2-??-??-??-??.compute-1.amazonaws.com:80
ec2-??-??-??-??.eu-west-1.compute.amazonaws.com:80
where ??-??-??-?? is an IP address.
Re: (Score:2)
TFA is totally bullshit.
I think that the hackers used a few open L1 proxies on Amazon AWS.
In my list of open proxies, there are around 20 proxies on Amazon AWS, of the form ec2-??-??-??-???.us-west-1.compute.amazonaws.com:80 ec2-??-??-??-??.ap-southeast-1.compute.amazonaws.com:80 ec2-??-??-??-??.compute-1.amazonaws.com:80 ec2-??-??-??-??.eu-west-1.compute.amazonaws.com:80 where ??-??-??-?? is an IP address.
...so in order to find the perpetrators, we simply need to determine which seven of those proxies were used in the attack!
Is This Supposed To Be News? (Score:3)
So the hackers chose to bounce their packets off a server rented from Amazon. They could have chosen a server rented from a thousand others. Hell, they could have done it with a server rented from me. Thankfully, they did not. But really who the hell cares?
Re: (Score:2)
Just wait for this upcoming week's headlines...
"Logitech Mice Used In Sony Playstation Hack"
"64-Bit Processors Used In Sony Playstation Hack"
"Store-Brand Clothing Used In Sony Playstation Hack"
"Mountain Dew Used In Sony Playstation Hack"
Re: (Score:3)
Just wait for this upcoming week's headlines...
"Logitech Mice Used In Sony Playstation Hack" "64-Bit Processors Used In Sony Playstation Hack" "Store-Brand Clothing Used In Sony Playstation Hack" "Mountain Dew Used In Sony Playstation Hack"
"Sony VAIO Used In Sony Playstation Hack"
Re: (Score:1)
maybe MY stolen VAIO was used in the attack.
It was stolen randomly less than a week before PSN went down, coincidence, I think not.
/puts on tin foil hat
Re: (Score:2)
Re: (Score:1)
"Hosted by" Amazon? (Score:5, Funny)
An attack from Anonymous? Pshaw, yeah right.
We all know Amazon really did the hack themselves, because they were mad they couldn't get Sony on the One-Click patent, since PS3 users don't use mice.
Re: (Score:2)
More like the loss of £80 per PS3 when they gave out refunds to people over the removal of OtherOS.
Seriously though I doubt there is any love lost between Amazon and Sony.
Outpriced by Amazon? (Score:2)
a third way (Score:2)
stealing a few AWS accounts is cheaper than either of the options you mentioned.
Good (Score:1, Offtopic)
Amazon Prime Members? (Score:4, Funny)
Re: (Score:1)
They probably are Amazon Prime members now. You'll see the $79 fee appear on your next CC bill*
* assuming you own a PS3
Re: (Score:1)
Re: (Score:2)
"If a large corporation's site like the Sony site could be so easily compromised, how are we supposed to guage the level of security of any other site?"
You can't.
"Another question, if the security of Sony was compromised by using Amazon in some way, doesn't that mean that those who use Amazon are potentially at just as much risk as those who were compromised at Sony?"
No? Amazon has nothing to do with this. They just let you rent a PC.
" So let's say nono it's a completely different thing, how can you 100% gu
Re: (Score:2)
OK, I'm sorry. Strong emotions come out easyer on the internet.
By reading Slahdot you are expected to know what has been going around lately with respect to law enforcement and political engineering. By destroying things like Wikileaks due to destruction of anonimity and then piling upon that not being knowledgeable on the subject kind of makes me very mad. Especialy because the politicians that have enforced many shit upon society were not knowledgeable at all.
We can start this discussion again in a civili
Hosted BackTrack OS (Score:1)
How legitimate companies sign up (Score:2)
The hackers didn’t break into the Amazon servers, the person said. Rather, they signed up for the service just as a legitimate company would, using fake information.
And to think that by providing accurate information, I've been doing things wrong all this time.
They obviously didn't use S3 then! (Score:1)
Re: (Score:1)
The question is, why would you want to?
Re: (Score:1)