Episode 5 of the of Game of Thrones will air on Sunday. As with episode 4, an outline of the script has been circulating online in what seems to be the latest leak from the huge HBO hack. It seemed like a big deal at first. Nearly two weeks ago, HBO confirmed that hackers had penetrated its servers and stolen some “proprietary information.” A hacker who identifies himself as “Mr. Smith” then leaked the script outline for episode 4 of Game of Thrones, some episodes of Ballers, as well as some information about other HBO shows, like Room 104. At the time, the hacker claimed to have stolen some 1.5 terabytes of data, including information about HBO employees, and demanded a $6 million ransom. But HBO stood fast. Variety reported that the hacked data included the some emails of a senior HBO executive. The entertainment newspaper also claimed that there is an image file that “appears to show screenshots of HBO’s internal administration tools, listing employee names and email addresses and their functions within the organization.” That’s when comparisons to the catastrophic Sony hack of 2014 really heated up. If these hackers released a boatload of private and confidential information, and if the leaked data included financial information about the company, HBO could be in real trouble.
HBO corporate is now reassuring staff that their email inboxes were not implicated in the attack.
Hackers who posted several of HBO’s new episodes and a “Game of Thrones” script online in late July have published a month’s worth of emails from the inbox of one of the entertainment company’s executives. The Hackers also addressed a video letter to HBO CEO Richard Plepler that demands the company demand payment of money, although the figure was redacted, according to the report. The hackers said HBO marked their 17th victim, and only three have failed to pay. HBO said its forensic review of the incident is ongoing and noted that it believed further leaks were forthcoming.
HBO private emails in the hands of hackers, came Monday in an email message to The Hollywood Reporter that also contained nine files with such labels as “Confidential” and “Script GOT7.” The hackers also delivered a video letter to HBO CEO Richard Plepler that says, “We successfully breached into your huge network. … HBO was one of our difficult targets to deal with but we succeeded (it took about 6 months).”
They say that the frequency of the attacks has overwhelmed the FBI’s Los Angeles field office, which has been unable to properly investigate all of them. The FBI’s surprising advice, according to industry sources: Pay the ransom.
FBI spokesperson in the L.A. office denied that the agency is telling companies to cough up the bitcoins in cases of ransomware. “The FBI does not encourage payment of ransom as it keeps the criminals in business,” says Laura Eimiller. “Of course, the individual victim must weigh their options.”
“The FBI will say it’s easier to pay it than it is to try to fight to get it back,” says Hemanshu Nigam, a former federal prosecutor of online crime in L.A. and onetime chief security officer for News Corp. “And if one company pays the ransom, the entire hacking community knows about it.”
Hackers recently siphoned 1.5 terabytes of data from HBO, and have since leaked unaired episodes of Ballers, Room 104, and Game of Thrones. HBO says it has been looking into the hack since it was discovered, but few conclusive details are known.
The assumption is that the entertainment industry is 5-6 years behind in technology. Netflix lost 10 episodes from Orange Is The New Black‘s fifth season this year because the episodes were on servers running Windows 7. Larson Studios, the post-production company that was hacked, claims the hackers weren’t even looking for the show, just computers running Windows.
The other theory is that the hackers targeted individual employees. Even if HBO keeps all of its files and internal documents behind heavily encrypted security, it likely doesn’t extend that level of security to each individual employee.
A large-scale cyberattack is easing its way through a number of Ukrainian and Russian targets today. So far, in Russia, oil producer Rosneft and metal company Evraz have been affected by the attack. In Ukraine, Boryspil airport, the banking system, a state power distributer and even the Ukrainian government have been hit. Flight delays are e
The worm called WannaCry infected 200,000 computers in more than 150 countries, tied the UK health service in knots, took out the Spanish phone company, made train travelers in Germany chaotic, and took big swipes out of FedEx, Renault, a reported 29,000 Chinese institutions, and networks all over Russia—including the Russian Interior Ministry.
Can you get infected by Wanna Cry Ransomeware?
No. MalwareTech defanged the malware. Although there are a few extraordinary situations where the threat persists (in particular if your network blocks access to one odd website), for most people, WannaCry has been out of commission since late Friday.
Well Do I need to worry about it right now?
Yes. There have been reports from Matt Suiche of a new WannaCry variant that’s been sinkholed with 10,000 infections logged. The clones are coming, and many of them won’t be easy to stop. You have to get your Windows PC patched now.
FedEx Corp confirms it has suffered a malware attack on Friday and said its Windows-based systems were “experiencing interference” due to malware and that it was trying to fix the issue as quickly as possible. Computer systems at companies and hospitals in dozens of countries were hit Friday, apparently part of a huge extortion plot. The so-called ransomware attack appears to exploit a weakness that was purportedly identified by the U.S. National Security Agency and leaked to the internet. It encrypts data on infected computers and demands payment before the information is unencrypted..
A cyberattack that is forcing computer owners to pay hundreds of dollars in ransom to unlock their files has hit almost every corner of the world. This is the biggest ransomware outbreak in history.
Security experts from Kaspersky Lab and Avast Software say Russia was the hardest hit, followed by Ukraine and Taiwan. Researchers believe a criminal organization is behind this, given its sophistication.Russia’s Interior Ministry says it has come under cyber attack. Agency spokeswoman Irina Volk says in a statement carried by Russian news agencies that Friday’s cyber attacks hit about 1,000 computers. She said the ministry’s servers haven’t been affected. Volk also said that ministry experts are now working to recover the system and do necessary security updates.
Russian media also said that the Investigative Committee, the nation’s top criminal investigation agency, also has been targeted. The committee denied the reports.
Megafon, a top Russian mobile operator, also said it has come under cyberattacks that appeared similar to those that crippled U.K. hospitals on Friday.
Microsoft has released fixes for vulnerabilities and related tools disclosed by TheShadowBrokers, a mysterious group that has repeatedly published alleged NSA software code. But many companies and individuals haven’t installed the fixes yet, or are using older versions of Windows that Microsoft no longer supports and didn’t fix.
Hospitals in the U.K. and telecommunications companies in Spain are among those hit by a “ransomware” attack that locked up computer data and demanded payment to free it. The attacks use a malware called Wanna Decryptor, also known as WannaCry.