Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

Why we shouldn’t be surprised hackers could get into Sony’s network

FREDERIC J. BROWN/AFP/Getty Images

Testifying before Congress last week, the FBI’s Joseph Demarest played up the sophistication of the hackers who broke into the network of Sony Pictures. “The malware that was used would have slipped or probably gotten past 90 percent of Net defenses that are out there,” he said.

But this doesn’t impress security expert Robert Graham, who argues you don’t have to be very sophisticated to break into a corporate network. He describes one case where his firm was hired for “penetration testing” — attempting to break into the company’s network to test its security.

We had some USB drives made with the logo of the corporation we were pen-testing. We grabbed a flash game off the Internet, changed the graphics so that they were punching the logo of their main competitor, and put text in the Final Score screen suggesting “email this to your friends and see what they get”. We then added some malware components to it. We then dropped the USB drives in the parking lot.

This gave us everything in the company as people passed the game around. The CEO and many high-level executives ran it on their machines. Sysadmins ran it. Once we got control of the central domain controller, we got access to everything: all files, all emails, ... everything.

This story illustrates a couple of lessons about corporate security. First, one of the biggest challenges in corporate security is employee training. A company can have the strongest possible defenses against external enemies, but there’s no getting around the need for the company’s own employees to access sensitive information. If a hacker can trick a few of those employees into doing something dumb, like running a program found on a USB drive or typing a password into a hacker-owned website, then the attacker can get the same permissions as the trusted employee.

There are precautions network administrators can take against this kind of attack, but they tend to make it harder for employees to do their jobs. It might have been possible for the company Graham attacked to ban employees from putting USB drives in their computers, but that would have created headaches when they actually needed to get information off of a USB drive. So there’s constant pressure for security measures to be relaxed in the name of efficiency, leaving a lot of vulnerabilities for the first group to make a serious effort to exploit them.

Technology
Apple is trying to make your phone usable as a phone againApple is trying to make your phone usable as a phone again
Technology

You should turn on the new scam-busting iPhone feature right now.

By Adam Clark Estes
Future Perfect
AI can now stalk you with just a single vacation photoAI can now stalk you with just a single vacation photo
Future Perfect

Artificial intelligence could weaponize the data we’ve been sharing for decades.

By Kelsey Piper
Technology
Amazon would like you to hand over your palm print, pleaseAmazon would like you to hand over your palm print, please
Technology

What to know about the tech giant’s growing biometric business.

By Adam Clark Estes
Future Perfect
One chilling forecast of our AI future is getting wide attention. How realistic is it?One chilling forecast of our AI future is getting wide attention. How realistic is it?
Future Perfect

Rapid changes from AI may be coming far faster than you imagine.

By Kelsey Piper
Technology
Turn off your read receipts. They’re dangerous.Turn off your read receipts. They’re dangerous.
Technology

These days, bad manners aren’t the only reason read receipts are a bad idea.

By Adam Clark Estes
Technology
How to fight back in the war against spam textsHow to fight back in the war against spam texts
Technology

Remember: You’re smarter than the scammers.

By Adam Clark Estes