Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

Details Emerge on Malware Used in Sony Hacking Attack

The attackers used compromised systems in Thailand, Italy and Poland.

grapegeek / iStockphoto

New details have emerged about the hacking attack against Sony Pictures Entertainment, the motion picture studio which last week came under a withering digital siege that investigators say may have originated from North Korea.

Late Monday the FBI issued a confidential five-page warning to U.S. businesses concerning malicious software, or malware, used to carry out destructive attacks. The warning did not name Sony as a victim of the malware, though it is said to be a direct response to the breach at that company.

The full text of the warning could not be obtained, but Re/code sources who have seen it shared some of the FBI’s observations:

One primary feature of the malware is that it wipes the hard drives of targeted systems. This is at minimum a strong indication of North Korean involvement. Previous attacks attributed to North Korea, including one last year against TV networks and banks in South Korea, have often included wiping software that destroys all data stored on the system.

The malware’s creator used the Korean language pack in Microsoft’s Windows. Perhaps another hint pointing in North Korea’s direction, but not definitive either. However, the software was written in such as way as to execute its functions without regard to the languages in use on the system being attacked.

The attackers apparently used compromised computers in Thailand, Italy and Poland to carry out the attacks. The FBI’s warning says these systems belonged to parties unrelated to the attackers or the victim.

The malware takes advantage of Windows Management Instrumentation, or WMI, a tool used for managing Windows machines in a large corporate environment. After the malware is introduced and spreads throughout a network, WMI is used to launch it across all the infected machines on a network at the same time. Once its intended functions have been carried out, the malware then wipes the hard drives of the attacked systems.

Sony first came under attack last week when its corporate network was brought to its knees. Employees reporting for work last Monday morning saw on their displays the image of a red skeleton and the text of a message concerning unspecified demands. The Los Angeles Times reported that employees resorted to using pens, paper and fax machines to get their work done. Late Monday, Deadline reported that Sony’s systems were back up and running.

The apparent effects of the attack escalated throughout the week. On Friday, sensitive Sony files, detailing business plans, compensation data for employees and contracts with celebrities were said to have leaked to file-sharing sites. On Saturday, video files of five Sony motion pictures — four of which have not yet been released — were leaked to file-sharing sites.

On Friday, Re/code reported that Sony was investigating the possibility that the breach might be linked to North Korea. That country has threatened to take action in response to a forthcoming film called “The Interview.” The comedy, starring Seth Rogen and James Franco, depicts two celebrity TV journalists who land a rare interview with the North Korean leader Kim Jong-Un and are recruited by the CIA to assassinate him.

North Korea, deeply sensitive to the portrayal of its leaders, has called the film “an act of war” and called its distribution “absolutely intolerable.” Seeking to stop its release, the country’s government went so far as to ask President Obama to intervene in a letter over the summer.

Incidentally, someone finally thought to ask the North Korean government about this, and if nothing else its response was interesting. Responding to queries from the BBC, a spokesman for the North Korea’s mission to the United Nations said, “The hostile forces are relating everything to the DPRK (North Korea). I kindly advise you to just wait and see.”

This article originally appeared on Recode.net.

See More:

More in Technology

Podcasts
Anthropic just made AI scarierAnthropic just made AI scarier
Podcast
Podcasts

Why the company’s new AI model is a cybersecurity nightmare.

By Dustin DeSoto and Sean Rameswaram
Politics
The Supreme Court will decide when the police can use your phone to track youThe Supreme Court will decide when the police can use your phone to track you
Politics

Chatrie v. United States asks what limits the Constitution places on the surveillance state in an age of cellphones.

By Ian Millhiser
Future Perfect
The simple question that could change your careerThe simple question that could change your career
Future Perfect

Making a difference in the world doesn’t require changing your job.

By Bryan Walsh
Technology
The case for AI realismThe case for AI realism
Technology

AI isn’t going to be the end of the world — no matter what this documentary sometimes argues.

By Shayna Korol
Politics
OpenAI’s oddly socialist, wildly hypocritical new economic agendaOpenAI’s oddly socialist, wildly hypocritical new economic agenda
Politics

The AI company released a set of highly progressive policy ideas. There’s just one small problem.

By Eric Levitz
Future Perfect
Human bodies aren’t ready to travel to Mars. Space medicine can help.Human bodies aren’t ready to travel to Mars. Space medicine can help.
Future Perfect

Protecting astronauts in space — and maybe even Mars — will help transform health on Earth.

By Shayna Korol