Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

Details Emerge on Malware Used in Sony Hacking Attack

The attackers used compromised systems in Thailand, Italy and Poland.

grapegeek / iStockphoto

New details have emerged about the hacking attack against Sony Pictures Entertainment, the motion picture studio which last week came under a withering digital siege that investigators say may have originated from North Korea.

Late Monday the FBI issued a confidential five-page warning to U.S. businesses concerning malicious software, or malware, used to carry out destructive attacks. The warning did not name Sony as a victim of the malware, though it is said to be a direct response to the breach at that company.

The full text of the warning could not be obtained, but Re/code sources who have seen it shared some of the FBI’s observations:

One primary feature of the malware is that it wipes the hard drives of targeted systems. This is at minimum a strong indication of North Korean involvement. Previous attacks attributed to North Korea, including one last year against TV networks and banks in South Korea, have often included wiping software that destroys all data stored on the system.

The malware’s creator used the Korean language pack in Microsoft’s Windows. Perhaps another hint pointing in North Korea’s direction, but not definitive either. However, the software was written in such as way as to execute its functions without regard to the languages in use on the system being attacked.

The attackers apparently used compromised computers in Thailand, Italy and Poland to carry out the attacks. The FBI’s warning says these systems belonged to parties unrelated to the attackers or the victim.

The malware takes advantage of Windows Management Instrumentation, or WMI, a tool used for managing Windows machines in a large corporate environment. After the malware is introduced and spreads throughout a network, WMI is used to launch it across all the infected machines on a network at the same time. Once its intended functions have been carried out, the malware then wipes the hard drives of the attacked systems.

Sony first came under attack last week when its corporate network was brought to its knees. Employees reporting for work last Monday morning saw on their displays the image of a red skeleton and the text of a message concerning unspecified demands. The Los Angeles Times reported that employees resorted to using pens, paper and fax machines to get their work done. Late Monday, Deadline reported that Sony’s systems were back up and running.

The apparent effects of the attack escalated throughout the week. On Friday, sensitive Sony files, detailing business plans, compensation data for employees and contracts with celebrities were said to have leaked to file-sharing sites. On Saturday, video files of five Sony motion pictures — four of which have not yet been released — were leaked to file-sharing sites.

On Friday, Re/code reported that Sony was investigating the possibility that the breach might be linked to North Korea. That country has threatened to take action in response to a forthcoming film called “The Interview.” The comedy, starring Seth Rogen and James Franco, depicts two celebrity TV journalists who land a rare interview with the North Korean leader Kim Jong-Un and are recruited by the CIA to assassinate him.

North Korea, deeply sensitive to the portrayal of its leaders, has called the film “an act of war” and called its distribution “absolutely intolerable.” Seeking to stop its release, the country’s government went so far as to ask President Obama to intervene in a letter over the summer.

Incidentally, someone finally thought to ask the North Korean government about this, and if nothing else its response was interesting. Responding to queries from the BBC, a spokesman for the North Korea’s mission to the United Nations said, “The hostile forces are relating everything to the DPRK (North Korea). I kindly advise you to just wait and see.”

This article originally appeared on Recode.net.

See More:

More in Technology

Future Perfect
The 5 most unhinged revelations from Elon Musk’s lawsuit against OpenAIThe 5 most unhinged revelations from Elon Musk’s lawsuit against OpenAI
Future Perfect

The Musk v. OpenAI trial is over. Here are the receipts.

By Sara Herschander
Podcasts
Are humanoid robots all hype?Are humanoid robots all hype?
Podcast
Podcasts

AI is making them better — but they’re not going to be doing your chores anytime soon.

By Avishay Artsy and Sean Rameswaram
Future Perfect
The old tech that could help stop the next airborne pandemicThe old tech that could help stop the next airborne pandemic
Future Perfect

Glycol vapors, explained.

By Shayna Korol
Future Perfect
Elon Musk could lose his case against OpenAI — and still get what he wantsElon Musk could lose his case against OpenAI — and still get what he wants
Future Perfect

It’s not about who wins. It’s about the dirty laundry you air along the way.

By Sara Herschander
Life
Why banning kids from AI isn’t the answerWhy banning kids from AI isn’t the answer
Life

What kids really need in the age of artificial intelligence.

By Anna North
Culture
Anthropic owes authors $1.5B for pirating work — but the claims process is a Kafkaesque messAnthropic owes authors $1.5B for pirating work — but the claims process is a Kafkaesque mess
Culture

“Your AI monster ate all our work. Now you’re trying to pay us off with this piece of garbage that doesn’t work.”

By Constance Grady