Entertainment Hackers Morphing Into Criminal Enterprises: IT Experts

HBO. Sony. Netflix. WME. UTA. ICM. Being hacked in Hollywood was once a private club, but it’s rapidly expanding. Criminals have taken notice of the easy pickings at entertainment businesses, based on two leading IT security specialists asked about the current assault on HBO.

Hackers before this week obtained an estimated 1.5 terrabytes of information from the HBO system, such as a script for an upcoming Game of Thrones incident and a number of shows of Ballers and Space 104. The materials also reportedly included fiscal documents, company emails, and some client information. After the first disclosure, tonight’s Game of Thrones episode leaked, however, its appearance was thought to be unrelated to the prior intrusion. Hackers have also threatened to release more stuff.

Though identifying the exact offenders for HBO’s difficulty hasn’t been achieved, corporate is maturing. Where once it had been a game played with young guys, it has now grown into a criminal business or a nation-state show of electricity, based on two leading IT security specialists

Dan Clements, an IT cyber-security consultant who has worked with a number of three-letter agencies, said cyber-crime was just a lark into a sizable underground cadre of hackers. Composed of hard-core computer nerds and avid gamers alienated from the actual world, all boastful and eager to impress their peers, the hacking teams typically infiltrated sites merely to prove that it could be carried out. The aim was to acquire a “trophy,” rather than the usual ransom.

That relatively benign practice transformed with the Sony company hack, ” Clements saidan invasion that the FBI blamed on North Korea. But before that major incident, in which stolen incoming emails led to firings, there was an earlier intrusion. A team called the Lizard Squad, made up of Eastern Europeans, Australians, and also a Hawaii-based hacker, probed into Sony, Clements said.

By discussing what they discovered on popular underground cookie internet sites, they could inadvertently led to the North Korean exploits.

“Some of that Sony information was drifting across the underground, and the North Koreans could have had access to that intelligence,” Clements said. “The FBI reported the cyber prints (on the major hack) were that the North Koreans. But the rumor in the underground was that the gamers had already been in there.”

Pre-Sony, the subterranean classes could be discovered by people who understood where to look. Clements stated. Nowadays, many unscrupulous hackers really are virtually imperceptible. “The classes are pretty dark these days,” Clements said. “Back in the old days, they liked to brag. There’s too much visibility these days. The young guys still brag, but the pros aren’t going to be viewed. You’re not going to have the ability to figure out that they’re.”

Roderick Jones, a former Scotland Yard security expert who now runs Rubica, a San Francisco cyber-security company, said that many hacking strikes begin just. “If you examine the history of strikes which were, at the moment, described as complicated and then back it up out there, they’re normally the result of a Phishing attack against an employee. Stuxnet, that’s a complicated attack. The major of strikes aimed against organizations are getting workers to click links that are bad.”

Hacking into methods occurs due to the collaborative nature of the work force, Jones says. “Too many people have access to sensitive stuff,” he stated, citing NSA whistle-blower Edward Snowden as the classic case.

Sadly, there is not any defense against someone decided to enter a computer program, Clements stated. “If you create a penetration testing team and invent a hack plan, and have them attempt to get in, they’re going to have the ability to receive in. The probability is so high that they can figure out how to invest in, and as soon as they’re in, then they migrate amongst serves and people and determine what they wish to take and if they would like to hold us hostage. It merely depends on their motivations.”

  Click the next¬†ARROW to continue reading!








But there’s 1 hope. Many former hackers eventually decide to go legit. “I’ve seen them over 20 years grow up and need to have real jobs,” said Clements. “Lots of them want to work for security businesses, a number of them help law enforcement.”