Researchers: Sony Hack Was Insider Breach

Norse Corporation researchers are claiming that a group of six people, including at least one former Sony Pictures employee, was behind the recent breach at Sony Pictures Entertainment. The researchers tracked the activities of the former employee, a systems administrator who had an extensive technical background and knowledge of Sony’s systems, on underground forums where […]

Written By: Jeff Goldman
Dec 31, 2014
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Norse Corporation researchers are claiming that a group of six people, including at least one former Sony Pictures employee, was behind the recent breach at Sony Pictures Entertainment.

The researchers tracked the activities of the former employee, a systems administrator who had an extensive technical background and knowledge of Sony’s systems, on underground forums where the group appears to have communicated prior to the breach.

Norse senior vice president Kurt Stammberger told The Security Ledger that the group included two people in the U.S., one in Canada, one in Singapore, and one in Thailand.

The ex-employee in question was fired from the company in May 2014.

“The investigators believe the disgruntled former employee or employees may have joined forces with pro-piracy hacktivists, who have long resented the Sony’s anti-piracy stance, to infiltrate the company’s networks,” Anthony M. Freed, Norse’s senior editor of publications, explained in a blog post.

The researchers briefed the FBI on their findings earlier this week. “The disclosure casts further doubt on the FBI’s assertion that the attack was carried out by state-sponsored actors under the control of North Korea, a theory that has been all but discredited by a host of security professionals over the last week,” Freed wrote.

HyTrust president and co-founder Eric Chiu told eSecurity Planet by email that systems administrators’ deep knowledge about internal networks, systems and data, along with very broad access, can provide them with “god-like” privileges.

“Whether you are dealing with a disgruntled employee or an outside attacker that has stolen their credentials, the harm can be devastating and very difficult to detect — just look at Edward Snowden, who stole millions of classified records, or Shionogi Pharmaceuticals, where a former IT administrator was able to leverage virtualization credentials to destroy every single system that the company ran on in a matter of minutes,” Chiu said.

“The insider threat is the number one attack vector today and can lead to the greatest damage,” Chiu added.

Separately, the Washington Post reports that members of the hacker group Lizard Squad claim to have provided several Sony employee login credentials to the hackers behind the attack.

“Whether attacks are perpetrated by professionals, a nation-state, teenagers, former employees or hacktivists, there is a common attack pattern that we have seen underscored all year long: attackers are using employee accounts against their employers,” Rapid7 global security strategist Trey Ford told eSecurity Planet.

Ford suggests that companies take the following steps to protect themselves from these types of breaches:

  1. Institute strong password policies
  2. Use two-factor authentication for all external access
  3. Frequently inventory, assess, and test controls to raise confidence that policies are enforced across the network
  4. Deploy account behavior monitoring and intruder detection to catch attackers that slip through

“The technology needed to improve controls, and to better protect and monitor the use of user and administrative accounts, exists today,” Ford added. “Given the lower barrier to entry for, and the strong economic forces and diverse motivations behind cyber-attacks, we expect attacks against organizations of all sizes and industries to increase in 2015.”

A recent eSecurity Planet article offered advice on defending against insider threats.

Photo courtesy of Shutterstock.

thumbnail Jeff Goldman

eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet writer since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.

Recommended for you...

Surfshark vs NordVPN (2025): Which VPN Wins? Full Breakdown

NordVPN or Surfshark? Compare speed, security, price, streaming, unique features, and more in our detailed 2025 VPN review. Find your match.

Matt Gonzales
Aug 14, 2025
The 5 Best VPNs for Small Businesses on a Budget

Discover the 5 best VPNs for small businesses in 2025. Compare features, pricing, and find the right fit to protect your team and data.

Matt Gonzales
Jul 16, 2025
Penetration Testing Phases: Steps, Tools & Methodology

Penetration testing simulates cyberattacks to find risks. Explore the 7 key phases, tools, and methods to strengthen your security.

Ray Fernandez
Jun 10, 2025
Microsoft Defender vs Bitdefender: Compare Antivirus Software

Compare Microsoft Defender and Bitdefender antivirus software. We rate malware detection, pricing plans, privacy features, and more.

Jenna Phipps
May 27, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.