Now Reading
Sony is Counter-Hacking With DDoS Attacks

Sony is Counter-Hacking With DDoS Attacks

by Alex GoraleDecember 12, 2014

Entertainment giant Sony was recently hacked in one of the most damaging cyberattacks ever. North Korea is considered a suspect, but the country’s officials denied any involvement. After the terrible hack, the company is now taking a stand and counter-hacking to keep its leaked files, which include five unreleased movies, from spreading across torrent sites, Slate reports.

The hackers who infiltrated Sony Pictures, known as “Guardians of the Peace,” have released five troves of Sony data over the past few weeks. The company’s countermeasure involves overwhelming torrenters with network requests if they attempt to download files from the leak.

Sony is Using Hundreds of Computers in Asia to Execute Denial of Service Attacks

HackerAccording to Recode, Sony is using hundreds of computers in Asia to execute a denial of service attack on sites where its pilfered data is available, according to two people with direct knowledge of the matter. Sony used a similar approach in the early 2000s working with an anti-piracy firm called MediaDefender, when illegal file sharing exploded.

Denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks attempt to make a machine or network resource unavailable to its intended users. DoS attacks have also been used as a form of resistance and protest against governments and other organizations. Notable free software and civil rights activist Richard Stallman has stated that DoS is a form of “Internet Street Protests.”

Using counterattacks to contain leaks and deal with malicious hackers has been gaining legitimacy. Some cybersecurity experts even feel that the Second Amendment can be interpreted as applying to “cyber arms.” But this approach could also escalate cyber-battles in unintended ways.

Images from Shutterstock.

Advertised sites are not endorsed by us. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
What's your reaction?
Love it
Hate it
  • Great mention of this being a legitimate 2nd amendment issue, Giulio! I have often argued that much of the blatantly criminal crap from trolling, harassment, hacking, identity theft, leaking, sabotage, etc that goes on over the internet simply wouldn’t happen if internet users had the same means of using deadly force to defend themselves against attack (while at the same time being properly held legally accountable for abuse of that power).