
On November 24, 2014, thehacker group "Guardians of Peace"leaked confidential data from the film studioSony Pictures Entertainment (SPE). The data included employee emails, personal and family information, executive salaries, copies of then-unreleased films, future film plans, screenplays, and other information.[1] The perpetrators then employed a variant of theShamoonwiper malware to erase Sony's computer infrastructure.[2]
During the hack, the group demanded that Sony withdraw its then-upcoming filmThe Interview, apolitical satire[3]action comedy film produced and directed bySeth Rogen andEvan Goldberg. The film stars Rogen andJames Franco as journalists who set up an interview with North Korean leaderKim Jong Un only to then be recruited by theCIA toassassinate him. The hacker group threatenedterrorist attacks at cinemas screening the film, resulting in many major U.S. theater chains opting not to screenThe Interview. In response to these threats, Sony chose to cancel the film's formal premiere and mainstream release, opting to skip directly to a downloadable digital release followed by a limited theatrical release the next day.[4][5][6]
United States intelligence officials, after evaluating the software, techniques, and network sources used in the hack, concluded that the attack was sponsored by the government of North Korea, which has since denied all responsibility.[7]
The exact duration of the hack is yet unknown. U.S. investigators say the culprits spent at least two months copying critical files.[8] A purported member of the Guardians of Peace (GOP) who has claimed to have performed the hack stated that they had access for at least a year prior to its discovery in November 2014.[9] The hackers involved claim to have taken more than 100 terabytes of data from Sony, but that claim has never been confirmed.[10] The attack was conducted usingmalware. Although Sony was not specifically mentioned in its advisory, theUnited States Computer Emergency Readiness Team said that attackers used aServer Message Block (SMB)Worm Tool to conduct attacks against a major entertainment company. Components of the attack included a listening implant,backdoor, proxy tool, destructivehard drive tool, and destructive target cleaning[11] tool. The components clearly suggest an intent to gain repeated entry, extract information, and be destructive, as well as remove evidence of the attack.[12][13]
Sony was made aware of the hack on Monday, November 24, 2014, as the malware previously installed rendered many Sony employees' computers inoperable by the software, with the warning by a group calling themselves the Guardians of Peace, along with a portion of the confidential data taken during the hack.[14] Several Sony-related Twitter accounts were also taken over.[9] This followed a message that several Sony Pictures executives had received via email on the previous Friday, November 21; the message, coming from a group called "God'sApstls" [sic], demanded "monetary compensation" or otherwise, "Sony Pictures will be bombarded as a whole".[14] This email message had been mostly ignored by executives, lost in the volume they had received or treated as spam email.[14] In addition to the activation of the malware on November 24, the message included a warning for Sony to decide on their course of action by 11:00 p.m. UTC that evening, although no apparent threat was made when that deadline passed.[14] In the days following this hack, the Guardians of Peace began leaking yet-unreleased films and started to release portions of the confidential data to attract the attention of social media sites, although they did not specify what they wanted in return.[14] Sony quickly organized internal teams to try to manage the loss of data to the Internet, and contacted theFederal Bureau of Investigation (FBI) and the private security firmFireEye to help protect Sony employees whose personal data was exposed by the hack, repair the damaged computer infrastructure and trace the source of the leak.[14] The first public report concerning a North Korean link to the attack was published byRe/code on November 28 and later confirmed byNBC News.[15]
This is absurd. Yet it is exactly the kind of behavior we have come to expect from a regime that threatened to take 'merciless countermeasures' against the U.S. over a Hollywood comedy, and has no qualms about holding tens of thousands of people inharrowing gulags.
On December 8, 2014, alongside the eighth large data dump of confidential information, the Guardians of Peace threatened Sony with language relating to theSeptember 11 attacks that drew the attention of U.S. security agencies.[14][17] North Koreanstate-sponsored hackers are suspected by the United States of being involved in part due to specific threats made toward Sony and movie theaters showingThe Interview, a comedy film about an assassination attempt againstKim Jong Un.[18] North Korean officials had previously expressed concerns about the film to theUnited Nations, stating that "to allow the production and distribution of such a film on the assassination of an incumbent head of a sovereign state should be regarded as the most undisguised sponsoring of terrorism as well as an act of war."[19]
In its first quarter financials for 2015, Sony Pictures set aside $15 million to deal with ongoing damages from the hack.[20] Sony bolstered its cyber-security infrastructure as a result, using solutions to prevent similar hacks or data loss in the future.[14] Sony co-chairpersonAmy Pascal announced in the wake of the hack that she would step down effective May 2015, and instead will become more involved with film production under Sony.[21]
According to a notice letter dated December 8, 2014, from SPE to its employees, SPE learned on December 1, 2014 that personally identifiable information about employees and their dependents may have been obtained by unauthorized individuals as a result of a "brazen cyber-attack", including names, addresses,Social Security numbers and financial information.[22] On December 7, 2014,C-SPAN reported that the hackers stole 47,000 unique Social Security numbers from the SPE computer network.[23]
Although personal data may have been stolen, early news reports focused mainly on celebrity gossip and embarrassing details about Hollywood andfilm industry business affairs gleaned by the media from electronic files, including private email messages. Among the information revealed in the emails was that Sony CEOKazuo Hirai pressured Sony Pictures co-chairwoman Amy Pascal to "soften" the assassination scene inThe Interview.[24] Many details relating to the actions of the Sony Pictures executives, including Pascal andMichael Lynton, were also released, in a manner that appeared to be intended to spur distrust between these executives and other employees of Sony.[14]
Other emails released in the hack showed Pascal andScott Rudin, a film and theatrical producer, discussingAngelina Jolie. In the emails, Rudin referred to Jolie as "a minimally talented spoiled brat" because Jolie wantedDavid Fincher to direct her filmCleopatra, which Rudin felt would interfere with Fincher directing aplanned film aboutSteve Jobs.[25] Pascal and Rudin were also noted to have had an email exchange about Pascal's upcoming encounter withBarack Obama that included characterizations described as racist, which led to Pascal's resignation from Sony.[26][27][28][29] The two had suggested they should mention films about African-Americans upon meeting the president, such asDjango Unchained,12 Years a Slave andThe Butler, all of which depictslavery in the United States or the pre-civil rights era.[26][27][28] Pascal and Rudin later apologized.[26][28] Details of lobbying efforts by politicianMike Moore on behalf of theDigital Citizens Alliance andFairSearch againstGoogle were also revealed.[30]
The leak revealed multiple details of behind-the-scenes politics onColumbia Pictures' currentSpider-Man film series, including emails between Pascal and others to various heads ofMarvel Studios.[31] Due to the outcry from fans, theSpider-Man license was eventually negotiated to be shared between both studios. In addition to the emails, a copy of the screenplay for theJames Bond filmSpectre, released in 2015, was obtained.[32] Several future Sony Pictures films, includingAnnie,Mr. Turner,Still Alice andTo Write Love on Her Arms, were also leaked.[33][34][35] The hackers intended to release additional information on December 25, 2014,[36] which coincided with the release date ofThe Interview in the United States.
According toThe Daily Dot, based on the email leaks, while he was at Sony, executive Charles Sipkins was responsible for following senior executives' orders to editWikipedia articles about them.[37]
In December 2014, former Sony Pictures Entertainment employees filed four lawsuits against the company for not protecting their data that was released in the hack, which included Social Security numbers and medical information.[38] As part of the emails, it was revealed that Sony was in talks withNintendo to make ananimated film based on theSuper Mario Bros. franchise.[39][40]
In January 2015, details were revealed of theMPAA's lobbying of theUnited States International Trade Commission to mandate U.S.ISPs either at theinternet transit level or consumer levelinternet service provider, to implementIP address blockingpirate websites as well aslinking websites.[41]WikiLeaks republished over 30,000 documents that were obtained via the hack in April 2015, with founderJulian Assange stating that the document archive "shows the inner workings of an influentialmultinational corporation" that should be made public.[42] Sony condemned the WikiLeaks publication and their attorneys responded by saying it "indiscriminately" disseminated stolen data, and that this "conduct rewards a totalitarian regime seeking to silence dissident speech". The lawyers also said that "WikiLeaks is incorrect that this Stolen Information belongs in the public domain".[43][44][45][46]
In November 2015, afterCharlie Sheen publicly announced in a television interview that he was diagnosed withHIV, it was revealed that Sony executives were aware of the diagnosis as early as March 10, 2014, even though he never told them about it.[47][48] In December,Snap Inc., due to the hack, was revealed to have acquired Vergence Labs for $15 million in cash and stock, the developers ofEpiphany Eyewear, andmobile app Scan for $150 million.[49][50]
On December 16, for the first time since the hack, the Guardians of Peace mentioned the then-upcoming filmThe Interview by name, and threatened to take terrorist actions against the film's New York Citypremiere at Sunshine Cinema on December 18, as well as on its U.S.-wide release date, set for December 25.[34] Sony pulled the theatrical release the following day.
We will clearly show it to you at the very time and placesThe Interview be shown, including the premiere, how bitter fate those who seek fun in terror should be doomed to. Soon all the world will see what an awful movie Sony Pictures Entertainment has made. The world will be full of fear. Remember the11th of September 2001. We recommend you to keep yourself distant from the places at that time. (If your house is nearby, you'd better leave.)Whatever comes in the coming days is called by the greed of Sony Pictures Entertainment. All the world will denounce the SONY.[51]
Seth Rogen andJames Franco, the stars ofThe Interview, responded by saying they did not know if it was definitely caused by the film,[52] but later canceled all media appearances tied to the film outside of the planned New York City premiere on December 16, 2014.[53] Following initial threats made towards theaters that would showThe Interview, several theatrical chains, includingCarmike Cinemas,Bow Tie Cinemas,Regal Entertainment Group,Showcase Cinemas,AMC Theatres,Cinemark Theatres, as well as several independent movie theater owners announced that they would not screenThe Interview.[54][55][56] The same day, Sony stated that they would allow theaters to opt out of showingThe Interview, but later decided to fully pull the national December 25 release of the film, as well as announce that there were "no further release plans" to release the film on any platform, including home video, in the foreseeable future.[57][58][59]
On December 18, two messages (both allegedly from the Guardians of Peace) were released. One, sent in a private message to Sony executives, stated that they would not release any further information if Sony never releases the film and removed its presence from the internet. The other, posted toPastebin, a web application used for text storage that the Guardians of Peace had used for previous messages, stated that the studio had "suffered enough" and could releaseThe Interview, but only if Kim Jong Un's death scene was not "too happy". The post also stated that the company cannot "test [them] again", and that "if [Sony Pictures] makes anything else, [they] will be here ready to fight".[60]
President Barack Obama, in an end-of-year press speech on December 19, commented on the Sony hacking and stated that he felt Sony made a mistake in pulling the film, and that producers should "not get into a pattern where you are intimidated by these acts".[61] He also said, "We will respond proportionally and we will respond in a place and time and manner that we choose."[62] In response to President Obama's statement, Sony Entertainment's CEO Michael Lynton said on theCNN programAnderson Cooper 360 that the public, the press and the President misunderstood the events. Lynton said the decision to cancel the wide release was in response to a majority of theaters pulling their showings and not to the hackers' threats. Lynton stated that they would seek other options to distribute the film in the future, and noted "We have not given in. And we have not backed down. We have always had every desire to have the American public see this movie."[63][64]
On December 23, Sony opted to authorize approximately 300 mostly-independent theaters to showThe Interview on Christmas Day, as the four major theater chains had yet to change their earlier decision not to show the film.[65][66] The FBI worked with these theaters to detail the specifics of the prior threats and how to manage security for the showings, but noted that there was no actionable intelligence on the prior threats.[67] Sony's Lynton stated on the announcement that "we are proud to make it available to the public and to have stood up to those who attempted to suppress free speech".[68]The Interview was also released toGoogle Play,Xbox Video, andYouTube on December 24.[69] No incidents predicated by the threats occurred with the release, and instead, the unorthodox release of the film led to it being considered a success due to increased interest in the film following the attention it had received.[70]
On December 27, the North KoreanNational Defence Commission released a statement accusing Obama of being "the chief culprit who forced the Sony Pictures Entertainment to indiscriminately distribute the movie."[71]
U.S. government officials stated on December 17, 2014 their belief that the North Korean government was "centrally involved" in the hacking, although there was initially some debate within the White House whether or not to make this finding public.[7] White House officials treated the situation as a "serious national security matter",[72] and the FBI formally stated on December 19 that they connected the North Korean government to the cyber-attacks.[73][74] Including undisclosed evidence, these claims were made based on the use of similar malicious hacking tools and techniques previously employed by North Korean hackers—including North Korea's cyberwarfare agencyBureau 121 on South Korean targets.[7][75] According to the FBI:[76]
The FBI later clarified more details of the attacks, attributing them to North Korea by noting that the hackers were "sloppy" with the use ofproxy IP addresses that originated from within North Korea. At one point the hackers logged into the Guardians of PeaceFacebook account and Sony's servers without effective concealment.[78] FBI DirectorJames Comey stated that Internet access is tightly controlled within North Korea, and as such, it was unlikely that a third party had hijacked these addresses without allowance from the North Korean government.[79][80] TheNational Security Agency assisted the FBI in analyzing the attack, specifically in reviewing the malware and tracing its origins;NSA director AdmiralMichael S. Rogers agreed with the FBI that the attack originated from North Korea.[81] A disclosed NSA report published byDer Spiegel stated that the agency had become aware of the origins of the hack due to their own cyber-intrusion on North Korea's network that they had set up in 2010, following concerns of the technology maturation of the country.[77]
The North Korean news agencyKCNA denied the "wild rumours" of North Korean involvement, but said that "The hacking into the SONY Pictures might be a righteous deed of the supporters and sympathizers with the DPRK in response to its appeal."[17][32][82] North Korea offered to be part of a joint probe with the United States to determine the hackers' identities, threatening consequences if the United States refused to collaborate and continued the allegation.[83][84] The U.S. refused and asked China for investigative assistance instead.[85] Some days after the FBI's announcement, North Korea temporarily suffered a nationwide Internet outage, which the country claimed to be the United States' response to the hacking attempts.[86]
On the day following the FBI's accusation of North Korea's involvement, the FBI received an email purportedly from the hacking group, linking to aYouTube video entitled "you are an idiot!", apparently mocking the organization.[87][88][89]
On December 19, 2014,U.S. Secretary of Homeland SecurityJeh Johnson released a statement saying, "The cyber attack against Sony Pictures Entertainment was not just an attack against a company and its employees. It was also an attack on ourfreedom of expression and way of life." He encouraged businesses and other organizations to use the Cybersecurity Framework developed by theNational Institute of Standards and Technology (NIST) to assess and limit cyber risks and protect against cyber threats.[90] On the same day,U.S. Secretary of StateJohn Kerry published his remarks condemning North Korea for the cyber-attack and threats against movie theatres and moviegoers. "This provocative and unprecedented attack and subsequent threats only strengthen our resolve to continue to work with partners around the world to strengthen cybersecurity, promotenorms of acceptable state behavior, uphold freedom of expression, and ensure that the Internet remainsopen,interoperable, secure andreliable," he said.[91]
On January 2, 2015, the U.S., under anExecutive Order issued by President Obama, installed additional economic sanctions on already-sanctioned North Korea for the hack,[92] which North Korean officials called out as "groundlessly stirring up bad blood towards" the country.[93]
Cyber security expert Kurt Stammberger from cyber security firm Norse,[94][95] DEFCON organizer andCloudflare researcher Marc Rogers,[96]Hector Monsegur,[97] andKim Zetter, a security journalist atWired magazine,[98] have expressed doubt and tended to agree that North Korea might not be behind the attack.
Michael Hiltzik, a journalist for theLos Angeles Times, said that all evidence against North Korea was "circumstantial" and that some cybersecurity experts were "skeptical" about attributing the attack to the North Koreans.[99] Cybersecurity expert Lucas Zaichkowsky said, "State-sponsored attackers don't create cool names for themselves like 'Guardians of Peace' and promote their activity to the public."[100]Kim Zetter ofWired magazine called released evidence against the government "flimsy".[101] Former hackerHector Monsegur, who once hacked into Sony, explained toCBS News that exfiltrating one or one hundredterabytes of data "without anyone noticing" would have taken months or years, not weeks. Monsegur doubted the accusations due to North Korea's insufficient internet infrastructure to handle the transfer of that much data. He believed that it could have been either Chinese, Russian, or North Korean-sponsored hackers working outside of the country, but most likely to be the deed of a Sony employee.[102]
Stammberger provided to the FBI Norse's findings that suggest the hack was aninside job, stating, "Sony was not just hacked; this is a company that was essentially nuked from the inside. We are very confident that this was not an attack master-minded by North Korea and that insiders were key to the implementation of one of the most devastating attacks in history."[103] Stammberger believes that the security failure may have originated from six disgruntled former Sony employees, based on their past skill sets and discussions these people made in chat rooms. Norse employees identified these people from a list of workers that were eliminated from Sony during a restructuring in May 2014, and noted that some had made very public and angry responses to their firing, and would be in appropriate positions to identify the means to access secure parts of Sony's servers.[104][105] After a private briefing lasting three hours, the FBI formally rejected Norse's alternative assessment.[106]
Seth Rogen also expressed doubts about the claims that North Korea was behind the hack. Based on the timeline of events and the amount of information hacked, he believes the hack may have been conducted by a Sony employee. "I've also heard people say that they think someone was hired to do the hack as a way of getting Amy Pascal fired. I don't know if I subscribe to those theories, but I kind of don't think it was North Korea."[107]
In response to allegations that the intrusion was the result of an inside job, or something other than a state-sponsored cyber attack, computer forensic specialist Kevin Mandia, president of the security firmFireEye, commented that there was not a "shred of evidence" that an insider was responsible for the attack and that the evidence uncovered by his security firm supports the position of the United States government.[108][109]
In February 2016, analytics firm Novetta issued a joint investigative report into the attack. The report, published in collaboration withKaspersky Lab,Symantec,AlienVault,Invincea,Trend Micro,Carbon Black, PunchCyber,RiskIQ,ThreatConnect and Volexity, concluded that a well-resourced organization had committed the intrusion, and that "we strongly believe that the SPE attack was not the work of insiders or hacktivists". The analysis said that the same group is engaged in military espionage campaigns.[110][111][112]
Because of the depth and scope of malware tools, structure of the analyzed code bases, TTP overlap with similar attacks, and long trail of activities attributed to theLazarus Group, Novetta does not believe that the SPE attack was carried out by insiders or hacktivists, but rather by a more structured, resourced, and motivated organization. ... Although our analysis cannot support direct attribution of a nation-state or other specific group due to the difficulty of proper attribution in the cyber realm, the FBI's official attribution claims could be supported by our findings.[113]
The U.S. Department of Justice issued formal charges related to the Sony hack on North Korean citizenPark Jin-hyok on September 6, 2018. The Department of Justice contends that Park was a North Korean hacker that worked for the country'sReconnaissance General Bureau, the equivalent of theCentral Intelligence Agency. The Department of Justice also asserted that Park was partially responsible for arranging theWannaCry ransomware attack of 2017, having developed part of the ransomware software. The Department of Justice had previously identified Park and had been monitoring him for some time, but could not indict him immediately as much of the information around him was classified.[114] The Criminal Complaint was unsealed by the US Department of Justice via a press release in September 2018.[115]
Obama also issued a legislative proposal to Congress to update current laws such as theRacketeer Influenced and Corrupt Organizations Act and introduce new ones to allow federal and national law enforcement officials to better respond to cybercrimes like the Sony hack, and to be able to prosecute such crimes compatibly to similar off-line crimes, while protecting the privacy of Americans.[116][117]
In December 2014, Sony requested that the media stop covering the hack.[5] Sony also threatened legal action if the media did not comply, but according to law professorEugene Volokh, Sony's legal threats are "unlikely to prevail".[118] Sony then threatened legal action againstTwitter if it did not suspend accounts of people who posted the hacked material.[119] American screenwriterAaron Sorkin wrote anop-ed forThe New York Times opining that the media was helping the hackers by publishing and reporting on the leaked information.[120] On December 18,Reddit banned thesubredditr/SonyGOP that was being used to distribute the hacked files.[121]
The threats made directly at Sony overThe Interview were seen by many as a threat to free speech. The decision to pull the film was criticized by several Hollywood filmmakers, actors, and television hosts, includingBen Stiller,Steve Carell,Rob Lowe,Jimmy Kimmel andJudd Apatow.[122][123] Some commentators contrasted the situation to the non-controversial release of the 2004Team America: World Police, a film that mocked the leadership of North Korea's prior leader,Kim Jong Il.[124] TheAlamo Drafthouse was poised to replace showings ofThe Interview withTeam America until the film's distributorParamount Pictures ordered the theaters to stop.[125]
In light of the threats made to Sony overThe Interview,New Regency cancelled its March 2015 production plans for a film adaptation of the graphic novelPyongyang: A Journey in North Korea, which was set to starSteve Carell.[126]Hustler announced its intentions to make apornographic parody film ofThe Interview.Hustler founderLarry Flynt said, "If Kim Jong-un and his henchmen were upset before, wait till they see the movie we're going to make".[127]
In China, the media coverage of the hackings has been limited and outside sources have been censored. A search for "North Korea hack" onBaidu, China's leading search engine returned just one article, which named North Korea as "one of several suspects." However, Google, which was and is inaccessible in China, returned more than 36 million results for the same query.Hua Chunying, a spokeswoman of foreign affairs, "shied away from directly addressing" the Sony hacking situation.[128]