US | probe links NKorea to Sony hacking

A banner for "The Interview"is posted outside Arclight Cinemas

A banner for “The Interview”is posted outside Arclight Cinemas

 

Federal investigators have now connected the hacking of Sony Pictures Entertainment Inc. to North Korea, a U.S. official said yesterday (Macau time), though it remained unclear how the federal government would respond to a break-in that exposed sensitive documents and ultimately led to terrorist threats against moviegoers.
The official, who said a more formal statement could come in the near future, spoke on condition of anonymity because the official was not authorized to openly discuss an ongoing criminal case.
Until yesterday, the Obama administration had been saying it was not immediately clear who might have been responsible for the computer break-in, with FBI Director James Comey last week saying there was still more work to be done. North Korea has publicly denied it was involved.
The unidentified hackers had demanded that Sony cancel its release of the movie “The Interview,” a comedy starring Seth Rogen and James Franco that included a gruesome scene depicting the assassination of North Korea’s leader. Sony canceled the Dec. 25 release, citing the threats of violence at movie theaters showing the movie, and the studio later said there were no further plans to release the film.
The disclosure about North Korea’s involvement came just after Sony hired FireEye Inc.’s Mandiant forensics unit, which last year published a landmark report with evidence accusing a Chinese Army organization, Unit 61398, of hacking into more than 140 companies over the years.
Tracing the origins of hacker break-ins and identities of those responsible is exceedingly difficult and often involves surmise and circumstantial evidence, but Mandiant’s work on its highly regarded China investigation provides some clues to its methods.
Investigators will disassemble any hacking tools left behind at the crime scene and — similar to bomb detectives — scour them for unique characteristics that might identify who built or deployed them. Hints about origin might include a tool’s programming code, how or when it was activated and where in the world it transmitted any stolen materials.
In some cases, investigators will trace break-ins by hackers to “command and control” computers or web servers, and logs in those machines or information in Internet registration records might provide further clues about who is behind the hack. Sometimes, hackers using aliases are identified on social media networks or in chat rooms discussing targets or techniques. Mandiant named three Chinese Army hackers, including one known as “Ugly Gorilla.”
The most sophisticated tools or specialized techniques are generally attributed to the work of governments.
It wasn’t immediately clear how the U.S. government was preparing to respond. Bernadette Meehan, National Security Council spokeswoman, said the United States was “considering a range of options.”
The options against North Korea are in some ways limited given that the U.S. already has a trade embargo and almost certainly wouldn’t consider military action, said Martin Libicki, a cybersecurity expert at the U.S. Naval Academy and a Rand Corp. scholar. Eric Tucker & Ted Bridis, Washington , AP

Categories Asia-Pacific