• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Sony PlayStation Network Hack Resulted In Stolen User Data & Lawsuit

April 28, 2011

Views: 9,489

So after our report on Monday – Sony Rebuilding PlayStation Network (PSN) – Down 4 Days So Far – news had been spilling out about this whole thing pretty much non-stop. It appears the network is still down and there was some serious data loss including user data for millions of users being stolen.

All kinds of personal data was leaked including birth dates, names, e-mail address and it was originally though the hackers had also got hold of user credit card details.

A funny tweet I saw on the matter was “Hello my name is SONY. I like long walks on the beach, DRM, rootkits and losing your cc info.” from @rodolfor.

Sony is warning its millions of PlayStation Network users to watch out for identity-theft scams after hackers breached its security and plundered the user names, passwords, addresses, birth dates, and other information used to register accounts.

The stolen information may also include payment-card data, purchase history, billing addresses, and security answers used to change passwords, Sony said on Tuesday. The company plans to keep the hacked system offline for the time being, and to restore services gradually. The advisory also applies to users of Sony’s related Qriocity network.

Sony’s stunning admission came six days after the PlayStation Network was taken down following what the company described as an “external intrusion”.

Sony had already come under fire for a copyright lawsuit targeting customers who published instructions for unlocking the game console so it could run games and applications not officially sanctioned by the company. The criticism only grew after Sony lawyers sought detailed records belonging to hacker George Hotz, including the IP addresses of everyone who visited his jailbreaking website over a span of 26 months

What worries me is how much of their data was stored in plain text, I guess they assumed their system and network was so secure it would not be breached. But still, the important stuff should have been behind some kind of encryption layer and things like passwords should be hashed.

There was an official update from them too on the PlayStation blog here:

Update on PlayStation Network and Qriocity

They did warn users to remain vigilant and provided ways on how to be prepared for credit card. There were some rumours going around that PSN users were seeing $10 debits from the credit cards they had linked to their PlayStation accounts.

Hackers howled with displeasure saying they should have a right to modify the hardware they legally own. Sony recently settled that case, but Hotz, whose hacker moniker is GeoHot, has remained highly critical of the company. Many have also objected to the removal of the so-called OtherOS, which allowed PlayStation 3 consoles to run Linux.

Sony’s advisory on Tuesday means that the company was likely storing passwords, credit card numbers, expiration dates, and other sensitive information unhashed and unencrypted on its servers. Sony didn’t say if its website complied with data-security standards established by the Payment Card Industry.

Sony reminded users located in the US that they’re entitled to receive one credit report per year from each of the three major credit bureaus. The company didn’t offer to pay for any sort of credit monitoring service to help ensure the information it lost isn’t used in identity-theft ruses against its users.

“When the PlayStation Network and Qriocity services are fully restored, we strongly recommend that you log on and change your password,” advises a letter that Sony is sending to its users.

The latest news is however that the credit card details are actually encrypted, so they should be safe. The details came from an updated in Q&A format from the PlayStation blog:

Q&A #1 for PlayStation Network and Qriocity Services

Their statement is as follows:

The entire credit card table was encrypted and we have no evidence that credit card data was taken. The personal data table, which is a separate data set, was not encrypted, but was, of course, behind a very sophisticated security system that was breached in a malicious attack.

So the user data is out there but the credit card data should be safe, even if the table was stolen it’s encrypted – let’s hope the hacker didn’t swipe the keys too.

The case has also triggered a lawsuit with a user of the network suing Sony over the data loss, more from Information Week here:

Sony Sued Over PlayStation Network Hack

Source: The Register

Related Posts:

  • Systemic Ransomware Events in 2025 - How Jaguar Land…
  • An Introduction To Web Application Security Systems
  • Privacy Implications of Web 3.0 and Darknets
  • Leveraging OSINT from the Dark Web - A Practical How-To
  • Initial Access Brokers (IAB) in 2025 - From Dark Web…
  • Dark Web Search Engines in 2025 - Enterprise…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Exploits/Vulnerabilities, Legal Issues, Privacy Tagged With: ps3, ps3 security, psn, Security, sony, sony hack, sony playstation network, sony psn, sony security



Reader Interactions

Comments

  1. David Shepherd says

    April 28, 2011 at 7:09 pm

    So the credit card info was encrypted but I have to believe majority of folks use the same passwords for PSN as they would for other services, email, banking and so on. The unencrypted data is far more criminally valuable! You have to use strong passwords that are unique to each system and service. How is the difficult part. I use LastPass

  2. PS3 faggots says

    April 29, 2011 at 2:43 am

    HAHAH THE PS3 SUCKS HAHA

  3. DeborahS says

    April 29, 2011 at 7:24 am

    “if the table was stolen it’s encrypted – let’s hope the hacker didn’t swipe the keys too.”

    This could be why it’s taking Sony so long to scope out the extent of the breach. If the hacker swiped the keys, it might be very difficult to verify that to a reasonable degree of certainty.

  4. Bogwitch says

    April 30, 2011 at 10:48 pm

    Delays, delays, delays. I am quite suprised at the time it is taking for the PSN to become active. Granted, it is a service provided free of charge but I believe it is included in the price of a PS3 and the purchasers of PS3s fully expect to have access to it.
    So, the question for me is WHY it is taking so long (9 days so far) for the PSN to return to functionality. I see a few possibilities.
    1. Their site code is proprietary, the hacker(s) found a way through it and obtained the site code. The network operators were aware of more security issues in their code but had been relying on ‘security through obscurity’, (a false premise) and that obscurity, being removed, would take considerable time to replace.
    2. Their site code is COTS but is unmaintained (for whatever reason) I suspect this is less likely but with a network as large as PSN, it is possible. If they had no mirror reference system to test patching, there would be a huge reluctance to patch the live system. As I said, I think this is unlikely.
    3. Given the litigious nature of Sony and it’s affiliates, they will measure this downtime in cold, hard cash. If they have information leading to who had penetrated the network, they have less incentive to bring the network back in a timely manner, instead, they can sue the perpetrator for the sums lost. I appreciate there will be no payout from the hacker(s) involved although the penalties inflicted by a compliant judiciary will increase with reported losses and the losses, I assume, will be transferred to insurance to cover.
    4. The operators of PSN are _COMPLETELY_ hopeless. Difficult one to believe, since they kept a network serving 77 million people running with a reasonable uptime (I don’t know this for a fact, as I’m not a PS3 owner)
    5. PSN are using this time to implement several significant changes.

    Of course, it is possible to combine some of these theories to come up with what may be the truth, I doubt we’ll ever know for sure.

    On a related note, I was astonished to see Sony release their competition to the iPad 2 during the week, a product launch that would be greatly overshadowed by the PSN shiftstorm (i appreciate that PSN is not directly operated by Sony but there is an association there)
    Anyone want to buy the Sony tablet offering? It’ll probably come with a rootkit fitted prior to shipping :P

  5. Bogwitch says

    May 1, 2011 at 11:56 am

    ….and now, Sony believe the credit card information may have been stolen. Only 10 million though, as not all of the 77 million users had registered a card but it seems that 10 million credit card details is all they had.

    http://venturebeat.com/2011/04/30/sony-says-10m-credit-card-numbers-may-have-been-exposed-fbi-investigating/

    It is also mentioned in the above article that they were using software with a known vulnerability, that stuffs up my ‘bespoke’ theory.

    I get the feeling that a large amount of information is being withheld and is being slowly released, is this a damage limitation exercise? I am truly at a loss as to what Sony are thinking, I guess only time will tell….

    • Darknet says

      May 2, 2011 at 1:01 pm

      Oh dear, it’s really not looking good for them is it?

      • Bogwitch says

        May 4, 2011 at 9:25 am

        Not really. Another 25million accounts now? The slow drip continues…

        • Darknet says

          May 4, 2011 at 11:06 am

          Yah SOE hacked as well, was just writing about that. What do you think about the theory that PSN is powered by Steam?

          • Bogwitch says

            May 5, 2011 at 8:50 am

            Not something I’ve heard, to be honest but then, I’m not heavily into the gaming scene.
            Or did you mean their technology seems so out-dated that it is powered by boiled water?

  6. Hacking Tricks says

    May 9, 2011 at 11:38 am

    My question is… how the hell were they caught off guard…because This is seriously an expensive mistake. And they are claiming the credit card and other vital information of their customers were encrypted. Who the hell is gonna believe that.

  7. DeborahS says

    May 10, 2011 at 7:22 am

    @Hacking Tricks

    The simple answer is that they weren’t “caught off guard”, because they didn’t have any guard posted to begin with. From the reports I’ve read, they may have encrypted their credit card database, but that’s about all they did in the way of security. They didn’t even firewall their servers! Looks like they’re putting some better security in place now, but it’s a bit too late to avoid a major breach.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 1,834

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 1,740

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,120

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 2,835

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,042

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 922

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,424,661)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,078)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,505)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,311)
  • Password List Download Best Word List – Most Common Passwords (934,597)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,333)
  • Hack Tools/Exploits (674,283)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,367)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy