• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Sony Rebuilding PlayStation Network (PSN) – Down 4 Days So Far

April 25, 2011

Views: 7,551

There’s been a few big stories in the past few days, one is of course the whole iPhone geo-location data tracking thing – but everyone was too busy checking into Foursquare to complain about that.

The other is that the Sony PlayStation Network (PSN) basically got hacked, owned and raped. It’s still currently down and according to Sony is being completely rebuilt to be more secure, so far it’s been down for 4 days.

The outage of Sony’s PlayStation Network and Qriocity service, now in its fourth day, looks set to continue after the company said on Sunday that it is “rebuilding” its system to better guard against attacks.

Sony said on Saturday that the outage was caused by an “external intrusion” into the network, but has yet to detail the problem.

The PlayStation Network is used for PlayStation 3 online gaming and sales of software to consoles and the PlayStation Portable. The Qriocity service runs on the same network infrastructure and provides audio and video to Sony consumer electronics products. The latest update, while not explaining the intrusion, pointed towards it being relatively sophisticated.

“Our efforts to resolve this matter involve rebuilding our system to further strengthen our network infrastructure,” the company said in a statement. “Though this task is time-consuming, we decided it was worth the time necessary to provide the system with additional security.”

I bet there’s a lot of gaming addicts out there jonesing to get their fix, I’d imagine it’s a top priority for Sony to get this back up and running especially as they were planning to major updates. They haven’t as yet given any kind of indication as to how long it’s going to take them to fix it.

I’d estimate they should be done before the end of this week, more than 7 days down is suicide for this kind of online model.

Sony said it is “working around the clock to bring them both back online,” but didn’t say when they might return. Phone calls to the company’s Tokyo headquarters went unanswered on Sunday.

“We thank you for your patience to date and ask for a little more while we move towards completion of this project,” the statement said.

The outage has left PlayStation 3 owners unable to play online games. Networked gaming, in which gamers collaborate with others in real-time battles, challenges and quests, is very popular and typically enjoyed by millions, especially over the weekend.

I’d imagine we’ll be seeing some kinda of announcement by Sony about this fairly shortly – they can’t be leaving millions of frustrated gamers in the dark. I’d be interested to see some kind of details regarding the intrusion too.

How did they get in? How serious was it? Did they use some kind of mythical 0-day exploit?

From what we know about Sony though, I wouldn’t hold your breath on the details..

Source: Network World

Related Posts:

  • Systemic Ransomware Events in 2025 - How Jaguar Land…
  • An Introduction To Web Application Security Systems
  • TeamViewer Hacked? It Certainly Looks Like It
  • Initial Access Brokers (IAB) in 2025 - From Dark Web…
  • Uber Paid Hackers To Hide 57 Million User Data Breach
  • Kiev Power Outage Linked To Cyber Attacks
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Hacking News Tagged With: ps3, ps3 security, psn, Security, sony, sony hack, sony playstation network, sony psn, sony security



Reader Interactions

Comments

  1. Ashley Burton says

    April 25, 2011 at 3:59 pm

    Seems like a pretty serious breach, I assume that when they said “we decided it was worth the time necessary to provide the system with additional security” that they didn’t have an option since the attacker(s) would simply repeat the attack or exploit the next in a series of vulnerabilities.

    With a bit of luck we’ll get an explanation for how it all happened, though if it’s an embarrassing security hole and no actual data has been lost/misappropriated I can imagine them just keeping quiet.

  2. DeborahS says

    April 26, 2011 at 7:37 am

    Wonder if it had anything to do with Anonymous’ LOIC DDOS attacks to voice their disapproval of Sony’s “persecution” of the hacker who figured out how to restore OtherOS (or something like that, I don’t remember all the details). I read that they weren’t any too happy when Sony said they were going to bring in some big security guns to prevent them from succeeding with any more DDOS-ing. Last I heard, Anonymous was plotting their little IRC hearts out about what they would do if Sony did that.

    I of course have absolutely no idea, but I wonder… The timing seems a little bit too exact to be purely coincidence, but then you never know about these things.

    • Darknet says

      April 26, 2011 at 8:09 am

      AnonOps have confirmed they were not involved in this attack. Of course they can’t categorically state that someone from Anonymous hasn’t worked alone on this. But the main collective wasn’t behind this attack (although you are right, they do currently have a cyber jihad against Sony).

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 897

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 910

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 525

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 1,859

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 595

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 623

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,407,099)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,938)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,385)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,209)
  • Password List Download Best Word List – Most Common Passwords (934,468)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,179)
  • Hack Tools/Exploits (674,121)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,182)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy