{"id":1093,"date":"2014-12-03T17:00:33","date_gmt":"2014-12-03T22:00:33","guid":{"rendered":"http:\/\/journals.law.harvard.edu\/jsel\/?p=1093"},"modified":"2023-07-25T12:18:30","modified_gmt":"2023-07-25T16:18:30","slug":"sony-pictures-hack","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/jsel\/2014\/12\/sony-pictures-hack\/","title":{"rendered":"Sony Pictures Hack"},"content":{"rendered":"<p>According to <a href=\"http:\/\/www.foxnews.com\/tech\/2014\/12\/02\/malware-fuels-growing-suspicion-that-north-korea-hacked-sony-pictures\/\" target=\"_blank\" rel=\"noopener\">Fox News<\/a>, there may be a connection between the hack on Sony Pictures\u2019 computer network and North Korea. Apparently, the malware that was placed on the computers was written in Korean; however, some think that this was a purposeful attempt to confuse investigators as to the origin of the attack. Authorities still are uncertain whether the malware was physically imbedded into the network or introduced remotely. Many have been suspicious of the motive behind the attack\u2014that it may have been in response to Sony\u2019s upcoming film, \u201cThe Interview,\u201d in which James Franco and Seth Rogen attempt to assassinate Kim Jong-un.<\/p>\n<p>Further, the attack has been labeled \u201cwiper malware\u201d and is known to \u201coverwrite data and interrupt execution processes.\u201d This kind of attack is the first of its kind, in that it destroys data instead of implementing denial of service attacks or stealing financial data. It also is not designed to attack a particular type of machine or computer.<\/p>\n<p>The attack took place on November 24<sup>th<\/sup>, by a group called Guardians of the Peace. The group threatened to release confidential information about Sony if its demands were not met. This resulted in the leak of 5 films online, including the upcoming films \u201cAnnie\u201d and \u201cFury,\u201d as well as a release of a list of Sony executives and their salaries on Monday, December 1<sup>st<\/sup>.<\/p>\n<p>The FBI is continuing its investigation into the source of the attack, and prevention measures.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to Fox News, there may be a connection between the hack on Sony Pictures\u2019 computer network and North Korea. Apparently, the malware that was placed on the computers was written in Korean; however, some think that this was a purposeful attempt to confuse investigators as to the origin of the attack. Authorities still are [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":1094,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[31],"tags":[15,66,65],"ppma_author":[382],"class_list":["post-1093","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-highlight","tag-entertainment-2","tag-hack","tag-internet"],"jetpack_featured_media_url":"https:\/\/journals.law.harvard.edu\/jsel\/wp-content\/uploads\/sites\/78\/2014\/12\/387px-Sony_pictures_logo.png","jetpack_shortlink":"https:\/\/wp.me\/peZjrR-hD","jetpack_sharing_enabled":true,"authors":[{"term_id":382,"user_id":39,"is_guest":0,"slug":"jsel","display_name":"JSEL","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/4abb87a025d5a7951a4b4249facf4d22ea8002b216770229a96689038d0f83bc?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/jsel\/wp-json\/wp\/v2\/posts\/1093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/jsel\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/jsel\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/jsel\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/jsel\/wp-json\/wp\/v2\/comments?post=1093"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/jsel\/wp-json\/wp\/v2\/posts\/1093\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/jsel\/wp-json\/wp\/v2\/media\/1094"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/jsel\/wp-json\/wp\/v2\/media?parent=1093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/jsel\/wp-json\/wp\/v2\/categories?post=1093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/jsel\/wp-json\/wp\/v2\/tags?post=1093"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/jsel\/wp-json\/wp\/v2\/ppma_author?post=1093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}