Close Menu
Technotification
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Technotification
    • Home
    • News
    • How To
    • Explained
    • Facts
    • Lists
    • Programming
    • Security
    • Gaming
    Technotification
    Home › News › Sony tries to fight back against hackers, new threats incoming

    Sony tries to fight back against hackers, new threats incoming

    By Ananth TalamDecember 3, 2022
    Facebook Twitter Reddit LinkedIn
    sony ddos

    Sony Pictures may not be in the position indolently while its corporate data is being spread all over the internet, following the shocking hack of its servers in late November.

    According to a reports and rumors which say two anonymous sources that the company is using Amazon Web Services servers in Tokyo and Singapore to execute a DDoS (denial of service) attack on the servers’ contribution its corporate data. A DoS attack generally uses many servers to cloud another server with data, rendering it slow or completely not viable.

    sony pictures gop warning message
    It’s hard-hitting to tell if Sony Pictures is really using such an attack, and the company would not confirm it yet. It’s probable, although: A similar tactic which was used in the Napster days, when entertainment groups hired professional companies to slow down downloads of popular copyrighted files, daunting people from trying to illegally obtain such files.

    If this is true, it will definitely sound like a pretty anxious move by Sony. On the internet, once the rat is out of the bag, it’s very hard to control the spread of information as it was proven in the recent leak of celebrity nude photos in September.

    Sony is dealing this attack at its best, while a lot of the torrent files leading to Sony data were removed from the respective torrent sites that held them. One of the latest files from the Sony hack only took a couple of minutes to download; the files were kept so handily.

    Re/Code’s report claims that hackers are thwarting Sony’s attacks by using a different type of file for the newer leaks. But we’ve tried downloading using one of the older torrent files, and the result was the same — we had the data within minutes.

    If Sony really is using counter steps against hackers that purloin its data, it’s not that shocking: It’s perhaps doing all it can to stop the leaking more. Unluckily for Sony, making a download process annoying for someone wanting to download a Metallica album is very diverse from trying to stop a hacker group or a rival from getting corporate data that’s (was) much out in the open to all.

    GOP

    The Guardians of Peace, the hacker group that attacked Sony’s servers, has been time after time releasing new stuff of Sony’s corporate data in the last ten days. The data included Sony’s unreleased movies, financial info, scripts for and personal data of business execs and celebrities.

    THE LATEST MESSAGE FROM THE ‘GUARDIANS OF PEACE’ HACKERS

    We have already given our clear demand to the management team of SONY, however, they have refused to accept.

    It seems that you think everything will be well, if you find out the attacker, while no reacting to our demand.

    We are sending you our warning again.

    Do carry out our demand if you want to escape us.

    And, Stop immediately showing the movie of terrorism which can break the regional peace and cause the War!

    You, SONY & FBI, cannot find us.

    We are perfect as much.

    The destiny of SONY is totally up to the wise reaction & measure of SONY.

     

    Share. Facebook Twitter LinkedIn Tumblr Reddit Telegram WhatsApp
    Ananth Talam
    • Facebook

    Ananth Talam is a professional blogger, gamer and content developer who develops creative content based on technology, human emotions and entertainment by day. With coffee running through his veins, he enthusiastically battles each day, two shots at a time.

    Related Posts

    NVIDIA GeForce NOW is Finally Coming to India

    January 8, 2025

    The Psychology of a Phishing Email: How Scammers Play with Your Mind

    July 16, 2024

    9 Essential Elements of a Strong Cyber Security Management System

    July 3, 2024

    Common Cyber Attacks and How to Prevent Them

    July 3, 2024

    How Cyber Security Paid Training Prepares You for Real-World Threats

    June 13, 2024

    The Role of Security in Server Colocation Environments

    March 12, 2024
    Lists You May Like

    10 Best RARBG Alternative Sites in April 2025 [Working Links]

    April 1, 2025

    10 Sites to Watch Free Korean Drama [2025 Edition]

    January 2, 2025

    The Pirate Bay Proxy List in 2025 [Updated List]

    January 2, 2025

    10 Best Torrent Search Engine Sites (2025 Edition)

    February 12, 2025

    10 Best GTA V Roleplay Servers in 2025 (Updated List)

    January 6, 2025

    5 Best Torrent Sites for Software in 2025

    January 2, 2025

    1337x Alternatives, Proxies, and Mirror Sites in 2025

    January 2, 2025

    10 Best Torrent Sites for eBooks in 2025 [Working]

    January 2, 2025

    10 Best Anime Torrent Sites in 2025 [Working Sites]

    January 6, 2025

    Top Free Photo Editing Software For PC in 2025

    January 2, 2025
    Pages
    • About
    • Contact
    • Privacy
    • Careers
    Privacy

    Information such as the type of browser being used, its operating system, and your IP address is gathered in order to enhance your online experience.

    © 2013 - 2025 Technotification | All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.