LONDON - Another massive data breach at Sony has left hackers exulting, customers steaming and security experts questioning why basic fixes haven't been made to the company's stricken cybersecurity program.
Hackers say they managed to steal a massive trove of personal information from Sony Pictures' website using a basic technique which they claim shows how poorly the company guards its users' secrets. Security experts agreed Friday, saying that the company's security was bypassed by a well-known attack method by which rogue commands are used to extract sensitive data from poorly-constructed websites.
"Any website worth its salt these days should be built to withstand such attacks," said Graham Cluley, of Web security firm Sophos. Coming on the heels of a massive security breach that compromised more than 100 million user accounts associated with Sony's PlayStation and online entertainment networks, Cluley said the latest attack suggested that hackers were lining up to give the company a kicking.
"They are becoming the whipping boy of the computer underground," he said.
Culver City, California-based Sony Pictures has so far declined to comment beyond saying that it is looking into the reported attack -- which saw many users' names, home addresses, phone numbers, emails, and passwords posted on the Web.
It wasn't clear how many people were affected. The hackers, who call themselves Lulz Security -- a reference to the Internetspeak for "laugh out loud"_ boasted of compromising more than 1 million users' personal information -- although it said that a lack of resources meant it could only leak a selection on the Web. Their claim could not be independently verified, but several people whose details were posted online confirmed their identities to The Associated Press.
The group ridiculed Sony for the ease with which it stole the data, saying that the company stored peoples' passwords in a simple text file -- something it called "disgraceful and insecure."
Several emails sent to accounts associated with the hackers as well as messages posted to the microblogging site Twitter were not returned, but in one of its tweets Lulz Security expressed no remorse.
"Hey innocent people whose data we leaked: blame Sony," it said.
Sony's customers -- many of whom had given the company their information for sweepstakes draws -- appeared to agree.
Tim Rillahan, a 39-year-old computer instructor in Ohio, said he was extremely upset to find email address and password posted online for "the whole world to see."
"I have since been changing my passwords on every site that uses a login," he said in an email Friday. "Sony stored our passwords in plain text instead of encrypting the information. It shows little respect to us, their customers."
He and others complained that they had yet to hear from the company about the breach, news of which is nearly a day old.
John Bumgarner, the chief technology officer for the U.S. Cyber Consequences Unit -- a research group devoted to monitoring Internet threats -- was emphatic when asked whether users' passwords could be left unencrypted.
"Never, never, never," he said. "Passwords should always be hashed. Some kind of encryption should be used."
Bumgarner, who's been critical of Sony's security in the past, said the company needed to take a hard look at how it safeguards its data.
"It's time for Sony to press reset button on their cybersecurity program before another incident occurs," he said.