Thursday, December 18, 2014

Sony Break: State hackers or criminals? – TIME ONLINE

Six widely discussed theories about who could be behind the Sony Hack -. And what to make of them

is, however thin. Four folders that were found in the chopped data should have been created on a computer that is used as the language setting Korean. However, this is not a proof, where the computer may have stood still for those who has used it. In addition, the setting can be easily manipulated. Next, the attacker should have used malware that has been assigned to North Korean hackers in previous attacks. But for this assignment missing substantial evidence.

. 2 North Korea wanted to extort SPE

conceivable that would be quite. The regime in Pyongyang is regarded as highly corrupt and acts with criminal methods. Is known, for example, that North Korea is deeply involved in the illegal arms deal.

. 3 North Korea wants to take revenge for the film The Interview and prevent its publication

In satire film The Interview want two TV presenters, comedians played by James Franco and Seth Rogen, the North Korean dictator Kim Jong Un interview. From the CIA they got the job to kill the dictator on this occasion, what they also succeed. The dictator is clearly visible in the film.

The UN Ambassador of North Korea protested in July against the production, long before the hack. He called the film an act of war, terrorism against North Korea propagating. This is a strong motive.

However, the North Korean leader target of satires were in the past decades and over again. Furthermore, the reaction of the Ambassador of rhetoric, always responded with North Korea criticized corresponds. In a statement, the alleged hacker that CSO online published, it is also stated that the film was not the motive for the hack was.

. 4 North Korea has threatened attacks, the film should be shown

There is no real proof. In the first email of the alleged hacking of Sony, in which they ask for money, the film is not even mentioned. Kim Zeller takes a detailed analysis on Wired to the conclusion that it is equally possible that the hackers could have come only through the extensive coverage on the idea of ​​linking the film with their designs. Or that freeloaders were attracted that could have made this connection.

LikeTweet

No comments:

Post a Comment