Home / Channel / Playstation hack came from Amazon EC2

Playstation hack came from Amazon EC2

Bloomberg news have reported that the hackers who breached the Sony Playstation Network security used Amazon's web services cloud to launch the attack.

According to the story, the hacker(s) rented a server from Amazon's EC2 service and breached the network from there, mentioning an unnamed person with knowledge of the matter. The hackers obviously supplied fake information to Amazon. This account has subsequently been closed.

Amazon and Sony have yet to comment on these claims. Bloomberg have not detailed how Amazon's Cloud was used to handle the attack on Sony, but it would appear that Amazon's Cloud has been used before for similar activities.

Thomas Roth, a german security researcher highlighted that by tapping into the EC2 service, he could crack Wi-Fi passwords in a fraction of the time of using his own computing equipment. For a cost of around £1 he used special ‘Cluster GPU Instances' of the Amazon Cloud to carry out brute force cracks which allowed him to access a WPA-PSK protected network in about 20 minutes.

Another famous instance with the ZeuS banking trojan used similar methods, tapping into the Amazon service as a command and control channel which could issue updates and instructions to computers which were infected by the malware.

Sony have not yet commented saying “We’re continuing to work with law enforcement in an ongoing investigation into the situation. As such, we will not comment further on this matter.”

KitGuru says: Using the cloud to mount attacks. Its rather devious and just as clever.

Become a Patron!

Check Also

Montech HyperFlow Silent 360 AIO Cooler – UPDATE 16 March 25

As some of you may have seen, this week we published a review of the Montech HyperFlow Silent 360 AIO cooler, both on the KitGuru website and our YouTube channel. In this review we explained that the HyperFlow Silent 360 AIO cooler has some issues in regards to the new AMD mounting system that Montech adopted...

We've noticed that you are using an ad blocker.

Thank you for visiting KitGuru. Our news and reviews teams work hard to bring you the latest stories and finest, in-depth analysis.

We want to be as informative as possible – and to help our readers make the best buying decisions. The mechanism we use to run our business and pay some of the best journalists in the world, is advertising.

If you want to support KitGuru, then please add www.kitguru.net to your ad blocking whitelist or disable your adblocking software. It really makes a difference and allows us to continue creating the kind of content you really want to read.

It is important you know that we don’t run pop ups, pop unders, audio ads, code tracking ads or anything else that would interfere with the KitGuru experience. Adblockers can actually block some of our free content, such as galleries!