News

Did Hackers Use Amazon's Cloud Service To Attack PlayStation Network?

Bloomberg News is reporting this morning that the hackers who attacked Sony's PlayStation Network -- which was down for almost a month -- used Amazon's cloud service to stage their attacks.

The reporters who wrote the Bloomberg report cite an anonymous source "with knowledge of the matter" for the information. An Amazon spokesperson contacted by Bloomberg to confirm or deny the information declined to comment.

According to the source, the hackers used Amazon's Elastic Computer Cloud (EC2) to stage the attacks, but did "not hack into Amazon" -- meaning that they paid to rent the cloud service. (EC2's servers can be rented by the hour.)

The account, set up under a "bogus name," has since been disabled.

The Bloomberg article does not say whether or not the EC2 service was just one (or the only) of the staging areas used in the attack.

Sony has also not issued a statement about the report. Its PlayStation network, brought down last month, just came back up this past weekend.

About the Author

Becky Nagel is the vice president of Web & Digital Strategy for 1105's Converge360 Group, where she oversees the front-end Web team and deals with all aspects of digital strategy. She also serves as executive editor of the group's media Web sites, and you'll even find her byline on PureAI.com, the group's newest site for enterprise developers working with AI. She recently gave a talk at a leading technical publishers conference about how changes in Web technology may impact publishers' bottom lines. Follow her on twitter @beckynagel.

Featured

  • Exploring OCR, a New Way To Get Data into Excel

    Microsoft recently added a new optical character recognition feature to Excel that lets users import data from a photograph taken from a smartphone. Here's how to use it.

  • Microsoft Authenticator App To Get Real-Time Phishing Protections

    Microsoft is working on adding capabilities to its Microsoft Authenticator app to help defeat security breaches enabled by advanced attack techniques, including phishing and man-in-the-middle methods.

  • A Quicker Way To Create Hyper-V Inventory Reports

    If you need to generate Hyper-V inventory reports but don't want the hassle of writing your own custom PowerShell script, here is a shortcut.

  • Microsoft Previews New Azure Active Directory Roles and Bulk Management Capability

    Microsoft this week announced a couple of noteworthy previews of new capabilities for IT pros using the Azure Active Directory identity and access management service.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.