Sony Pictures Hack: A
Cybersecurity Disaster
The 2014 Sony Pictures hack shocked the industry. It exposed
sensitive data and disrupted operations globally. This presentation
reveals the timeline, attackers, impact, and lessons from this
unprecedented cyberattack.
PRESENTED BY
TOSHITH
1JS24IS169
Timeline of Events: From
Intrusion to Exposure
1 Nov 2014
Initial breach detected, signs of malware infection
emerge.
2 Dec 2014
Hackers demand ransom; threats escalate to data
leaks.
3 Late Dec 2014
Massive leaks begin: emails, private data, unreleased
films.
4 Early 2015
Internal investigations grow; reputational damage
spreads.
Who Was Behind the Attack? Unveiling the
Guardians of Peace
Guardians of Peace North Korean Ties Motivations
The group claimed U.S. officials linked the attack Retaliation for controversial
responsibility, threatening to North Korean state actors. film portraying North Korea.
Sony over content.
The Malware Used: A
Deep Dive into
Destructive Tools
Wiper Malware Data Theft Malware
Erased data, disabling Extracted confidential files
systems and backups. and emails stealthily.
Destructive Payload
Designed to cause system downtime and chaos.
Data Breach Impact: Stolen Films, Emails,
and Personal Information
Stolen Films Private Emails Employee Data
• Unreleased movies leaked online • Exposed executive conversations • Personal info leaked, risking
early • Triggered PR crises and lawsuits • privacy
Heightened concerns over
• Disrupted theatrical release cybersecurity
plans
Sony's Response: Crisis Management and Legal
Battles
Immediate Action
Systems shut down, breach containment prioritized.
Public Relations
Damage control through public statements and transparency.
Legal Response
Filing lawsuits against attackers and managing internal claims.
Upgrading Security
Invested heavily in cybersecurity infrastructure post-attack.
Long-Term Effects: Sony's Recovery and
Reputation
Recovery Rebuilding Trust
Enhanced security protocols 1 Transparent communication with
implemented company-wide. 2 partners and employees.
Industry Influence Innovation Focus
4
Case study for cyber defense 3 New investments in digital
strategies across media firms. transformation and resilience.
Lessons Learned: Industry-Wide Cybersecurity
Implications
Incident Preparedness
Data Encryption Develop and rehearse
Employee Training Protect sensitive data at rest response plans regularly.
Prioritize Network Prevent social engineering and in transit.
Security and insider threats.
Continuous monitoring and
intrusion detection are
crucial.