Has anyone seen any evidence that North Korea hacked Sony?

ShootSpeeders

Gold Member
May 13, 2012
20,232
2,363
280
Of course not. There's never any evidence in hacking cases. The "authorities" just tell us this is what happened and the sheep believe it even though obozo has proved himself to be a pathological liar.
 
Of course not. There's never any evidence in hacking cases. The "authorities" just tell us this is what happened and the sheep believe it even though obozo has proved himself to be a pathological liar.
Why are you kissing NK's ass? What makes them better than Cuba? Your entire political theory seems to be, if Obama goes one way, I'll go the other!!! :cuckoo:
 
Of course not. There's never any evidence in hacking cases. The "authorities" just tell us this is what happened and the sheep believe it even though obozo has proved himself to be a pathological liar.
Why are you kissing NK's ass? What makes them better than Cuba? Your entire political theory seems to be, if Obama goes one way, I'll go the other!!! :cuckoo:


konradv, you're wasting your time with this sack of shit...
 
N Korea 'could be linked to bank heists'...
confused.gif

N Korea could be linked to cyber-attacks on banks, security firm says
Fri, 27 May 2016 | A top cyber-security firm is investigating whether North Korea could be linked to attacks on banks in recent months.
Symantec said it had evidence that the same group attempted to steal money from a bank in the Philippines, one in Vietnam and Bangladesh's central bank. It also said the rare malware deployed was similar to that used in the hacking of Sony Pictures in 2014. The US government said North Korea was behind the Sony hack. If North Korea is found to be behind the bank attacks, it would be the first time a country has been detected stealing money in a cyber-attack, Symantec's technical director Eric Chien told Reuters.

In February this year, hackers stole $81m (£55m) from the central bank of Bangladesh. According to Symantec, it was the same group that attempted to steal $1m from the Tien Phong Bank in Vietnam and attacked a bank in the Philippines. In addition, the code shares similarities with malware used by the group known as Lazarus which has been accused of various attacks on the US and South Korea, including the attacks against Sony Pictures Entertainment.

Hard task: By Mark Ward, BBC Technology correspondent

On the internet, no-one knows if you are a dog and they have an equally difficult time working out what kind of cyber thief you are too. It is common for online criminals to take attack code from other groups and bend it to their own malign purposes. They do it to cover their tracks and because what worked well against one target might work for them too.

That code-sharing is less true when it comes to nation-state attacks which is why some security firms will name those they believe are behind these relatively rare intrusions. Typically the code used in these attacks is more about stealthy spying than outright theft so is less useful to those after cash. But that is not the case here as the code has been used to target bank networks and go after huge amounts of money. But it is difficult to be sure because code is code and once it is widely disseminated online it becomes harder to see who is behind the keyboard.

N Korea could be linked to cyber-attacks on banks, security firm says - BBC News
 
I saw the evidence. Here is an excerpt.

OPEN "fuck_sony" FOR OUTPUT AS #3

CLOSE #3

open_slave file$

target_record% = indexarray%(topline%+pickline%)


OPEN "ar.dba" FOR RANDOM ACCESS READ WRITE SHARED AS #10 LEN = 177

FIELD #10,12 AS Zlabor_chg$,12 AS Zpart_chg$,10 AS ZTax_chg$, _

20 AS Zrecd_date$,10 AS Zepa_chg$,10 AS Zar_vara1$,10 AS Zar_vara2$, _

10 AS Zclient_index$,20 AS Zar_vara3$,2 AS Zar_vara4$,1 AS Zar_vara5$, _

10 AS Zar_vara6$,10 AS Zar_vara7$,8 AS Zar_vara8$,10 AS Zar_client_owner$, _

10 AS Zpayment$,12 AS Zar_vara9$


Zar_reca% = LOF(10) /177

Delete "fuck_sony" _$

FOR delete_rec% = 1 TO target_record% -1

GET #8,delete_rec%

LSET Zlabor_chg$ = labor_chg$

LSET Zpart_chg$ = part_chg$

LSET Ztax_chg$ = tax_chg$

LSET Zrecd_date$ = recd_date$

LSET Zepa_chg$ = epa_chg$

LSET Zar_vara1$ = ar_vara1$

LSET Zar_vara2$ = ar_vara2$

LSET Zclient_index$ = client_index$

LSET Zar_vara3$ = ar_vara3$

LSET Zar_vara4$ = ar_vara4$

LSET Zar_vara5$ = ar_vara5$

LSET Zar_vara6$ = ar_vara6$

LSET Zar_vara7$ = ar_vara7$

LSET Zar_vara8$ = ar_vara8$

LSET Zar_client_owner$ = ar_client_owner$

LSET Zpayment$ = payment$

LSET Zar_vara9$ = ar_vara9$


PUT #10,delete_rec%


NEXT



FOR delete_rec% = target_record% +1 TO ar_reca%


GET #8,delete_rec%


LSET Zlabor_chg$ = labor_chg$

LSET Zpart_chg$ = part_chg$

LSET Ztax_chg$ = tax_chg$

LSET Zrecd_date$ = recd_date$

LSET Zepa_chg$ = epa_chg$

LSET Zar_vara1$ = ar_vara1$

LSET Zar_vara2$ = ar_vara2$

LSET Zclient_index$ = client_index$

LSET Zar_vara3$ = ar_vara3$

LSET Zar_vara4$ = ar_vara4$

LSET Zar_vara5$ = ar_vara5$

LSET Zar_vara6$ = ar_vara6$

LSET Zar_vara7$ = ar_vara7$

LSET Zar_vara8$ = ar_vara8$

LSET zar_client_owner$ = ar_client_owner$

LSET Zpayment$ = payment$

LSET Zar_vara9$ = ar_vara9$


PUT #10,delete_rec% -1


NEXT



CLOSE

KILL file$+".trn"

NAME "ar.dba" AS file$+".trn"



target_record% = (topline%+pickline%)


OPEN file$+".p" FOR RANDOM ACCESS READ WRITE SHARED AS #2 LEN = 70

FIELD #2,10 AS pay$,10 AS owner$,20 AS indate$,10 AS var1$,10 AS var2$,10 AS var3$

rec% = LOF(2) /70

OPEN file$+".pt" FOR OUTPUT AS #6

CLOSE #6


OPEN file$+".pt" FOR RANDOM ACCESS READ WRITE SHARED AS #6 LEN = 70

FIELD #6,10 AS zpay$,10 AS zowner$,20 AS zindate$,10 AS zvar1$,10 AS zvar2$,10 AS zvar3$

rect% = LOF(6) /70


del_count% = 0


FOR deletefile% = 1 TO rec%

GET #2,deletefile%

IF VAL(owner$) < > target_record% THEN

INCR del_count%

LSET zpay$ = pay$

IF VAL(owner$) > target_record% THEN

new_val% = VAL(owner$) - 1

LSET zowner$ = STR$(new_val%)

ELSE

LSET zowner$ = owner$

END IF


LSET zindate$ = indate$

LSET zvar1$ = var1$

LSET zvar2$ = var2$

LSET zvar3$ = var3$

PUT #6,del_count%

END IF


NEXT

CLOSE


KILL file$+".p"

NAME file$+".pt" AS file$+".p"

END "Fuck_Sony"
 

Forum List

Back
Top