Disney Says Film Hack Threat Was A Hoax

Media production companies are switching to digital production & distribution technologies, making them vulnerable to hackers and extortion. 

Disney's boss Bob Iger has revealed that hackers had threatened to leak one of the studio's new films unless it paid a ransom. He didn't name the film, but it was thought to be Pirates of the Caribbean: Dead Men Tell No Tales.

But now Iger has told Yahoo Finance: "To our knowledge we were not hacked." 

"We decided to take the threat seriously but not react in the manner in which the person who was threatening us had required."

But, he added: "We don't believe that it was real and nothing has happened."

Iger had told employees earlier this month that the hackers had demanded the ransom in bitcoin and that they would release the film online in a series of 20-minute chunks unless it was paid. The Disney boss was keen to stress how technology has benefitted Disney but also said it also presented significant challenges to the film industry.

"In today's world, cyber security is a front burner issue," he said. "We like to view technology more friend than foe... [but] it is also a disruptor."

It is not the first film studio to be threatened with online leaks.

Last month, a group of hackers uploaded the fifth season of Orange is the New Black after Netflix refused to pay a ransom.

Dead Men Tell No Tales is the fifth instalment of the Pirates franchise and will see Johnny Depp's Captain Jack Sparrow return to the ocean alongside Geoffrey Rush and Orlando Bloom.

It was released in cinemas in the US on 26 May.

Mark James, security specialist at IT security company ESET, said: "Anything that has a value will always be a potential victim of theft, either digital or physical. If someone has it and someone wants it then in theory there's a market for it."

BBC:   BBC

You Might Also Read:

Hacker Holds Netflix To Ransom:

French Media’s Emergency Meeting After Isis Hack:

Media Vulnerable To Election Night Cyber-Attack:

US Media Goes Into Overdrive Blaming North Korea for the Sony Hack: Is It Justified?:

 

« UK Cyber Chief: Company Directors Are Devolving Responsibility For Hacks
Workers' Rights v. Robot Jobs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

TraceSecurity

TraceSecurity

TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT governance, risk and compliance (GRC) management solutions.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

Conceptivity +360 Cybersecurity

Conceptivity +360 Cybersecurity

Conceptivity +360 Security addresses advanced cybersecurity and supply chain security issues in policy, regulatory, legislation, standardisation, compliance and project management areas.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

Lynxspring

Lynxspring

Lynxspring provides edge-to-enterprise solutions and IoT technology for intelligent buildings, energy management, equipment control and specialty machine-to-machine applications.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

Intellias

Intellias

Intellias is a trusted technology partner to top-tier organizations and digital natives helping them accelerate their pace of sustainable digitalization.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

SequelNet

SequelNet

SequelNet is an emerging MSP, providing 360° business IT solutions and consulting services.

RAD Security

RAD Security

RAD Security (formerly KSOC) is a cloud native security company that empowers engineering and security teams to drive innovation so they can focus on growth versus security problems.