Disney Says Film Hack Threat Was A Hoax

Media production companies are switching to digital production & distribution technologies, making them vulnerable to hackers and extortion. 

Disney's boss Bob Iger has revealed that hackers had threatened to leak one of the studio's new films unless it paid a ransom. He didn't name the film, but it was thought to be Pirates of the Caribbean: Dead Men Tell No Tales.

But now Iger has told Yahoo Finance: "To our knowledge we were not hacked." 

"We decided to take the threat seriously but not react in the manner in which the person who was threatening us had required."

But, he added: "We don't believe that it was real and nothing has happened."

Iger had told employees earlier this month that the hackers had demanded the ransom in bitcoin and that they would release the film online in a series of 20-minute chunks unless it was paid. The Disney boss was keen to stress how technology has benefitted Disney but also said it also presented significant challenges to the film industry.

"In today's world, cyber security is a front burner issue," he said. "We like to view technology more friend than foe... [but] it is also a disruptor."

It is not the first film studio to be threatened with online leaks.

Last month, a group of hackers uploaded the fifth season of Orange is the New Black after Netflix refused to pay a ransom.

Dead Men Tell No Tales is the fifth instalment of the Pirates franchise and will see Johnny Depp's Captain Jack Sparrow return to the ocean alongside Geoffrey Rush and Orlando Bloom.

It was released in cinemas in the US on 26 May.

Mark James, security specialist at IT security company ESET, said: "Anything that has a value will always be a potential victim of theft, either digital or physical. If someone has it and someone wants it then in theory there's a market for it."

BBC:   BBC

You Might Also Read:

Hacker Holds Netflix To Ransom:

French Media’s Emergency Meeting After Isis Hack:

Media Vulnerable To Election Night Cyber-Attack:

US Media Goes Into Overdrive Blaming North Korea for the Sony Hack: Is It Justified?:

 

« UK Cyber Chief: Company Directors Are Devolving Responsibility For Hacks
Workers' Rights v. Robot Jobs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer is a global law firm with a track record of successfully supporting the world's leading corporations, financial institutions and governments.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

Bufferzone Security

Bufferzone Security

Bufferzone is a patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

Nucleon

Nucleon

Nucleon enables cybersecurity tools, organizations and software developers to become proactive by blocking threats before they become breaches.

Emirates International Accreditation Center (EIAC)

Emirates International Accreditation Center (EIAC)

EIACI is the national accreditation body for the United Arab Emirates. The directory of members provides details of organisations offering certification services for ISO 27001.

Altaro Software

Altaro Software

Altaro provide backup solutions that are intuitive, easy to use, well-priced and backed by outstanding 24/7 support as part of the package.

Raqmiyat

Raqmiyat

Raqmiyat provides end-to-end IT Services and business solutions including consultancy, digital transformation, infrastructure and cybersecurity.

Cyber Security Operations Consulting (CyberSecOp)

Cyber Security Operations Consulting (CyberSecOp)

CyberSecOp is an ISO 27001 Certified Organization which provides cyber security operations services and risk management consulting.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

BluescreenIT (BIT)

BluescreenIT (BIT)

BluescreenIT is an IT Security Consultancy and IT and Cyber Security Training company supporting industry, local authorities, MoD and governmental IT departments.

Sendmarc

Sendmarc

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks.

Kodem Security

Kodem Security

Our mission is to make AppSec simple. Meet the world’s first dynamic software composition analysis platform. Only Kodem uses runtime intelligence to determine application risk.

Tracebit

Tracebit

Tracebit uses decoys to detect and respond to cloud intrusions in minutes.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.