Disney Says Film Hack Threat Was A Hoax

Media production companies are switching to digital production & distribution technologies, making them vulnerable to hackers and extortion. 

Disney's boss Bob Iger has revealed that hackers had threatened to leak one of the studio's new films unless it paid a ransom. He didn't name the film, but it was thought to be Pirates of the Caribbean: Dead Men Tell No Tales.

But now Iger has told Yahoo Finance: "To our knowledge we were not hacked." 

"We decided to take the threat seriously but not react in the manner in which the person who was threatening us had required."

But, he added: "We don't believe that it was real and nothing has happened."

Iger had told employees earlier this month that the hackers had demanded the ransom in bitcoin and that they would release the film online in a series of 20-minute chunks unless it was paid. The Disney boss was keen to stress how technology has benefitted Disney but also said it also presented significant challenges to the film industry.

"In today's world, cyber security is a front burner issue," he said. "We like to view technology more friend than foe... [but] it is also a disruptor."

It is not the first film studio to be threatened with online leaks.

Last month, a group of hackers uploaded the fifth season of Orange is the New Black after Netflix refused to pay a ransom.

Dead Men Tell No Tales is the fifth instalment of the Pirates franchise and will see Johnny Depp's Captain Jack Sparrow return to the ocean alongside Geoffrey Rush and Orlando Bloom.

It was released in cinemas in the US on 26 May.

Mark James, security specialist at IT security company ESET, said: "Anything that has a value will always be a potential victim of theft, either digital or physical. If someone has it and someone wants it then in theory there's a market for it."

BBC:   BBC

You Might Also Read:

Hacker Holds Netflix To Ransom:

French Media’s Emergency Meeting After Isis Hack:

Media Vulnerable To Election Night Cyber-Attack:

US Media Goes Into Overdrive Blaming North Korea for the Sony Hack: Is It Justified?:

 

« UK Cyber Chief: Company Directors Are Devolving Responsibility For Hacks
Workers' Rights v. Robot Jobs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

SERMA Safety & Security (S3)

SERMA Safety & Security (S3)

SERMA Safety & Security provides a comprehensive cybersecurity offering incorporating Expertise, Evaluation, Consultancy and Training, covering hardware, software and information systems.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

Cybersecurity Coalition

Cybersecurity Coalition

The mission of the Cybersecurity Coalition is to bring together leading companies to help policymakers develop consensus-driven policy solutions to achieve improvements in cybersecurity.

Zamna

Zamna

Zamna (formerly VChain Technology) is an award-winning software company building GDPR compliant identity platforms for the aviation industry.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

Insight Partners

Insight Partners

Insight Partners is a leading global private equity and venture capital firm investing in growth-stage technology, software and Internet businesses.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

Active Navigation

Active Navigation

Active Navigation is a data privacy and governance software company.

Take Five

Take Five

Take Five is a national campaign offering straight-forward, impartial advice that helps prevent email, phone-based and online fraud – particularly where criminals impersonate trusted organisations.

Trava Security

Trava Security

Trava simplifies cyber risk management for business owners and IT professionals. Automated assessments, mitigation advising, and data-driven cyber insurance.

Titan Labs

Titan Labs

Titan Labs is a Cyber Security Consultancy that provides advice and technical expertise to government, international finance and telecommunications providers.

Akto

Akto

Akto, the plug & play API security platform. Discover your APIs, run tests and find business logic vulnerabilities at ludicrous speed.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

CloudGuard

CloudGuard

CloudGuard is an AI-driven XDR platform that helps organisations to proactively detect and automatically remediate threats in real-time.