Hackers Steal Game of Thrones Script

HBO has been the target of a cyber-attack after an anonymous hacker boasted about leaking full episodes of upcoming shows, along with scripts for Game of Thrones. 

The hack was announced to media via an anonymous email which claimed 1.5 terabytes of data from secure HBO networks was accessed.

Unaired episodes of “Ballers” and “Room 104” may have been published online, and the hacker vowed more would be “coming soon,” the magazine reported. In an email to Wired, the hackers claimed: “We successfully penetrated HBO’s huge network and gathered most imporatnt (sic) files and films & scripts”.

HBO has not revealed what data had been stolen but confirmed the attack took place.
In a statement, the network said: “HBO recently experienced a cyber incident, which resulted in the compromise of proprietary information. We immediately began investigating the incident and are working with law enforcement and outside cybersecurity firms.”

HBO chairman and CEO Richard Plepler sent a note to employees about the incident.
“As most of you have probably heard by now, there has been a cyber incident directed at the company which has resulted in some stolen proprietary information, including some of our programming,” he said.
“Any intrusion of this nature is obviously disruptive, unsettling, and disturbing for all of us. I can assure you that senior leadership and our extraordinary technology team, along with outside experts, are working round the clock to protect our collective interests. 
“The efforts across multiple departments have been nothing short of herculean. It is a textbook example of quintessential HBO teamwork. The problem before us is unfortunately all too familiar in the world we now find ourselves a part of. As has been the case with any challenge we have ever faced, I have absolutely no doubt that we will navigate our way through this successfully.”

Now in its seventh season, the show aired its third of seven episodes on Sunday 30th July. In Australia, the show airs on Foxtel, ratings for yesterday’s episode are yet to be released. According to piracy figures relative to population, Brisbane is the second-largest city of downloaders of Game of Thrones, coming in behind Dallas, US.  Chicago comes third, Riyadh, Saudi Arabia is in at fourth and Seattle, USA rounds out the top five. Perth is in at sixth place. Phoenix, USA takes out seventh place, followed by Toronto, Canada while Athens, Greece claims ninth position and Guangzhou, China rounds out the top 10. 

The data comes from BitTorrent-oriented research project “alpha60” which is the brainchild of Abigail De Kosnik, Associate Professor at the University of California, Berkley, and Benjamin De Kosnik, computer scientist and artist. TorrentFreak reports the goal of the project is to quantify and map BitTorrent activity around various media titles, to make this “shadow economy” visible to media scholars and the general public. 

Their tracking software collected swarm data from 72 torrents that were released shortly after the first episode of Game of Thrones premiered and before being anonymized, the collected IP-addresses were translated to geographical locations, to reveal various traffic patterns. A five-day time-lapse of the worldwide swarm activity shows there is a lot of activity in Asia. 

9News

Disney Says Film Hack Threat Was A Hoax:

US Media Goes Into Overdrive Blaming North Korea for the Sony Hack: Is It Justified?:

 

« Snowden Criticises Russian Decision To Ban VPNs
Top US Cyber Official Resigns »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Fasoo

Fasoo

Fasoo provides data-centric security to protect data within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities.

Altron

Altron

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers.

Redbelt Security

Redbelt Security

Redbelt is a cyber security consultancy. We integrate people, systems, services and products to transform how your information security is delivered.

CyberSecurity Non-Profit (CSNP)

CyberSecurity Non-Profit (CSNP)

CyberSecurity Non-Profit (CSNP) is a 501(c)(3) non-profit organization dedicated to promoting cybersecurity awareness and education.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

Torq

Torq

Torq's no-code automation modernizes how security & operations teams work with easy workflow building, limitless integrations and numerous pre-built templates.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

Endor Labs

Endor Labs

Endor Labs gives developers and security teams the context they need to prioritize open source risk.

Incyber

Incyber

Incyber is a fully integrated network and cybersecurity solutions provider contracted to safeguard public and private enterprise, high value data and sensitive industries.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.

CERT.ar

CERT.ar

CERT.ar is the national Computer Emergency Response Team for the technical-administrative management of computer security incidents in the National Public Sector of Argentina.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

Sacumen

Sacumen

Sacumen is a niche player in the cybersecurity market, solving critical problems for security product companies.

Neptune Shield

Neptune Shield

Neptune Shield's mission is to deliver cutting edge Maritime focused Cyber Security & Threat Protection through our Hampton Roads based Tech & Cyber Security Hub.

Runtime Ventures

Runtime Ventures

Runtime Ventures focuses on seed and pre-seed stage cybersecurity investments. We love to work with ambitious founders building the future of the secure enterprise.