Hackers Steal Game of Thrones Script

HBO has been the target of a cyber-attack after an anonymous hacker boasted about leaking full episodes of upcoming shows, along with scripts for Game of Thrones. 

The hack was announced to media via an anonymous email which claimed 1.5 terabytes of data from secure HBO networks was accessed.

Unaired episodes of “Ballers” and “Room 104” may have been published online, and the hacker vowed more would be “coming soon,” the magazine reported. In an email to Wired, the hackers claimed: “We successfully penetrated HBO’s huge network and gathered most imporatnt (sic) files and films & scripts”.

HBO has not revealed what data had been stolen but confirmed the attack took place.
In a statement, the network said: “HBO recently experienced a cyber incident, which resulted in the compromise of proprietary information. We immediately began investigating the incident and are working with law enforcement and outside cybersecurity firms.”

HBO chairman and CEO Richard Plepler sent a note to employees about the incident.
“As most of you have probably heard by now, there has been a cyber incident directed at the company which has resulted in some stolen proprietary information, including some of our programming,” he said.
“Any intrusion of this nature is obviously disruptive, unsettling, and disturbing for all of us. I can assure you that senior leadership and our extraordinary technology team, along with outside experts, are working round the clock to protect our collective interests. 
“The efforts across multiple departments have been nothing short of herculean. It is a textbook example of quintessential HBO teamwork. The problem before us is unfortunately all too familiar in the world we now find ourselves a part of. As has been the case with any challenge we have ever faced, I have absolutely no doubt that we will navigate our way through this successfully.”

Now in its seventh season, the show aired its third of seven episodes on Sunday 30th July. In Australia, the show airs on Foxtel, ratings for yesterday’s episode are yet to be released. According to piracy figures relative to population, Brisbane is the second-largest city of downloaders of Game of Thrones, coming in behind Dallas, US.  Chicago comes third, Riyadh, Saudi Arabia is in at fourth and Seattle, USA rounds out the top five. Perth is in at sixth place. Phoenix, USA takes out seventh place, followed by Toronto, Canada while Athens, Greece claims ninth position and Guangzhou, China rounds out the top 10. 

The data comes from BitTorrent-oriented research project “alpha60” which is the brainchild of Abigail De Kosnik, Associate Professor at the University of California, Berkley, and Benjamin De Kosnik, computer scientist and artist. TorrentFreak reports the goal of the project is to quantify and map BitTorrent activity around various media titles, to make this “shadow economy” visible to media scholars and the general public. 

Their tracking software collected swarm data from 72 torrents that were released shortly after the first episode of Game of Thrones premiered and before being anonymized, the collected IP-addresses were translated to geographical locations, to reveal various traffic patterns. A five-day time-lapse of the worldwide swarm activity shows there is a lot of activity in Asia. 

9News

Disney Says Film Hack Threat Was A Hoax:

US Media Goes Into Overdrive Blaming North Korea for the Sony Hack: Is It Justified?:

 

« Snowden Criticises Russian Decision To Ban VPNs
Top US Cyber Official Resigns »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Mega

Mega

Mega is a secure cloud data storage provider with browser-based high-performance end-to-end encryption.

North American Electric Reliability Corporation (NERC)

North American Electric Reliability Corporation (NERC)

NERC is a not-for-profit international regulatory authority whose mission is to assure the reliability and security of the bulk power system in North America.

HexaTrust

HexaTrust

The HEXATRUST club was founded by a group of French SMEs that are complementary players with expertise in information security systems, cybersecurity, cloud confidence and digital trust.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

SMESEC

SMESEC

SMESEC is a lightweight Cybersecurity framework for protecting small and medium-sized enterprises (SME) against Cyber threats.

iFluids Engineering

iFluids Engineering

iFluids Engineering is a leading engineering consulting and risk management firm providing a full range of services including Cyber Security for Industrial Control Systems.

Cyber Police of Ukraine

Cyber Police of Ukraine

Cyber Police of Ukraine is a law enforcement agency within the the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

Gytpol

Gytpol

Gytpol is a leader in Endpoint Configuration Security (ECS) solutions, providing validation, remediation & securing of IT Policies and IT Infrastructure on-premise and in the cloud.

Billington CyberSecurity

Billington CyberSecurity

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity.

Hyperwise Ventures

Hyperwise Ventures

Hyperwise Ventures lead seed investments in startups in the cyber security and enterprise software spaces.

Cyolo

Cyolo

Cyolo’s Secure Access Service Edge (SASE) platform securely connects onsite and remote users to authorized assets, in the organizational network, cloud or IoT environments and even offline networks.

Cyber Dacians

Cyber Dacians

Cyber Dacians offers Information and Cyber Security Consulting Services. We help you to test the effectiveness of your security defenses and build a secure infrastructure.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

Diligent

Diligent

Diligent's SaaS GRC platform gives leaders a connected view of governance, risk, compliance and ESG across their organization.