Hackers Steal Game of Thrones Script

HBO has been the target of a cyber-attack after an anonymous hacker boasted about leaking full episodes of upcoming shows, along with scripts for Game of Thrones. 

The hack was announced to media via an anonymous email which claimed 1.5 terabytes of data from secure HBO networks was accessed.

Unaired episodes of “Ballers” and “Room 104” may have been published online, and the hacker vowed more would be “coming soon,” the magazine reported. In an email to Wired, the hackers claimed: “We successfully penetrated HBO’s huge network and gathered most imporatnt (sic) files and films & scripts”.

HBO has not revealed what data had been stolen but confirmed the attack took place.
In a statement, the network said: “HBO recently experienced a cyber incident, which resulted in the compromise of proprietary information. We immediately began investigating the incident and are working with law enforcement and outside cybersecurity firms.”

HBO chairman and CEO Richard Plepler sent a note to employees about the incident.
“As most of you have probably heard by now, there has been a cyber incident directed at the company which has resulted in some stolen proprietary information, including some of our programming,” he said.
“Any intrusion of this nature is obviously disruptive, unsettling, and disturbing for all of us. I can assure you that senior leadership and our extraordinary technology team, along with outside experts, are working round the clock to protect our collective interests. 
“The efforts across multiple departments have been nothing short of herculean. It is a textbook example of quintessential HBO teamwork. The problem before us is unfortunately all too familiar in the world we now find ourselves a part of. As has been the case with any challenge we have ever faced, I have absolutely no doubt that we will navigate our way through this successfully.”

Now in its seventh season, the show aired its third of seven episodes on Sunday 30th July. In Australia, the show airs on Foxtel, ratings for yesterday’s episode are yet to be released. According to piracy figures relative to population, Brisbane is the second-largest city of downloaders of Game of Thrones, coming in behind Dallas, US.  Chicago comes third, Riyadh, Saudi Arabia is in at fourth and Seattle, USA rounds out the top five. Perth is in at sixth place. Phoenix, USA takes out seventh place, followed by Toronto, Canada while Athens, Greece claims ninth position and Guangzhou, China rounds out the top 10. 

The data comes from BitTorrent-oriented research project “alpha60” which is the brainchild of Abigail De Kosnik, Associate Professor at the University of California, Berkley, and Benjamin De Kosnik, computer scientist and artist. TorrentFreak reports the goal of the project is to quantify and map BitTorrent activity around various media titles, to make this “shadow economy” visible to media scholars and the general public. 

Their tracking software collected swarm data from 72 torrents that were released shortly after the first episode of Game of Thrones premiered and before being anonymized, the collected IP-addresses were translated to geographical locations, to reveal various traffic patterns. A five-day time-lapse of the worldwide swarm activity shows there is a lot of activity in Asia. 

9News

Disney Says Film Hack Threat Was A Hoax:

US Media Goes Into Overdrive Blaming North Korea for the Sony Hack: Is It Justified?:

 

« Snowden Criticises Russian Decision To Ban VPNs
Top US Cyber Official Resigns »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

CSR Privacy Solutions

CSR Privacy Solutions

CSR Privacy Solutions is a leading provider of privacy regulatory compliance programs for small and medium sized businesses.

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

oneclick

oneclick

oneclick is a central access and distribution platform in the cloud, enabling the management of the entire technology stack for application provisioning.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

SignalSEC

SignalSEC

SignalSEC provides vulnerability intelligence, malware analysis, penetration testing and associated training services.

Earlybird Venture Capital

Earlybird Venture Capital

Earlybird is a venture capital investor focused on European technology innovators.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

Cybertronium

Cybertronium

Cybertronium is a leader in managing cyber risk. We bring you the latest from the complex, ever-evolving online threat environment with the insights to inspire and the expertise to act.

DESCERT

DESCERT

DESCERT offers you an extended IT, cyber security, risk advisory & compliance audit team which provides strategic guidance, engineering and audit services.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.

DNSFilter

DNSFilter

DNSFilter is the most accurate threat detection and content filtering tool on the market today.

Vantyr

Vantyr

Vantyr's core mission is to safeguard the business-led adoption of SaaS applications by automating the lifecycle management and security of non-human identities.