Sony BMG Greece the latest hacked Sony site


Sony Music Greece logoIn what seems to be a neverending nightmare it appears that the website of Sony BMG in Greece has been hacked and information dumped.

An anonymous poster has uploaded a user database to, including the usernames, real names and email addresses of users registered on

The data posted appears to be incomplete as it claims to include passwords, telephone numbers and other data that is either missing or bogus.

Screenshot of DB from

As I mentioned in the Sophos Security Chet Chat 59 podcast at the beginning of the month, it is nearly impossible to run a totally secure web presence, especially when you are the size of Sony. As long as it is popular within the hacker community to expose Sony’s flaws, we are likely to continue seeing successful attacks against them.

It appears someone used an automated SQL injection tool to find this flaw. It’s not something that requires a particularly skillful attacker, but simply the diligence to comb through Sony website after website until a security flaw is found.

While it’s cruel to kick someone while they’re down, when this is over, Sony may end up being one of the most secure web assets on the net.

If you are a user of, it is highly recommended that you reset your password. Expect that any information you entered when creating your account may be in the hands of someone with malicious intent, and keep a close eye out for phishing attacks.

The lesson I take away from this is similar to other stories we have published on data breaches. It would cost far less to perform thorough penetration tests than to suffer the loss of trust, fines, disclosure costs and loss of reputation these incidents have resulted in.

Want to learn more about securing your web servers and databases? Download our paper “Securing Websites” to learn some best practices to defend your organization against these types of attacks.

Update: The editors of The Hacker News have contacted Naked Security and indicated they were the source of the post to The original hackers had contacted them with the dump.