Doubts Remain About North Korea's Role in Sony Pictures Cyber-Attack

Advertisement
By Agence France-Presse | Updated: 30 December 2014 16:01 IST

Even after Washington pointed the finger at North Korea for the massive cyber-attack on Sony Pictures, some experts say the evidence is far from clear cut.

President Barack Obama earlier this month took the unusual step of naming North Korea for the crippling attack, while promising that the United States would "respond proportionately" after the FBI said evidence pointed to Pyongyang.

Advertisement

But a number of cyber-security specialists argue that links to North Korea are uncertain, and that some evidence leads elsewhere.

"I'm skeptical about the claim and I would be even more skeptical that the North Koreans did it on their own without help from a third party or government," said John Dickson, a former air force intelligence officer who is now a partner in the cyber-security firm Denim Group.

Advertisement

The North Koreans "certainly have the will to poke us in the eye," but "don't have the critical mass skills of other nation states" to carry out an attack of this kind, Dickson told AFP.

Security technologist Bruce Schneier of Co3 Systems, also a fellow at Harvard's Berkman Center, said he also doubts the role of North Korea.

Advertisement

"The truth is we don't know," he said. "There are facts that are classified and not being released."

Schneier added that "even if we don't know (who is responsible), it makes sense for us to pretend we know because it serves as a warning to others."

Advertisement

In a blog post, Schneier said that "clues in the hackers' attack code seem to point in all directions at once... this sort of evidence is circumstantial at best. It's easy to fake, and it's even easier to interpret it incorrectly."

North Korea has been seen as the source of the malware, presumably due to anger at the cartoonish portrayal of the Pyongyang communist regime in the comedy film "The Interview."

But a linguistic-based analysis of the malware by the Israeli-based security firm Taia Global said the native language of the hackers appeared to be Russian, not Korean.

The study concluded that the software authors were not native English speakers, and that the translation errors pointed away from the Koreans.

"We tested for Korean, Mandarin Chinese, Russian and German," the report said. "Our preliminary results show that Sony's attackers were most likely Russian, possibly but not likely Korean and definitely not Mandarin Chinese or German."

Meanwhile, the politico.com website reported that the FBI was briefed Monday by the Norse cyber-intelligence firm, which believes that laid-off Sony staff working in concert with hackers -- not North Korea -- were the culprits.

Classified intelligence
Security experts note that it is relatively easy for hackers to route their attacks through third parties to fake their location and that is nearly impossible to conclusively show the source of an attack.

And Dickson notes that Washington is unlikely to reveal its intelligence sources in the Sony case "because the next set of attackers would change their tactics" to avoid detection.

Johannes Ullrich, dean of research at the SANS Technology Institute, said the attacks could have been carried out by independent hacker groups, possibly with help or direction from North Korea.

"Sometimes state actors use the hacker groups and stay at arm's length, but are helping these groups," he told AFP.

The free flow of information among hacker groups and rogue nations could mean multiple parties were involved, Ullrich said.

He noted that the Sony attack "did not require a high level of sophistication, but what it required was persistence, to find the weak spot to get in."

Contract hackers
Researcher Robert Graham at Errata Security said if North Korea had a role in the attacks, it may have been through outside hackers.

"North Korean hackers are trained as professional, nation state hackers," Graham said in a blog post.

"North Korea may certainly recruit foreign hackers into their teams, or contract out tasks to foreign groups, but it's unlikely their own cyber-soldiers would behave in this way."

Other experts argue that the Obama administration would not publicly name North Korea unless it had solid evidence.

"I'm amazed that people continue to have doubts," said James Lewis, a cyber-security researcher at the Center for Strategic and International Studies. "People love conspiracy theories."

Lewis said US intelligence has the capability to locate the source of the attacks, and there is no domestic political need to blame North Korea.

"The intelligence community would never have let (Obama) stick his neck out on this unless they had a high degree of confidence about this," he said.

Paul Rosenzweig, a former US Homeland Security official who now heads a consulting group, said "it is worth considering the opposing view."

"In the post-Watergate/post-Snowden world, the (government) can no longer simply say 'trust us,'" he wrote in a post on the Lawfare blog.

"Not with the US public and not with other countries. Though the skepticism may not be warranted, it is real."

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Mystery iQOO Smartphone in Development as Tipster Reveals Key Specs
  2. OnePlus Nord CE 6 Key Features Revealed Ahead of Launch in India
  3. You Can Now Use WhatsApp to Recharge Your Prepaid Number in India
  4. Honor Earbuds 4 With Up to 46 Hours of Total Battery Life Debut Globally
  5. Apple Could Bring These Major Camera Upgrades to Future iPhone Models
  6. Poco C81 Series Arrives With 13-Megapixel Camera at This Price in India
  7. Lava Bold N1 5G Is Now Available in a New 6GB RAM, 128GB Storage Variant
  8. Asus Pad Spotted in Early Leak That Hints at Design, Key Specifications
  9. Apple Rolls Out iOS 26.4.2: Here's Why You Should Update Quickly
  1. iQOO Smartphone With Dimensity 7500 Chip and 8,000mAh Battery in Development, Tipster Claims
  2. Redmi Note 17 Pro Max Battery, Camera and Chipset Details Leak; to Feature Dimensity 7500 SoC
  3. Assassin's Creed Black Flag Resynced Pricing Leaked Ahead of Official Reveal
  4. Honor Earbuds 4 Launched Globally With Active Noise Cancellation, Up to 46 Hours of Total Battery Life
  5. Motorola Razr 70 Ultra Design, Colour Options Spotted in Leaked Renders and Promotional Image
  6. UK’s FCA Raids Multiple Sites Suspected of Illegal P2P Crypto Operations
  7. Honor Win H7, Win H9 Launched With Up to Intel Core 9 Ultra HX CPU: Price, Specifications
  8. WhatsApp Launches Prepaid Mobile Recharges for Users in India: How to Recharge Your Mobile Number
  9. Samsung Details Switchable 2D/3D Display Technology That Could Come to Future Galaxy Phones
  10. Crimson Desert Gets Difficulty Settings, Graphical Upgrades and Inventory Improvements in Latest Patch
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.