Breach Analysis

The Sony Pictures Breach: A Deep Dive into Hollywood's Worst Nightmare

> incident.log —— 2014-11-24T08:47:00Z —— ALERT: mass wiper deployment detected —— systems compromised: ALL —— data exfiltrated: ~100TB —— status: CATASTROPHIC<span class="cursor-blink">_</span>_

Hedgehog Security 24 February 2015 30 min read

Hollywood's worst nightmare became reality.

On the 24th of November 2014, employees of Sony Pictures Entertainment arrived at their desks to find their computer screens displaying a grinning red skeleton and a chilling message from a group calling themselves the Guardians of Peace. The message was unambiguous: the attackers claimed to have stolen vast quantities of sensitive data and threatened to release it publicly. What followed was not merely a data breach — it was the most devastating and publicly humiliating cyber attack ever inflicted upon a major entertainment corporation, and it would reshape the way businesses, governments, and the security industry thought about cyber threats for years to come.

Three months on from that fateful Monday morning, we at Hedgehog Security believe it is time to conduct a thorough, dispassionate analysis of what happened, why it happened, and — most critically — what practical security measures could have prevented or substantially mitigated the damage. This is not an exercise in hindsight for its own sake. Rather, it is an opportunity for every organisation, regardless of size or sector, to learn from the catastrophic failures that allowed a sophisticated adversary to bring a multinational corporation to its knees.

In this article, we shall examine the timeline of events, the technical mechanisms of the attack, the breadth of the data compromised, the financial and reputational consequences, and the legal fallout. We shall then turn our attention to the practical security controls that should have been in place, with particular focus on how regular penetration testing and Cyber Essentials Plus certification would have materially reduced the likelihood and severity of this breach.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

From infiltration to devastation.

Understanding the Sony breach requires an appreciation of its timeline, because this was not a smash-and-grab operation. The attackers were patient, methodical, and devastatingly thorough.

The initial compromise.

Security researchers and forensic investigators have established that the initial compromise of Sony Pictures' network occurred in late September or early October 2014 — a full two months before the attack became visible. The precise initial attack vector remains a subject of debate, but the prevailing assessment is that the attackers gained their foothold through targeted spear-phishing emails sent to Sony employees. These emails contained malicious attachments or links that, when opened, installed backdoor malware on the victim's workstation.

This is a critical point. The attackers did not exploit some exotic zero-day vulnerability in Sony's perimeter defences. They exploited the most fundamental weakness in any organisation's security posture: the human being. A convincing email, a moment of inattention, a single click — and the attackers were inside.

Once inside, the attackers began a period of reconnaissance that lasted weeks. They mapped Sony's internal network, identified key systems and data repositories, escalated their privileges, and moved laterally across the network with apparent ease. The fact that this activity went undetected for approximately two months speaks volumes about the state of Sony's internal monitoring and threat detection capabilities at the time.

Lateral movement and data exfiltration.

During October and into November, the attackers moved through Sony's network with what investigators later described as remarkable freedom. They compromised additional systems, harvested credentials, and began the painstaking process of identifying and exfiltrating the most sensitive data they could find.

The attackers utilised a Server Message Block (SMB) worm tool to propagate through the network. This tool allowed the malware to spread from one compromised system to another, exploiting the trust relationships between systems on the same network. The absence of effective network segmentation meant that once the attackers had a foothold, they could reach virtually every corner of Sony's digital infrastructure.

During this phase, the attackers are believed to have exfiltrated an extraordinary volume of data. The Guardians of Peace later claimed to have stolen over 100 terabytes of information, though this figure has never been independently verified. What is certain is that the stolen data included employee personal information (including Social Security numbers, salary details, and medical records), unreleased films, internal emails, executive compensation details, film scripts, business plans, and a wealth of other confidential corporate information.

The destructive phase.

On the morning of the 24th of November, the attackers activated the destructive component of their operation. They deployed a variant of the Shamoon wiper malware, which systematically erased data from Sony's servers and rendered employees' computers inoperable. The red skeleton image and threatening message replaced normal desktop displays across the organisation.

Sony's entire network was effectively destroyed. Email systems went down. Internal databases became inaccessible. Employees were reduced to communicating by telephone and using pen and paper. The company's global operations ground to a halt in a manner that seemed almost unimaginable for a corporation of Sony's scale and sophistication.

Not Espionage — Sabotage

It is worth pausing here to appreciate the significance of this moment. The attackers did not merely steal data — they destroyed Sony's ability to function as a business. This was not espionage; it was sabotage on a massive scale. The wiper malware was deployed after exfiltration was complete, indicating a planned and sequential operation: steal everything of value, then destroy the evidence and the infrastructure.

Data releases and The Interview.

In the days and weeks that followed, the Guardians of Peace began releasing tranches of stolen data through file-sharing services and torrent networks. The releases were calculated and sequential, designed to maximise embarrassment and maintain media attention.

The leaked data included the personal information of approximately 47,000 individuals — current and former employees, their families, freelancers, and contractors. Social Security numbers, home addresses, dates of birth, salary information, performance reviews, medical records, and disciplinary files were all exposed. Several unreleased films were leaked, including copies of Annie, Mr. Turner, Still Alice, and To Write Love on Her Arms. The screenplay for the James Bond film Spectre was also obtained.

Perhaps most damagingly from a reputational perspective, the attackers released vast archives of internal emails. These emails revealed private conversations between senior executives that included disparaging remarks about actors, directors, and public figures, as well as sensitive business negotiations and strategic discussions. The content of these emails dominated media coverage for weeks and caused severe reputational harm to the individuals involved.

The situation escalated dramatically in mid-December when the Guardians of Peace issued a threat of violence against cinemas that screened The Interview, a comedy film depicting the fictional assassination of North Korean leader Kim Jong-un. The threat referenced the terrorist attacks of the 11th of September 2001, and whilst both the FBI and the Department of Homeland Security assessed that there was no credible threat of physical attack, the combination of the threat and the ongoing chaos was sufficient to cause major cinema chains to refuse to screen the film.

Sony initially cancelled the film's release entirely — a decision that drew sharp criticism from the President of the United States, who stated publicly that he believed Sony had made a mistake and that capitulating to the hackers' demands would only encourage future attacks. Sony subsequently reversed its decision and released the film on Christmas Day to a limited number of independent cinemas and on digital platforms.

Attribution to North Korea.

On the 19th of December 2014, the FBI formally attributed the attack to the North Korean government. The Bureau cited similarities between the malware and techniques used in the Sony attack and those previously employed by North Korean state-sponsored hacking groups, including the Lazarus Group. The malware's code contained Korean language elements, and some of the command-and-control infrastructure used IP addresses associated with North Korea.

However, this attribution has not been universally accepted. Several independent security researchers and firms have questioned the conclusion, with some suggesting that the attack may have been facilitated by disgruntled former Sony employees who had been made redundant during a corporate restructuring in May 2014. The security firm Norse argued publicly that up to six former employees with detailed knowledge of Sony's internal systems may have played a key role. The FBI rejected this alternative assessment after a private briefing.

Whether the attack was orchestrated by a nation state, facilitated by insiders, or some combination of both, the fundamental lesson remains the same: Sony's defences were woefully inadequate against a determined adversary.


The full scope of the breach.

The sheer breadth of data compromised in the Sony breach is staggering and warrants detailed examination, because it illustrates the catastrophic consequences of inadequate data classification, access control, and encryption.

Data Category Details Impact
Employee Personal Data Approximately 47,000 individuals affected. Full names, home addresses, dates of birth, Social Security numbers, salary details, bank account information, medical records, insurance information, employment contracts. Scans of passports, driving licences, and tax documents. Goldmine for identity thieves. Immediate and tangible harm to thousands of individuals who bore no responsibility for Sony's security failings. Multiple lawsuits filed.
Intellectual Property Multiple unreleased films leaked in their entirety including Annie, Mr. Turner, Still Alice. Screenplay for the James Bond film Spectre obtained. Business plans, marketing strategies, production budgets, internal financial projections exposed. Direct financial harm through lost box office and distribution revenue. Enormous competitive intelligence value to rivals in the entertainment industry.
Internal Communications Vast archives of internal emails between senior executives, producers, actors, and agents. Private correspondence revealing internal politics, business disputes, salary negotiations, and personal opinions never intended for public consumption. Severe reputational harm. Dominated media coverage for weeks. Led directly to executive departures including co-chairperson Amy Pascal.
Corporate Infrastructure Shamoon wiper malware caused massive damage to IT infrastructure. Systems across the global network rendered inoperable. Email, databases, and internal services destroyed. Company forced to rebuild computing environment from scratch. Recovery took months and cost tens of millions. Operational capacity severely diminished during recovery.

Counting the cost.

$15 Million — Immediate Provision
Sony's first-quarter 2015 financial statements included a provision of $15 million specifically to address the most immediate and quantifiable costs of the breach.
$100M+ — Estimated Total Cost
Independent analysts estimated total costs — including IT remediation, forensic investigation, legal fees, public relations, regulatory penalties, and lost business — could exceed $100 million. Some estimates placed the figure as high as $150 million.
$8 Million — Employee Settlement
Sony ultimately agreed to pay up to $8 million in settlement of class-action claims related to employee data loss. Four lawsuits were filed in December 2014, with a class-action permitted to proceed in June 2015.
Incalculable — Reputational Damage
The damage to Sony's reputation and brand value, whilst harder to quantify in precise financial terms, was considerable. The breach dominated global media coverage for weeks, causing lasting damage to professional relationships and public trust.

The security failures — a systemic collapse.

The Sony breach was not the result of a single, isolated security failure. It was the consequence of systemic, pervasive weaknesses across virtually every domain of information security. Let us examine the principal failures in detail.

Failure Detail What Should Have Been in Place
1. Inadequate Network Segmentation Sony's internal network appears to have been largely flat. Once an attacker gained access to any part of the network, they could move laterally to reach virtually any other part. There was no meaningful separation between departments, data classifications, or security zones. Network segmentation through firewalls, VLANs, access control lists, and micro-segmentation. Compromising a single workstation in marketing should not provide access to HR databases, finance systems, or film production servers.
2. Insufficient Access Controls The principle of least privilege was poorly implemented. Administrative credentials were not adequately protected. Password policies were weak. Files containing lists of passwords stored in plaintext — including one reportedly named 'Passwords' — were discovered. Multi-factor authentication for privileged accounts. Privileged access management (PAM) solutions. Regular access reviews. Just-in-time access provisioning. Comprehensive logging and monitoring of all privileged activities. Strict prohibition on plaintext credential storage.
3. Failure of Monitoring and Detection Attackers were present in the network for approximately two months without detection. They mapped the network, escalated privileges, moved laterally, and exfiltrated potentially over 100 terabytes of data. None of this was detected. IDS/IPS, SIEM capabilities, user behaviour analytics, network traffic analysis, and DLP tools. The transfer of 100TB of data from a corporate network should have triggered immediate investigation.
4. Inadequate Malware Defences Custom malware including a Shamoon wiper variant evaded Sony's antivirus solutions and persisted for months, communicating with external C2 servers and ultimately executing its destructive payload without detection. Layered malware defence: behavioural analysis, application whitelisting, endpoint detection and response (EDR), sandboxing, and network-based malware detection.
5. Poor Data Classification and Encryption Sensitive data was not classified, not encrypted at rest or in transit, and not subject to appropriate access controls. Employee Social Security numbers, medical records, and passwords were stored in plaintext. Rigorous data classification. Strong encryption (bcrypt/scrypt/Argon2 for passwords, AES-256 for data at rest, TLS for data in transit). Strict access controls proportionate to data sensitivity.
6. Insufficient Security Awareness The probable initial vector — spear-phishing — highlights a failure of employee security awareness. Employees interacted with malicious content that provided the attackers with their initial foothold. Well-designed security awareness programme. Regular phishing simulations. Clear reporting procedures. Culture that encourages reporting suspicious communications without fear of criticism.
7. No Effective Incident Response Plan Sony's response was characterised by confusion, delay, and inadequate communication. The decision to shut down the entire IT infrastructure suggests the absence of a well-rehearsed incident response plan. Documented IR plan with clear roles, escalation procedures, communication templates, forensic procedures, and business continuity provisions. Tested annually through realistic simulations.
8. Lessons from 2011 Ignored The 2011 PlayStation Network breach compromised 77 million user accounts. That incident should have been a powerful wake-up call. The fact that Sony Pictures was breached three years later with many of the same weaknesses suggests the lessons were not learned. Treat previous breaches as warnings. Apply lessons across the entire corporate family. Conduct post-incident reviews that drive genuine remediation, not merely reports.

A technical deconstruction — phase by phase.

To fully appreciate the failures at Sony and the countermeasures that should have been in place, it is instructive to walk through the attack chain in technical detail, mapping each stage to the MITRE ATT&CK framework and identifying the specific defensive controls that would have disrupted the attackers' progress at each phase.

Attack Chain Mapped to MITRE ATT&CK
── Phase 1: Initial Access (T1566 — Phishing) ──────────────────────
Vector: Targeted spear-phishing emails to Sony employees
Payload: Weaponised attachment or credential harvesting link
Result: Backdoor/RAT installed on compromised workstation

── Phase 2: Execution & Persistence (T1059, T1547) ──────────────────
Techniques: Registry run keys, scheduled tasks, DLL hijacking
Evasion: Custom coding, obfuscation, packing to evade AV
Duration: Persisted undetected for approximately 2 months

── Phase 3: Credential Access & Privilege Escalation (T1003, T1078) ─
Techniques: Memory credential dumping, SAM/NTDS.dit extraction
Also found: Plaintext passwords in files named 'Passwords'
Result: Full domain administrator access achieved

── Phase 4: Lateral Movement (T1021, T1570) ─────────────────────
Techniques: SMB worm tool, RDP, WMI exploitation
Enabler: ZERO network segmentation — flat network
Result: Access to virtually all systems across global network

── Phase 5: Data Exfiltration (T1041, T1048) ────────────────────
Volume: Claimed 100+ terabytes (unverified)
Duration: Weeks of sustained exfiltration
Detection: NONE — no DLP, no traffic anomaly detection

── Phase 6: Destruction (T1485, T1561) ──────────────────────────
Malware: Shamoon wiper variant (MBR overwrite + data wipe)
Scope: Entire global infrastructure destroyed
Timing: Deployed AFTER exfiltration — deliberate sequencing
Recovery: Infrastructure rebuilt from scratch over months

What should have stopped each phase.

A robust email security gateway with advanced threat protection was essential for Phase 1 — including sandboxing of attachments, URL rewriting and time-of-click analysis, sender authentication (SPF, DKIM, DMARC), and attachment stripping for high-risk file types. Multi-factor authentication on all email and VPN accounts would have prevented credential harvesting from immediately translating into account compromise. A comprehensive security awareness programme with regular phishing simulations and a consequences-free reporting culture would have reduced the probability of employees interacting with malicious content.

For Phases 2 and 3, application whitelisting would have prevented execution of unauthorised software — one of the single most effective controls against malware. Endpoint detection and response (EDR) solutions capable of behavioural analysis would have detected anomalous process execution and persistence mechanism creation. Credential Guard and a privileged access management (PAM) solution would have protected credentials in memory and vaulted all privileged credentials. A tiered administration model would have ensured high-privilege accounts were only used from hardened, dedicated workstations.

For Phases 4 and 5, network segmentation through firewalls, VLANs, and access control lists with strict rules governing system-to-system communication was essential. Micro-segmentation at the application level would have prevented systems from communicating outside their trust boundary. Data loss prevention (DLP) solutions monitoring both network traffic and endpoint activity would have detected the transfer of sensitive data. Egress filtering at the network perimeter would have restricted outbound connections. The transfer of 100 terabytes of data should have been trivially detectable through basic network traffic monitoring.

For Phase 6, immutable, offline, and geographically distributed backup systems following the 3-2-1 backup rule would have enabled recovery. Air-gapped backup infrastructure that cannot be reached from the production network would have survived the wiper attack. Rapid re-provisioning capabilities through infrastructure-as-code would have dramatically reduced recovery time.


Technical controls alone are not enough.

Technical controls, no matter how comprehensive, are only effective within a framework of sound security governance. The Sony breach exposed failures not only in technology but in the organisational structures, processes, and culture that should have ensured that security received appropriate attention and investment.

In the years preceding the breach, Sony's board and senior leadership appear to have treated cyber security as a technical matter to be handled by the IT department, rather than as a strategic business risk requiring board-level oversight. Effective security governance requires that the board understands the organisation's cyber risk profile, receives regular reporting on security posture and threats, ensures that security investment is adequate and appropriately allocated, and holds management accountable for maintaining effective security controls.

Sony's failure to act on the warnings provided by the 2011 PlayStation Network breach suggests a fundamental failure of risk management. A competent risk management process would have identified the lessons of the earlier breach, assessed the residual risk across the broader Sony corporate family, and mandated the implementation of appropriate controls. The business case for security investment is not merely about preventing breaches — it is about protecting the value of the business, maintaining trust, and enabling the organisation to operate with confidence.


How regular testing would have changed the outcome.

Regular, comprehensive penetration testing would have identified many of the vulnerabilities that the attackers exploited, and would have provided Sony with actionable intelligence to remediate those vulnerabilities before they could be exploited in anger.

External Penetration Testing
An external penetration test would have identified vulnerabilities in the company's perimeter defences, including misconfigured firewalls, unpatched services, weak authentication mechanisms, and potential entry points. Whilst the breach appears to have been initiated through phishing, external testing would have identified and remediated additional weaknesses.
Internal Penetration Testing
An internal test — from the perspective of an attacker who has already gained initial access — would have been particularly revealing. A competent tester, starting from a single compromised workstation, would almost certainly have identified the lack of network segmentation, the ease of lateral movement, poorly protected credentials, and the possibility of escalating to domain administrator privileges.
Social Engineering Testing
A social engineering assessment, including simulated phishing campaigns, would have measured employee susceptibility to spear-phishing. Results would have identified the most vulnerable departments and individuals, informing the design and targeting of security awareness training.
Red Team Exercises
A full red team engagement — using any combination of technical, physical, and social engineering techniques to achieve specific objectives — would have provided the most comprehensive and realistic assessment of Sony's security posture, testing not only technical controls but also detection, response, and overall resilience.

For an organisation of Sony's size, complexity, and threat profile, penetration testing should not be an annual checkbox exercise. A robust testing programme would include quarterly external and internal penetration tests, monthly automated vulnerability scans, semi-annual social engineering assessments, annual red team exercises, and ad hoc testing following significant changes to the infrastructure or application landscape.

Estimated Risk Reduction — Penetration Testing

Based on our assessment of the specific vulnerabilities and failures that enabled the Sony breach, we estimate that a comprehensive, regular penetration testing programme would have reduced the likelihood of a breach of this nature and severity by approximately 55–65%. This reflects the high probability that internal testing would have identified the critical issues of network segmentation, privilege escalation, and credential management, whilst acknowledging that penetration testing alone cannot address all cultural and procedural weaknesses.


How certification would have raised the baseline.

The UK Government's Cyber Essentials scheme, and particularly the Cyber Essentials Plus certification, addresses many of the fundamental security controls that were absent or inadequate in Sony's environment. Let us examine each of the five controls in the context of the Sony breach.

CE+ Control What It Requires How It Would Have Helped at Sony
1. Firewalls & Internet Gateways Boundary firewalls and internet gateways properly configured to filter and control network traffic, including both perimeter and internal firewalling. Properly configured firewalls would have significantly constrained the attackers' ability to communicate with external C2 servers and to exfiltrate massive volumes of data. Egress filtering would have created a major obstacle to data exfiltration on the scale that occurred.
2. Secure Configuration All devices and software configured securely. Unnecessary services and software removed or disabled. Default passwords changed. Systems hardened against known attack techniques. Weak or default credentials, unnecessary services, and insecure configurations would have been identified and remediated. Reduced attack surface for the intruders. Secure authentication would have impeded credential harvesting and privilege escalation.
3. User Access Control User accounts managed appropriately. Administrative privileges granted only to those who genuinely need them. Admin accounts not used for routine tasks such as email and web browsing. Directly addresses one of the most critical failures. The attackers' ability to escalate from a compromised standard account to full administrative access would have been significantly impeded.
4. Malware Protection Anti-malware measures in place and correctly configured. Broader measures to prevent malware execution beyond traditional signature-based antivirus. Whilst custom malware might have evaded basic signature detection, properly configured and up-to-date malware protection combined with other controls would have created a more hostile environment for the attackers' tools.
5. Patch Management All software and firmware kept up to date. Critical and high-severity patches applied within 14 days. Unsupported software removed from the environment. Timely patching would have reduced known vulnerabilities available for exploitation during lateral movement. A well-patched environment with fewer exploitable weaknesses would have made the attackers' progress significantly more difficult.

The Cyber Essentials Plus Difference

The critical distinction between basic Cyber Essentials and Cyber Essentials Plus lies in verification. Basic Cyber Essentials is a self-assessment. Cyber Essentials Plus requires an independent, hands-on technical assessment including external vulnerability scanning, internal vulnerability assessment, malware protection testing, and verification that declared controls are actually in place and functioning. It is precisely this independent verification that catches the gap between what an organisation believes its security posture to be and what it actually is.

Estimated Risk Reduction — Cyber Essentials Plus

We estimate that full compliance with Cyber Essentials Plus requirements, rigorously maintained and regularly reassessed, would have reduced the likelihood of a breach of this nature and severity by approximately 40–50%. This reflects the significant value of the five core controls whilst acknowledging that Cyber Essentials is designed to protect against the most common internet-based threats and does not address all advanced persistent threat techniques.

Combined Effect — Penetration Testing + Cyber Essentials Plus

When considered together, penetration testing and Cyber Essentials Plus address complementary aspects of security. We estimate the combined effect would have reduced the likelihood of a breach of this nature and severity by approximately 70–80%. The remaining 20–30% residual risk reflects the inherent difficulty of defending against a determined, well-resourced adversary (potentially a nation state), as well as human factors (social engineering, insider risk) that cannot be fully mitigated by technical controls alone.


What every organisation must learn.

The Threat Landscape Has Changed
The Sony breach demonstrated conclusively that cyber attacks can be conducted not merely for financial gain but as instruments of political coercion and retaliation. Nation states are willing and able to conduct devastating attacks against private corporations in pursuit of political objectives. This demands a fundamental reassessment of threat models across all sectors.
No Organisation Is Too Large to Fail
Sony is a multinational corporation with revenues in the tens of billions and tens of thousands of employees — yet its cyber security posture proved critically inadequate. Size and wealth are no substitute for competent, comprehensive security management.
Prevention Costs a Fraction of Remediation
The total cost of the breach is estimated to exceed $100 million. The cost of implementing proper security measures — penetration testing, CE+ certification, network segmentation, monitoring, encryption, access controls — would represent a tiny fraction of that figure.
Previous Breaches Are Warnings
The 2011 PlayStation Network incident compromised 77 million accounts and should have served as an unmistakable signal. The failure to apply those lessons to the broader Sony corporate family represents a failure of governance at the highest level.
Data You Do Not Need Is Data You Cannot Lose
A rigorous data classification exercise, followed by appropriate access controls, encryption, and retention policies, would have dramatically reduced the volume of data available to the attackers and the harm caused by its exposure.

Practical steps for every organisation.

Implement meaningful network segmentation. Separate your network into distinct security zones based on data sensitivity and business function. Ensure that compromising one zone does not automatically grant access to others. Test your segmentation regularly through internal penetration testing.

Enforce the principle of least privilege. Every user should have the minimum level of access necessary to perform their role. Administrative access should be tightly controlled, audited, and subject to multi-factor authentication. Deploy privileged access management solutions for all administrative activities.

Deploy comprehensive monitoring and detection. Implement a SIEM solution that aggregates and correlates security events from across your environment. Deploy IDS, EDR, and DLP solutions. Ensure that alerts are investigated promptly by trained analysts.

Conduct regular penetration testing. Engage qualified, independent penetration testing firms to assess your security posture on a regular basis. Ensure that testing covers external, internal, social engineering, and application-layer attack vectors. Act promptly on the findings.

Achieve and maintain Cyber Essentials Plus certification. The five controls represent the minimum acceptable baseline for any organisation. Cyber Essentials Plus provides independent verification that these controls are actually working.

Encrypt sensitive data at rest and in transit. All personal data, financial data, intellectual property, and other sensitive information should be encrypted using strong, current algorithms. Encryption keys should be managed securely and rotated regularly.

Invest in security awareness. Train your people regularly. Conduct simulated phishing exercises. Create a culture in which reporting suspicious activity is encouraged and rewarded.

Develop and test your incident response plan. Have a documented plan that covers detection, containment, eradication, recovery, and communication. Test it regularly through tabletop exercises and simulations.

Classify your data and minimise your exposure. Know what data you hold, where it is stored, who has access to it, and why. Delete data that you no longer need. Protect the data that you do need in proportion to its sensitivity.


The fundamentals were neglected.

The Sony Pictures breach of November 2014 stands as one of the most significant and instructive cyber security incidents in history. It demonstrated that even large, well-resourced organisations can be catastrophically compromised when fundamental security practices are neglected. It showed that the consequences extend far beyond immediate technical damage — encompassing financial losses in the hundreds of millions, legal liability, reputational harm, executive departures, and even geopolitical confrontation.

But the most important lesson is also the most empowering: the attack succeeded not because the adversary employed some unstoppable, undetectable super-weapon, but because basic, well-understood security practices were not in place. Network segmentation, access controls, monitoring, encryption, patching, and security awareness — these are not exotic or cutting-edge concepts. They are the fundamentals. And when the fundamentals are neglected, the consequences can be devastating.

At Hedgehog Security, we work with organisations of all sizes to ensure that these fundamentals are not merely understood but are implemented, tested, verified, and continuously improved. Whether through penetration testing, Cyber Essentials Plus certification, security consultancy, or incident response, our goal is to help our clients build the resilience they need to withstand the threats of today and tomorrow.

This article is the first in a two-part series examining the Sony Pictures breach. An update, examining subsequent developments and longer-term consequences, will be published in August 2015.


Could your organisation withstand a targeted attack?

The Sony breach exploited fundamental security weaknesses that exist in thousands of organisations today. Our penetration testing and Cyber Essentials Plus certification services identify and address these weaknesses before an attacker does.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles