Business Standard

Entertainment bigwigs have an Achilles heel, and hackers know how to use it

The security weaknesses of vendors are increasingly the weaknesses of their clients

Sony attack, CYBER CRIME, HACKING
Premium

Researchers at BAE Systems and Symantec say that some of the software and internet infrastructure in the global effort was also used in the Sony attack. Photo: iStock

Nicole Perlroth | NYT
In December, hackers impersonating an executive at Interscope Records, the record label owned by Universal Music Group, managed to bypass all the latest in digital defenses with a simple email.

In a carefully tailored message, the hackers urged an executive at September Management, a music management business, and another at Cherrytree Music Company, a management and record company, to send them Lady Gaga’s stem files — files used by music engineers and producers for remixing and remastering.

With a click of a button, the files made their way into hackers’ hands, according to three people who are familiar with the

What you get on BS Premium?

  • Unlock 30+ premium stories daily hand-picked by our editors, across devices on browser and app.
  • Pick your 5 favourite companies, get a daily email with all news updates on them.
  • Full access to our intuitive epaper - clip, save, share articles from any device; newspaper archives from 2006.
  • Preferential invites to Business Standard events.
  • Curated newsletters on markets, personal finance, policy & politics, start-ups, technology, and more.
VIEW ALL FAQs

Need More Information - write to us at assist@bsmail.in