The Evidence That North Korea Hacked Sony Is Flimsy

Source: 
Author: 
Coverage Type: 

[Commentary] Attribution in breaches is difficult. Assertions about who is behind any attack should be treated with a hefty dose of skepticism. Skilled hackers use proxy machines and false IP addresses to cover their tracks or plant false clues inside their malware to throw investigators off their trail. When hackers are identified and apprehended, it’s generally because they’ve made mistakes or because a cohort got arrested and turned informant. So let’s look at what’s known. Sony and FBI Deny Connection to North Korea. In their initial public statement, whoever hacked Sony made no mention of North Korea or the film.


The Evidence That North Korea Hacked Sony Is Flimsy