FBI uses malware to ID North Korea as Sony culprit

Movie Poster for The Interview

After several weeks of investigation, the FBI on Dec. 19 blamed the North Korean government for the massive hack on Sony Pictures last month.

"Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed," the FBI said in a statement.

The FBI announcement follows weeks of speculation in the media about whether Pyongyang was behind the cyberattack on Sony, which resulted in the dump of, by one count, nearly 40 GB of Sony data online. The leak included the salaries and Social Security numbers of thousands of Sony employees, and several unreleased Sony films.

North Korea had vaguely threatened retaliation for a now-shelved Sony comedy film in which actors Seth Rogen and James Franco are asked by the CIA to kill North Korean dictator Kim Jong-un. Sony ultimately canceled the film's release amid threats of violence to moviegoers from the group that has claimed responsibility for the hack.

The FBI statement provided some evidence it said linked North Korea with the hack, but was constrained by the need to keep some information classified. The bureau said it found the clues in "specific lines of code, encryption algorithms, data deletion methods and compromised networks."

There was also "significant overlap" in the infrastructure used in the attack on Sony and "other malicious cyber activity" the U.S. government has previously attributed to North Korea, the statement said. One example provided was the allegation that several IP addresses associated with North Korean infrastructure communicated with IP addresses that were "hardcoded into the data deletion malware" used in the Sony hack.

The FBI also concluded that the "tools" used in the Sony attack were similar to those used in a cyberattack on South Korean banks and broadcasters in March 2013. South Korean officials blamed the North for that attack and said it cost hundreds of millions of dollars.

The evisceration of a corporation's network defenses has raised the question of how vulnerable federal networks are to such a cyberattack. Joe Demarest, assistant director of the FBI's Cyber Division, has estimated that the malware used in the Sony hack would have penetrated 90 percent of network defenses in private industry and perhaps even in government.

Demarest's comments about the vulnerability of private and government networks illustrate "that what we had considered as being prepared was insufficient to fully protect…critical systems and our critical data," John Cohen, professor at the Rutgers School of Criminal Justice and a former Department of Homeland Security official, said in an interview.

A certain level of preparedness could have blunted the impact of the hack, he added. Had Sony officials' encrypted their emails, for example, some of the key disclosures could have been averted, said Cohen, who until April was the acting undersecretary for intelligence and analysis at DHS.

At a press briefing at the White House after the FBI released its statement, President Barack Obama said the government and private sector need to do more to guard against cyberattacks like the one on Sony. "We've been coordinating with the private sector but a lot more needs to be done," he said. "Were not even close to where we need to be."

He called for the next Congress to pass information-sharing legislation like a measure that stalled in this month's lame-duck session. The U.S. government, Obama added, would respond "proportionally" to the attack on Sony.

The Justice Department has taken a strong stance against alleged state-sponsored cyberattacks on U.S. firms, indicting five members of the Chinese military for cyber espionage in May. A DOJ spokesman did not respond to requests for comment on whether the FBI's conclusions would trigger an indictment of a North Korean.

About the Author

Sean Lyngaas is a former FCW staff writer.


  • Workforce
    White House rainbow light shutterstock ID : 1130423963 By zhephotography

    White House rolls out DEIA strategy

    On Tuesday, the Biden administration issued agencies a roadmap to guide their efforts to develop strategic plans for diversity, equity, inclusion and accessibility (DEIA), as required under a as required under a June executive order.

  • Defense
    software (whiteMocca/

    Why DOD is so bad at buying software

    The Defense Department wants to acquire emerging technology faster and more efficiently. But will its latest attempts to streamline its processes be enough?

Stay Connected