Categories: BlogCyber Security

The Game of Thrones Hack: What it Means For You and Your Business

Every Sunday, millions of people tune in to watch the characters on the HBO series Game of Thrones face an evolving series of threats. From poisonings and beheadings, to epic sword fights and naval battles, it seems like we’ve seen it all. Well, now HBO is dealing with serious threat of its own—and no, we’re not talking about dragon fire.

The premium network suffered what appears to be a major cyber attack, with hackers threatening to leak over 1.5 terabytes of data (according to Mashable, that’s the equivalent of 303 pirated seasons of Game of Thrones).

HBO isn’t the first entertainment company to experience a breach like this—Netflix and Sony have dealt with similar attacks—and they probably won’t be the last. So just what is it that makes these companies so vulnerable to cyber crime? And what does it mean for the average business? Let’s find out…

The Hack

On July 30th, 2017 many entertainment reporters received an email from a group of hackers claiming to have successfully breached HBO’s network. A claim which has revealed itself to be no bluff.

HBO confirmed a cyber attack did occur and some data has already been shared online, including unaired episodes of the show Ballers and Room 104, a Game of Thrones script from the latest season, and several other internal documents.

As for motive—a week after the initial leak, the hackers also released a version of the ultimatum they sent HBO:

“Our demand is clear and Non-Negotiable: We want XXXX dollars to stop leaking your Data… HBO spends 12 million for Market Research and 5 million for Game of Thrones (season 7) advertisements. So consider us another budget for your advertisements!”

The ransom note, presumably addressed to HBO CEO Richard Plepler, includes a redacted money amount and requests the ransom be paid three days from when it was sent.

The Damage

What does this mean for HBO exactly?

To be determined.

It’s important to remember that the most damaging aspect of the Sony hack was the release of its executive’s private emails. So right now the biggest concern for HBO isn’t how much data the hackers have, it’s what kind. Sony had 200 gigabytes of data stolen in 2014. HBO’s hackers claim to have six times that, and they plan to release the leak gradually every week.

The Lesson

If it can happen to big companies like HBO, Netflix, and Sony, it can happen to you. In fact, 43% of cyber attacks target small businesses. As a small business owner, you may be hesitant to spend money on IT and security solutions, but failing to do may cost you dearly. If your data is compromised, recovering it may be near impossible, unless you have a strong back up solution and disaster recovery plan in place.

Just like Winter in the world of Game of Thrones, cyber threats are coming. Are you prepared? Contact us today.

Bryan Antepara: IT Specialist

Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers.

Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service.

He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

Impact of AI On Threat Detection Critical in Today’s Perilous Cyber Landscape

Leading cyber security experts predict that the damage caused by cyber crime will reach over…

4 days ago

How to Choose an Endpoint Security Solution…and Why It Matters

Think of all the devices accessing your network, from laptops and PCs to tablets and…

3 weeks ago

Understand the Benefits and Limitations of Automated Tools in Penetration Testing

Penetration testing, the process of simulating cyberattacks to identify vulnerabilities, plays an essential role in…

4 weeks ago

Promote Cyber Security Through Obscurity

Carl Mazzanti is the president of eMazzanti Technologies in Hoboken. Is your organization trying to…

4 weeks ago

What Is Microsoft’s Role in the Shared Responsibility Model for Data Security?

Migrating to the cloud delivers undeniable business benefits. But it also opens the door to…

1 month ago

Closing the Door On Global Cyber Threats

Carl Mazzanti is the president of eMazzanti Technologies in Hoboken. One of our clients —…

1 month ago