OurMine Claims to Have Breached Sony’s PlayStation Network and Stolen Information

By on

Most security companies advertise their services online, hoping to attract customers with an honest promise of their abilities. OurMine, on the other hand, hacks a company, and then they talk. We’ve seen the notorious Saudi hacking group do this before, and now we are witnessing it again, as this past weekend OurMine breached social media accounts for the PlayStation Network. But that’s not all– the hackers are claiming to have also compromised PSN and stolen database information.

First off, what is the PlayStation Network (PSN)? It’s the online service that powers Sony’s digital storefront, all online gaming on the PS4, and much more. Basically – if you’re using a PlayStation 4 online in any capacity, you’re using PSN. That means, if OurMine breached this network and did in fact steal database information, millions of users would be impacted.

Well, according to the hackers themselves, their attempts were successful. The group confirmed their success when they overtook Sony’s official PlayStation-branded Twitter accounts to announce the alleged hack, teasing, “PlayStation, contact us we got PlayStation Network database leaked!” They even asked for support in their mission, encouraging users on both Twitter and Facebook to share about the breach, stating “Let’s make #PlaystationLeaks Trending!” What’s more – when contacted by Business Insider, the group released a statement confirming that they got their hands on registration info, which means usernames, names, emails, etc.

And though OurMine, a self-identified security group, claims “we will only send it [data] to Sony to prove it,” it’s important PlayStation users still take necessary precautions if they want to ensure their personal data is secure. Therefore, to just that, follow these tips:

  • Consistently change up your password. It’s good practice to change your password to an account every 6 months or so. That way, in instances like this, hackers won’t be able to access your account, as that password is already outdated. Be sure not to reuse old passwords from other accounts.
  • Don’t give away too much personal info. The best way to keep your personal information safe is by keeping it to yourself. Unless a website absolutely requires, try to limit the amount of sensitive information you share online. If you do give out your personal info, research the company you’re giving it to first to see if they have security top of mind.
  • Use a comprehensive security solution. Whether you’re concerned about securing personal data on your phone, or about what you share on the web, make sure all your devices are protected. Use a comprehensive security solution, like McAfee LiveSafe, to keep your personal data out of the hands of cybercriminals.

And, of course, stay on top of the latest consumer and mobile security threats by following me and @McAfee_Home on Twitter, and ‘Like’ us on Facebook.

Categories: Consumer Threat Notices
Tags: ,

Leave a Comment

Similar articles

At the end of last year, a survey revealed that the most popular password was still “123456,” followed by “password.” These highly hackable choices are despite years of education around the importance of password security. So, what does this say about people who pick simple passwords? Most likely, they are shooting for a password that is ...
Read Blog
If you’re a gamer, you know how important virtual currency is. It allows you to purchase new costumes and weapons to personalize your avatar. But how does one go about gaining virtual currency? Players complete in-game challenges and are rewarded with coins to spend in their virtual world. These challenges can be pretty difficult and ...
Read Blog
Cryptocurrency mining is the way transactions are verified and added to the public ledger, a database of all the transactions made around a particular piece of cryptocurrency. Cryptocurrency miners compile all of these transactions into blocks and try to solve complicated mathematical problems to compete with other miners for bitcoins. To do this, miners need ...
Read Blog