FBI Director James Comey, today, said that the hackers who compromised Sony Pictures Entertainment usually used proxy servers to obfuscate their identity, but "several times they got sloppy."
Speaking today at an event at Fordham University in New York, Comey said, "Several times, either because they forgot or because of a technical problem, they connected directly and we could see that the IPs they were using ... were exclusively used by the North Koreans.
The FBI has joined the investigation of the cyber attack that crippled computers at Sony Pictures and led to the theft of some new movies.
“The FBI is working with our interagency partners to investigate the recently reported cyber intrusion at Sony Pictures Entertainment,” the bureau said yesterday in an e-mailed statement.
When he was arrested at his Chicago home in 2012 for hacking the website of security think tank Stratfor, the dreadlocked Jeremy Hammond was the FBI's most wanted cybercriminal.
Authorities tracked him down with the help of top LulzSec member Hector Xavier Monsegur. But it has never been known how they managed to shut the lid of him computer, effectively encrypting the contents of Hammond's hard drive, which the hacker was able to encrypt as agents armed with assault rifles were raiding his home.
Jonathan Hall was trying to help the internet. Earlier this week, the 29-year-old hacker and security consultant revealed that someone had broken into machines running inside several widely used internet services, including Yahoo, WinZip, and Lycos. But he may have gone too far.
A security expert claims the FBI is lying about how it located the Icelandic server hosting the Silk Road underground drugs bazaar.
When Ross Ulbricht was arrested by the FBI and charged with being the operator of the billion dollar drugs empire known as Silk Road, one of the most intriguing questions for many was just how the law enforcement agency was able to locate the server hosting the website considering it was running on the anonymous Tor network.