After nearly a whole month of hacker-induced downtime, Sony’s PSN and its associated services are finally back online. After a staggered rollout in North America, Sony confirmed that service would resume for those in Europe, New Zealand, Australia, Mexico and South America. South African access to PSN should, likewise, be restored by now.
The company’s also insisted users change their compromised passwords, something made mandatory by the accompanying 3.61 firmware update, which will force users to change their details before being allowed back online.
Sony’s European boss Nick Caplin issued a statement saying “The process has begun and some countries are being turned on now, so please be patient as we reach you. In the meantime, now’s a great time to get your PS3′s firmware updated and change your password, both of which are required to get online.” SCEE’s Twitter account confirmed the rollout, saying “The phased rollout of certain PSN services has begun and we’ll tweet when each territory goes back online.”
Source: http://www.lazygamer.net/ps3/the-psn-is-back-up/#ixzz1MUC28k7nThe hacking group who attacked several Sony websites around a month ago and who are now accused of bringing down the PlayStation Network have gotten into a little bit of trouble. It seems that some sort of civil war has broken out amongst "AnonOps," a breakaway group from Anonymous, after a rogue admin going by the name "Ryan" hacked multiple AnonOps websites.
The result was quite a mess with a bit of profanity spread across the webpage, as well as a small comic strip poking fun of Anonymous. On top of that, the site is now littered with chat logs and IP addresses of members and the site has been renamed to "LOL ANONOPS DEAD." The "AnonOps Netstaff" was quick to update its users on the matter by posting a message on another one of their websites.
We regret to inform you today that our network has been compromised by a former IRC-operator and fellow helper named "Ryan". He decided that he didn't like the leaderless command structure that AnonOps Network Admins use. So he organised a coup d'etat, with his "friends" at skidsr.us . Using the networks service bot "Zalgo" he scavenged the IP's and passwords of all the network servers (including the hub) and then systematically aimed denial of service attacks at them (which is why the network has been unstable for the past week). Unfortunately he has control of the domain names AnonOps.ru (and possibly AnonOps.net, we don't know at this stage) so we are unable to continue using them.
The message then went on to warn any users trying to connect to one of AnonOps' IRC chats via the now comprimised site.
We would STRONGLY ADVISE all users to STAY AWAY from AnonOps.net and AnonOps.ru, and they should be considered COMPROMISED. Using or connecting to any service on those addresses may put your computer, and by extension your person, at risk.
No comments:
Post a Comment