We may earn an affiliate commission when you visit our partners.
Brian Hussey

                In November of 2014 an elite group of North Korean hackers executed a devastating cyber attack against Sony Pictures Entertainment in retaliation for their new movie, The Interview, a comedy depicting the assassination of Kim Jong Un.  The attackers stole all of Sony's most private data and then strategically released it to the media. All of Sony's financial data, unreleased movies, and embarrassing e-mails mocking celebrities and the president of the United States.  Furthermore, their malware destroyed Sony's computers, cutting off their access to their own data. 

Read more

                In November of 2014 an elite group of North Korean hackers executed a devastating cyber attack against Sony Pictures Entertainment in retaliation for their new movie, The Interview, a comedy depicting the assassination of Kim Jong Un.  The attackers stole all of Sony's most private data and then strategically released it to the media. All of Sony's financial data, unreleased movies, and embarrassing e-mails mocking celebrities and the president of the United States.  Furthermore, their malware destroyed Sony's computers, cutting off their access to their own data. 

                This attack grew from cyber terror to real terrorism as the story developed and it resulted in President Obama executing an executive order shifting US economic policy against North Korea.  This was truly one of the most significant hacks in the history of Cybercrime. 

                This course will explain the attack in deep technical detail by analyzing the malware used by the North Koreans.  Contained within these binaries is all the information Sony needs to understand how a worm spread throughout their network and destroyed their infrastructure.  You will learn how Sony was victimized and what they could have done to prevent it.  By the end of this course you will know more about this attack than the newscasters, more than top cyber security experts, and quite possibly more than Sony themselves. 

Enroll now

What's inside

Learning objectives

  • Know more about the sony hack than any of the newscasters and most cyber security experts
  • Learn about in-depth malware analysis and how it can create real and immediately actionable cyber threat intelligence
  • Learn about the history behind the sony attack, the reasoning and methodologies behind it and the geopolitical impact it incurred

Syllabus

The Great Sony Hack of 2014
The Great SONY Hack of 2014 - A History
Sony Hack Intro - Part 2
PEStudio Analysis of Destover.C
Read more
PEStudio Analysis of Destover.A
Decoding XOR Strings from Internal Destover Structure
Binary Patching with OllyDbg
Dynamic Analysis of Destover.C
Malicious Artifact Analysis of Destover.C
Destover Command & Control Server Investigation
Destover Boot Sector Rewrite and Wrap-up

Save this course

Save IFCI's Studies in Cybercrime: The Great SONY Hack of 2014 to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in IFCI's Studies in Cybercrime: The Great SONY Hack of 2014 with these activities:
Review Malware Analysis Fundamentals
Reinforce your understanding of malware analysis techniques to better grasp the technical details presented in the course.
Browse courses on Malware Analysis
Show steps
  • Review basic concepts of reverse engineering.
  • Practice identifying common malware behaviors.
Read 'No Place to Hide'
Gain a broader perspective on cybersecurity and government surveillance to better understand the context of the Sony hack.
View Securing Democracy on Amazon
Show steps
  • Read the book and take notes on key themes.
  • Reflect on the implications of government surveillance.
Read 'Practical Malware Analysis'
Supplement your learning with a detailed guide to malware analysis, providing a strong foundation for understanding the Destover malware.
Show steps
  • Read the chapters on static and dynamic analysis.
  • Complete the exercises related to PEStudio and OllyDbg.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Follow PEStudio Tutorials
Enhance your proficiency with PEStudio by working through online tutorials, solidifying your ability to analyze malware samples.
Show steps
  • Find tutorials on using PEStudio for static analysis.
  • Practice analyzing sample executables with PEStudio.
Practice XOR Decoding
Sharpen your XOR decoding skills to effectively decipher the strings extracted from the Destover malware.
Show steps
  • Find XOR-encoded strings online.
  • Write scripts to automatically decode XOR strings.
Write a Blog Post on the Sony Hack
Solidify your understanding of the Sony hack by summarizing the key events, technical details, and geopolitical impact in a blog post.
Show steps
  • Research the Sony hack and its aftermath.
  • Outline the key points to cover in your blog post.
  • Write and edit your blog post.
Build a Yara Rule Set for Destover
Apply your knowledge of malware analysis to create a Yara rule set that can detect the Destover malware, enhancing your practical skills.
Show steps
  • Analyze the Destover malware samples.
  • Identify unique characteristics of the malware.
  • Write Yara rules based on these characteristics.
  • Test your Yara rules against a set of malware samples.

Career center

Learners who complete IFCI's Studies in Cybercrime: The Great SONY Hack of 2014 will develop knowledge and skills that may be useful to these careers:
Cyber Threat Intelligence Analyst
A Cyber Threat Intelligence Analyst identifies and analyzes potential cyber threats. The course, focusing on the Sony hack, helps aspiring analysts understand the methodologies and motivations behind sophisticated cyber attacks. The detailed malware analysis included in the course teaches an analyst how real-world threat intelligence is created, using the infamous Destover malware. Furthermore, the course's examination of the historical context and geopolitical implications of the Sony hack prepares the Cyber Threat Intelligence Analyst to assess the broader impact of cyber incidents.
Malware Analyst
A Malware Analyst dissects malicious software to understand its functionality and potential impact. This course provides in-depth technical analysis of the malware used in the Sony hack. Learning how the North Koreans' malware spread throughout Sony's network and destroyed infrastructure, along with PEStudio and OllyDbg skills, helps build a foundation in reverse engineering and dynamic analysis. Those aspiring to be a Malware Analyst will gain practical experience through the course's exploration of Destover.C and Destover.A, and the C2 server investigation.
Incident Responder
An Incident Responder is responsible for managing and mitigating the impact of security breaches and cyber attacks. This course on the Sony hack offers critical insights into how a major organization was compromised and the steps they could have taken for prevention which are key insights for managing a breach which is most directly applicable to an Incident Responder. Learners will gain a deeper understanding of malware analysis and network intrusion techniques. The exploration of the Destover boot sector rewrite and wrap-up section of the course syllabus are helpful.
Security Consultant
A Security Consultant advises organizations on how to improve their cybersecurity posture and protect against potential threats. This course offers a case study of one of the most significant hacks in history. Aspiring Security Consultants can leverage the knowledge gained from the course to advise clients on strategies for preventing similar attacks. Gaining a comprehension of the technical details of the Destover malware and the vulnerabilities exploited makes this course a useful resource for a Security Consultant.
Cybersecurity Engineer
A Cybersecurity Engineer designs, implements, and manages security systems and networks. This course helps Cybersecurity Engineers understand the complexities of real-world cyber attacks. By analyzing the malware used in the Sony hack and exploring vulnerabilities in Sony's systems, this course helps the Cybersecurity Engineer in designing more robust defenses. The course's focus on the practical aspects of the Sony hack and the methodologies used by the attackers can be valuable.
Network Security Analyst
A Network Security Analyst monitors and protects an organization's network infrastructure from cyber threats. This course helps gain insights into how a worm spread throughout Sony's network in order to protect a network. Gaining the knowledge on malware analysis and network intrusion techniques makes this course a useful resource for a Network Security Analyst. Furthermore, the course's lessons on Destover Command & Control Server Investigation may be useful.
Digital Forensics Examiner
A Digital Forensics Examiner investigates cybercrimes and security incidents, collecting and analyzing digital evidence. This course may be useful for a Digital Forensics Examiner who wishes to investigate similar attacks. The malware analysis and malicious artifact analysis of Destover may be particularly relevant to a Digital Forensics Examiner. The course's focus on the Sony hack provides a real-world case study for examiners.
Information Security Manager
An Information Security Manager is responsible for developing and implementing an organization's security policies and procedures. This course may prove useful by providing a real-world example of the impact of a major cyber attack. By exploring the vulnerabilities exploited in the Sony hack, aspiring Information Security Managers can learn how to develop more effective security strategies. The insights into the geopolitical impact of the attack can inform policy decisions.
Chief Information Security Officer
A Chief Information Security Officer (CISO) oversees an organization's entire information security program. A course focusing on the Sony hack may provide a CISO with insights into the potential consequences of a major cyber attack. The course highlights the broad implications of a successful breach, from financial losses to reputational damage. The course's focus on the lessons learned from the Sony hack may be valuable for informing security strategies.
Security Architect
A Security Architect designs and implements an organization's security infrastructure. The course helps a Security Architect understand the attack vectors and vulnerabilities exploited in the Sony hack. Those aspiring to be a Security Architect can leverage the insights gained from the course to design more secure systems and networks. The course's focus on the technical details of the attack and the malware used may be a helpful supplement.
Data Security Analyst
A Data Security Analyst focuses on protecting sensitive data from unauthorized access and theft. The course, which details the Sony hack, helps inform a Data Security Analyst's understanding of the risks associated with data breaches. A Data Security Analyst may find the course's lessons on PEStudio and OllyDbg skills useful. Focusing on how Sony's financial data and unreleased movies were stolen prepares the Data Security Analyst to prevent future attacks.
IT Risk Manager
An IT Risk Manager identifies and assesses potential risks to an organization's information technology assets. The course helps aspiring IT Risk Managers understand the potential impact of a major cyber attack, such as the Sony hack. An IT Risk Manager can use it to inform their risk assessments and develop strategies for mitigating similar threats. The executive order from President Obama which followed the events in the course can highlight the importance of this role.
Intelligence Analyst
An Intelligence Analyst gathers and analyzes information to support decision-making. This course may be useful for those seeking to be an Intelligence Analyst, who need to understand the geopolitical implications of cyber attacks. The course's focus on the Sony hack and its impact on US economic policy towards North Korea helps to build a foundation in cyber intelligence analysis. The history behind the Sony attack makes this course helpful.
Policy Analyst
A Policy Analyst researches and develops policies related to cybersecurity. A course focusing on the Sony hack may be useful. The course's focus on the Sony hack and its impact on US economic policy towards North Korea may be a helpful introduction into creating policy. Further, the course's real-world event help Policy Analysts to think critically about the implications of cyber incidents.
Business Continuity Planner
A Business Continuity Planner develops and implements plans to ensure an organization can continue operating in the event of a disruption. A course that analyzes the Sony hack may prove to be useful. The course's detailed account of how Sony's systems were disrupted and the impact this had on the organization's operations helps build a foundation for business impact analysis. Aspiring Business Continuity Planners can use the lessons learned from the Sony hack to develop more resilient continuity plans.

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in IFCI's Studies in Cybercrime: The Great SONY Hack of 2014.
Provides a comprehensive guide to malware analysis techniques, covering both static and dynamic analysis. It is highly relevant to the course as it delves into the methodologies used to dissect malicious software, which is central to understanding the Sony hack. The book offers practical examples and hands-on exercises, making it an excellent resource for students seeking to deepen their knowledge of malware analysis. It is commonly used as a textbook in cybersecurity courses.
Provides context on the broader landscape of cybersecurity, surveillance, and government policy. While not directly about the Sony hack, it offers valuable insights into the motivations and capabilities of nation-state actors in the cyber domain. It is more valuable as additional reading to provide a broader understanding of the cyber landscape. It useful reference tool for understanding the geopolitical context of cyberattacks.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser