Disney Says Film Hack Threat Was A Hoax

Media production companies are switching to digital production & distribution technologies, making them vulnerable to hackers and extortion. 

Disney's boss Bob Iger has revealed that hackers had threatened to leak one of the studio's new films unless it paid a ransom. He didn't name the film, but it was thought to be Pirates of the Caribbean: Dead Men Tell No Tales.

But now Iger has told Yahoo Finance: "To our knowledge we were not hacked." 

"We decided to take the threat seriously but not react in the manner in which the person who was threatening us had required."

But, he added: "We don't believe that it was real and nothing has happened."

Iger had told employees earlier this month that the hackers had demanded the ransom in bitcoin and that they would release the film online in a series of 20-minute chunks unless it was paid. The Disney boss was keen to stress how technology has benefitted Disney but also said it also presented significant challenges to the film industry.

"In today's world, cyber security is a front burner issue," he said. "We like to view technology more friend than foe... [but] it is also a disruptor."

It is not the first film studio to be threatened with online leaks.

Last month, a group of hackers uploaded the fifth season of Orange is the New Black after Netflix refused to pay a ransom.

Dead Men Tell No Tales is the fifth instalment of the Pirates franchise and will see Johnny Depp's Captain Jack Sparrow return to the ocean alongside Geoffrey Rush and Orlando Bloom.

It was released in cinemas in the US on 26 May.

Mark James, security specialist at IT security company ESET, said: "Anything that has a value will always be a potential victim of theft, either digital or physical. If someone has it and someone wants it then in theory there's a market for it."

BBC:   BBC

You Might Also Read:

Hacker Holds Netflix To Ransom:

French Media’s Emergency Meeting After Isis Hack:

Media Vulnerable To Election Night Cyber-Attack:

US Media Goes Into Overdrive Blaming North Korea for the Sony Hack: Is It Justified?:

 

« UK Cyber Chief: Company Directors Are Devolving Responsibility For Hacks
Workers' Rights v. Robot Jobs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cygilant

Cygilant

Cygilant is a SOC2 certified service provider that combines MSSP and Incident Detection and Response (IDR) capabilities managed by global SOCs staffed with trained security engineers.

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

Tesorion

Tesorion

Tesorion is a fusion of different enterprises each with its own specialisation in the field of cybersecurity. We have combined these specialisations to create an integrated comprehensive solution.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Resistant AI

Resistant AI

Resistant AI protects against evolving online fraud. We connect the dots to provide a new layer of trust and performance for our clients’ systems.

Palmchip

Palmchip

Palmchip is a Cyber Security, SOC and Software consulting company. We design and develop high performance and secure applications.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Tidelift

Tidelift

Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.

CUBE3 AI

CUBE3 AI

CUBE3.AI is a web3 security platform that provides real-time transaction protection for smart contracts, safeguarding against cyber exploits, fraud, and compliance risks.

Oz Forensics

Oz Forensics

Oz Forensics is a global leader in preventing biometric and deepfake fraud. It is a developer of facial Liveness detection for Antifraud Biometric Software with high expertise in the Fintech market.

CyberXpert

CyberXpert

CyberXpert is your cybersecurity partner for the public and private sector in Belgium.

Onum

Onum

Onum helps security and IT leaders focus on the data that's most important. Gain control of your data by cutting through the noise for deep insights in real time.

Sword Group

Sword Group

Sword is a leader in data insights, digital transformation and technology services with a substantial reputation in complex IT, business projects and mission critical operations.

Gathid

Gathid

Gathid is a unique and versatile identity governance platform providing organizations with the ability to model, explore, audit, and track complex access-related scenarios.