DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

HBO hacked: Hackers threaten to leak Game of Thrones (UPDATED)

Posted on July 31, 2017 by Dissent

Update: I made e-mail contact with the hackers earlier today. This really doesn’t seem to be the work of TheDarkOverlord at all. One of the hackers, who identified himself as “Mr. Smith” to me claims that they have “gathered most imporatnt files and films & scripts and so on.” (sic), and that they have ” GOT 7 Full episodes and mini series, lots of upcoming serries (full feature films + scripts).”

In addition to the episodes, they claim that they have also obtained a lot of internal proprietary and staff communications that they will leak “step by step…. ”

So I am still in the process of downloading everything they have already made available and will likely have more to report in due course. My challenge, of course, is that I don’t watch any of these series or shows, so I’m always at a bit of a loss. What I do understand, though, is that I’ve yet to get Mr. Smith or his colleagues to answer some straightforward questions as to why they have done this – what their goal or extortion demand is, etc. Hopefully, they’ll tell me.

Update2: Well, I may have erred in my impression that this was not the work of TheDarkOverlord. As more is revealed, there seems to be more details that do overlap.

Original post:

James Hibberd reports:

HBO has joined the ranks of Hollywood entertainment companies to suffer a major cyber attack.

EW has learned that upcoming episodes of a couple series and at least one alleged script or treatment have been put online by hackers who breached the company’s systems — with more threatened to be coming soon.

“HBO recently experienced a cyber incident, which resulted in the compromise of proprietary information,” the network confirmed in a statement. “We immediately began investigating the incident and are working with law enforcement and outside cybersecurity firms. Data protection is a top priority at HBO, and we take seriously our responsibility to protect the data we hold.”

Read more on EW.

I’ll tell you this: from what I’ve seen so far, this is not likely to be the work of TheDarkOverlord. The writing is all wrong for them, but if they see this post of mine and would be kind enough to get in touch to either confirm or deny, I’d appreciate it. Or maybe the HBO hackers will respond to an inquiry I sent them seeking additional details. We’ll see….

 


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • Canada says hacktivists breached water and energy facilities
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • How a hacking gang held Italy’s political elites to ransom
Category: Business SectorHackU.S.

Post navigation

← DDoS Extortionist Who Posed as Anonymous Hacker Arrested in the US
Hackers Leak Data From Mandiant Security Researcher in Operation #LeakTheAnalyst →

2 thoughts on “HBO hacked: Hackers threaten to leak Game of Thrones (UPDATED)”

  1. Arthur says:
    August 1, 2017 at 3:11 am

    We need links! The fans want to see!

    1. Dissent says:
      August 1, 2017 at 8:33 am

      This site has a policy of not linking to data dumps, even though I know other sites are now beginning to link or reveal the location of the dumped files. How the hacker(s) obtained the material – which appears to be the real thing – and their claim that they have a lot more proprietary files are what I’m more interested in pursuing. Well, that, and their motivation. I’m always so curious as to why certain entities are targeted as victims.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.