Hacker group Fail0verflow hacks PlayStation 5, information security Samara vacancies

Hacker group Fail0verflow hacks PlayStation 5, information security Samara vacancies

Recently, representatives of Fail0verflow demonstrated their success in hacking PlayStation 5. Apparently, the attackers managed to gain access to root keys. Moreover, the criminals are clearly not going to stop there. In particular, they intend to consistently share their successes with the public via Twitter. Does this mean that information security Samara vacancies Sony is in danger? No doubt.

A few words about PlayStation, information security Samara vacancies

First of all, PlayStation is one of the most popular gaming consoles in the world. It sells so well that Sony Group Corporation created a subsidiary to service it. As a result, Sony Interactive Entertainment (or PlayStation) now develops the console itself, accessories, and software for it. That's why it's especially surprising that an attacker tried to hack the PlayStation 5. The fact is that there is a whole team of specialists working to ensure the console's security. And its information security Ufa vacancies is always at the highest level.

The new PlayStation 5 gaming console went on sale about a year ago. During this time, it has been bought by millions of gamers around the world. That is why attackers have targeted the development of Sony Interactive Entertainment. After all, if they manage to hack one of the most popular devices in the world, they will be able to cause great harm to users around the world. It is important to note that so far no attacker has been able to fully access the gaming console system. Although, of course, there are criminals who are trying to do this. However, there are rumors that criminals There are significant achievements in this area.

Who wants to hack PlayStation 5

First of all, hackers from the Fail0verflow group are working on the problem of hacking the popular gaming console. The other day, they published part of the program code on Twitter and reported that they had reached the system core. However, experts say that obtaining root keys does not give attackers the opportunity to create an exploit. Of course, obtaining root symmetric keys increases their privileges in the system. That is, they can access files and data of a specific console. However, a full-fledged exploit requires asymmetric keys, which are impossible to find on the console. It is also worth noting that information security Chelyabinsk vacancies It was the device that suffered.

That is, hackers did not penetrate the internal network of Sony Interactive Entertainment, but simply hacked the console. And therefore, representatives of the PlayStation organization do not comment on the intruders' reports of hacking. They also do not try to defend their product from media attacks - they do not doubt its reliability. Whereas in the case of success in hacking hackers I can create an exploit that will:

  • steal confidential information;
  • implement miners and bots into consoles;
  • provide remote access to user credentials.

And while Sony Interactive Entertainment doesn't consider it necessary to pay attention to hackers, another attacker was able to gain access to the system core. A certain hacker theFlow0 posted a screenshot with additional elements of the PlayStation 5 interface. Apparently, he was able to create a full-fledged exploit for the console system core. For example, one of the elements of the extended interface allows you to fix problems in the code. And that means information security code Nizhny Novgorod consoles have been hacked. However, Sony Interactive Entertainment is ignoring these reports as well.

Our team SEDICOMM University: Cisco Academy, Linux Professional Institute, Python Institute.