{
	"id": "4e8cd50a-cfa4-4afe-9889-bd1d974b0ac3",
	"created_at": "2026-04-06T00:09:09.576662Z",
	"updated_at": "2026-04-10T13:11:27.681913Z",
	"deleted_at": null,
	"sha1_hash": "d4f1c39b4e1783c5b7d106d385107a4c6ba9385e",
	"title": "PlayStation social media accounts briefly hacked",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 508728,
	"plain_text": "PlayStation social media accounts briefly hacked\r\nBy Shane Curtis\r\nArchived: 2026-04-05 13:16:08 UTC\r\nSony became the latest entertainment company to suffer at the fingertips of hackers after their PlayStation social\r\nmedia channels were temporarily hacked on Sunday evening.\r\n21 Aug 2017  •  , 2 min. read\r\nhttps://www.welivesecurity.com/2017/08/21/hackers-target-playstation/\r\nPage 1 of 3\n\nSony became the latest entertainment company to suffer at the fingertips of hackers after their PlayStation social\r\nmedia channels were temporarily hacked on Sunday evening.\r\nA group called OurMine claimed credit for the compromise that targeted the company's Facebook and Twitter\r\naccounts.\r\nSony quickly regained control of the accounts but not before the hackers had posted a series of messages on the\r\nsocial media accounts.\r\nAfter taking control of the PlayStation Twitter account, it tweeted to the 14.6 million followers of the account,\r\nencouraging the company to contact them via their website. This followed a tweet from three minutes\r\nearlier clarifying that they were not going to share any data and emphasizing that they were a security group.\r\nOurMine is a well-known Saudi Arabian security hacker group that have previously hacked other celebrity\r\naccounts. However, they claim to be an ethical hacking group and are only interested in helping the groups that\r\nthey hack with claims that they only want to “show you all available vulnerabilities, and fix them all!”\r\nhttps://www.welivesecurity.com/2017/08/21/hackers-target-playstation/\r\nPage 2 of 3\n\nThe hacking group have labelled themselves as an “elite hacker group known for many hacks showing\r\nvulnerabilities in major systems,” on their website, along with a list of services/promises that they promote.\r\nA hack on PlayStation is nothing new having previously suffered at the hands of hackers in 2011 when the\r\nPlayStation Network was attacked leaving millions of PS3 users unable to access the network for 23 days.\r\nXbox, the gaming industry's other leader, has also suffered from the unwanted intrusion of hackers back in 2014\r\nwhen its Xbox Support account was taken over for 45 minutes by the Syrian Electronic Army.\r\nWhile the intentions behind the hack seem to be very much based on the promotion of the hacking group, it must\r\nbe a major concern for both Sony and PlayStation alike, that private user information, including credit card\r\ndetails, may have been compromised.\r\nSony have yet to make an official statement regarding the hack but you would imagine it is only a matter of time\r\nbefore they address the issue.\r\nLet us keep you\r\nup to date\r\nSign up for our newsletters\r\nSource: https://www.welivesecurity.com/2017/08/21/hackers-target-playstation/\r\nhttps://www.welivesecurity.com/2017/08/21/hackers-target-playstation/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.welivesecurity.com/2017/08/21/hackers-target-playstation/"
	],
	"report_names": [
		"hackers-target-playstation"
	],
	"threat_actors": [
		{
			"id": "e4ccfe5c-4d77-4503-bf1c-36076dbd78d0",
			"created_at": "2022-10-25T16:07:24.522697Z",
			"updated_at": "2026-04-10T02:00:05.02215Z",
			"deleted_at": null,
			"main_name": "OurMine",
			"aliases": [
				"ATK 128",
				"TAG-HA10"
			],
			"source_name": "ETDA:OurMine",
			"tools": [],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "76fc6d92-0710-4640-bfa7-3000fe3940a5",
			"created_at": "2022-10-25T16:07:24.251595Z",
			"updated_at": "2026-04-10T02:00:04.911951Z",
			"deleted_at": null,
			"main_name": "Syrian Electronic Army (SEA)",
			"aliases": [
				"ATK 196",
				"Deadeye Jackal",
				"Syria Malware Team",
				"Syrian Electronic Army",
				"TAG-CT2"
			],
			"source_name": "ETDA:Syrian Electronic Army (SEA)",
			"tools": [
				"AndoServer",
				"CypherRat",
				"SLRat",
				"SandroRAT",
				"SilverHawk",
				"SpyNote",
				"SpyNote RAT"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "74f1da67-5bc9-49ee-ba8e-b7e8b452a2c2",
			"created_at": "2023-01-06T13:46:39.021238Z",
			"updated_at": "2026-04-10T02:00:03.183989Z",
			"deleted_at": null,
			"main_name": "OurMine",
			"aliases": [],
			"source_name": "MISPGALAXY:OurMine",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434149,
	"ts_updated_at": 1775826687,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/d4f1c39b4e1783c5b7d106d385107a4c6ba9385e.pdf",
		"text": "https://archive.orkl.eu/d4f1c39b4e1783c5b7d106d385107a4c6ba9385e.txt",
		"img": "https://archive.orkl.eu/d4f1c39b4e1783c5b7d106d385107a4c6ba9385e.jpg"
	}
}