2011 PlayStation Network outage
The 2011 PlayStation Network outage was the result of an "external intrusion" on Sony's PlayStation Network and Qriocity services, in which personal details from approximately 77 million accounts were compromised and prevented users of PlayStation 3 and PlayStation Portable consoles from accessing the service. The attack occurred between April 17 and April 19, 2011, forcing Sony to turn off the PlayStation Network on April 20. On May 4 Sony confirmed that personally identifiable information from each of the 77 million accounts had been exposed. The outage lasted 23 days.
At the time of the outage, with a count of 77 million registered PlayStation Network accounts, it was one of the largest data security breaches in history. It surpassed the 2007 TJX hack which affected 45 million customers. Government officials in various countries voiced concern over the theft and Sony's one-week delay before warning its users.
Sony stated on April 26 that it was attempting to get online services running "within a week." On May 14, Sony released PlayStation 3 firmware version 3.61 as a security patch. The firmware required users to change their password upon signing in. At the time the firmware was released, the network was still offline. Regional restoration was announced by Kazuo Hirai in a video from Sony. A map of regional restoration and the network within the United States was shared as the service was coming back online.
- 1 Timeline of the outage
- 2 Sony response
- 3 Criticism of Sony
- 4 Sony Online Entertainment outage
- 5 Reaction
- 6 Change to terms and conditions
- 7 References
Timeline of the outage
On April 20, 2011, Sony acknowledged that on the official PlayStation Blog that it was "aware certain functions of the PlayStation Network" were down. Upon attempting to sign in via the PlayStation 3, users received a message indicating that the network was "undergoing maintenance". The following day, Sony asked its customers for patience while the cause of outage was investigated and stated that it may take "a full day or two" to get the service fully functional again.
The company later announced an "external intrusion" had affected the PlayStation Network and Qriocity services. This intrusion occurred between April 17 and April 19. On April 20, Sony suspended all PlayStation Network and Qriocity services worldwide. Sony expressed their regrets for the downtime and called the task of repairing the system "time-consuming" but would lead to a stronger network infrastructure and additional security. On April 25, Sony spokesman Patrick Seybold reiterated on the PlayStation Blog that fixing and enhancing the network was a "time intensive" process with no estimated time of completion. However, the next day Sony stated that there was a "clear path to have PlayStation Network and Qriocity systems back online", with some services expected to be restored within a week. Furthermore, Sony acknowledged the "compromise of personal information as a result of an illegal intrusion on our systems."
On May 1 Sony announced a "Welcome Back" program for customers affected by the outage. The company also confirmed that some PSN and Qriocity services would be available during the first week of May. The list of services expected to become available included:
- Restoration of Online game-play across the PlayStation 3 (PS3) and PSP (PlayStation Portable) systems
- This includes titles requiring online verification and downloaded games
- Access to Music Unlimited powered by Qriocity for PS3/PSP for existing subscribers
- Access to account management and password reset
- Access to download un-expired Movie Rentals on PS3, PSP and MediaGo
- PlayStation Home
- Friends List
- Chat Functionality
On May 2 Sony issued a press release, according to which the Sony Online Entertainment (SOE) services had been taken offline for maintenance due to potentially related activities during the initial criminal hack. Over 12,000 credit card numbers, albeit in encrypted form, from non-U.S. cardholders and additional information from 24.7 million SOE accounts may have been accessed.
During the week, Sony sent a letter to the US House of Representatives, answering questions and concerns about the event. In the letter Sony announced that they would be providing Identity Theft insurance policies in the amount of $1 million USD per user of the PlayStation Network and Qriocity services, despite no reports of credit card fraud being indicated. This was later confirmed on the PlayStation Blog, where it was announced that the service, AllClear ID Plus powered by Debix, would be available to users in the United States free for 12 months, and would include Internet surveillance, complete identity repair in the event of theft and a $1 million identity theft insurance policy for each user.
On May 6 Sony stated they had begun "final stages of internal testing" for the PlayStation Network, which had been rebuilt. However, the following day Sony reported that they would not be able to bring services back online within the one-week timeframe given on May 1, because "the extent of the attack on Sony Online Entertainment servers" had not been known at the time. SOE confirmed on their Twitter account that their games would not be available until sometime after the weekend.
- Sony had removed the personal details of 2,500 people stolen by hackers and posted on a website
- The data included names and some addresses, which were in a database created in 2001
- No date had been fixed for the restart
On May 14 various services began coming back online on a country-by-country basis, starting with North America. These services included: sign-in for PSN and Qriocity services (including password resetting), online game-play on PS3 and PSP, playback of rental video content, Music Unlimited service (PS3 and PC), access to third party services (such as Netflix, Hulu, Vudu and MLB.tv), friends list, chat functionality and PlayStation Home. The actions came with a firmware update for the PS3, version 3.61. As of May 15 service in Japan and East Asia had not yet been approved.
On May 18 SOE shut down the password reset page on their site following the discovery of another exploit that allowed users to reset other users' passwords, using the other user's email address and date of birth. Sign-in using PSN details to various other Sony websites was also disabled, but console sign-ins were not affected.
On May 23 Sony stated that the outage costs were $171 million.
US House of Representatives
Sony reported on May 4 to the PlayStation Blog that:
Kazuo Hirai, Chairman of the Board of Directors of Sony Computer Entertainment America, submitted written answers to questions posed by the United States House subcommittee about the large-scale, criminal cyber-attack we have experienced.
Sony relayed via the letter that:
In summary, we told the subcommittee that in dealing with this cyber attack we followed four key principles:
- Act with care and caution.
- Provide relevant information to the public when it has been verified.
- Take responsibility for our obligations to our customers.
- Work with law enforcement authorities.
We also informed the subcommittee of the following:
- Sony has been the victim of a very carefully planned, very professional, highly sophisticated criminal cyber attack.
- We discovered that the intruders had planted a file on one of our Sony Online Entertainment servers named “Anonymous” with the words “We are Legion.”
- By April 25, forensic teams were able to confirm the scope of the personal data they believed had been taken, and could not rule out whether credit card information had been accessed. On April 26, we notified customers of those facts.
- As of today, the major credit card companies have not reported any fraudulent transactions that they believe are the direct result of this cyber attack.
- Protecting individuals’ personal data is the highest priority and ensuring that the Internet can be made secure for commerce is also essential. Worldwide, countries and businesses will have to come together to ensure the safety of commerce over the Internet and find ways to combat cybercrime and cyber terrorism.
- We are taking a number of steps to prevent future breaches, including enhanced levels of data protection and encryption; enhanced ability to detect software intrusions, unauthorized access and unusual activity patterns; additional firewalls; establishment of a new data center in an undisclosed location with increased security; and the naming of a new Chief Information Security Officer.
Explanation of delays
On April 26, 2011 Sony explained on the PlayStation Blog why it took so long to inform PSN users of the data theft:
There’s a difference in timing between when we identified there was an intrusion and when we learned of consumers’ data being compromised. We learned there was an intrusion April 19th and subsequently shut the services down. We then brought in outside experts to help us learn how the intrusion occurred and to conduct an investigation to determine the nature and scope of the incident. It was necessary to conduct several days of forensic analysis, and it took our experts until yesterday to understand the scope of the breach. We then shared that information with our consumers and announced it publicly this afternoon.
Possible data theft led Sony to provide an update in regards to a criminal investigation in a blog posted on April 27: "We are currently working with law enforcement on this matter as well as a recognized technology security firm to conduct a complete investigation. This malicious attack against our system and against our customers is a criminal act and we are proceeding aggressively to find those responsible."
On May 3 Sony Computer Entertainment CEO Kazuo Hirai reiterated this and said the "external intrusion" which had caused them to shut down the PlayStation Network constituted a "criminal cyber attack". Hirai expanded further, claiming that Sony systems had been under attack prior to the outage "for the past month and half", suggesting a concerted attempt to target Sony.
On May 4 Sony announced that it was adding Data Forte to the investigation team of Guidance Software and Protiviti in analysing the attacks. Legal aspects of the case were handled by Baker & McKenzie. Sony stated their belief that Anonymous, or some portion thereof, may have performed the attack. Anonymous denied any involvement.
Upon learning that a breach had occurred, Sony launched an internal investigation. Sony reported, in its letter to the United States Congress:
One of our first calls was to the FBI, and this is an active, on-going investigation.
Have you identified how the breach occurred?
Yes, we believe so. Sony Network Entertainment America is continuing its investigation into this criminal intrusion, and more detailed information could be discovered during this process. We are reluctant to make full details publicly available because the information is the subject of an on-going criminal investigation and also the information could be used to exploit vulnerabilities in systems other than Sony's that have similar architecture to the PlayStation Network.
Inability to use PlayStation 3 content
While most games remained playable in their offline modes, the PlayStation 3 was unable to play certain Capcom titles in any form. Streaming video providers throughout different regions such as Hulu, Vudu, Netflix and LoveFilm displayed the same maintenance message. Some users claimed to be able to use Netflix's streaming service but others were unable.
Criticism of Sony
Delayed warning of possible data theft
On April 26 nearly a week after the outage, Sony confirmed that it "cannot rule out the possibility" that personally identifiable information such as PlayStation Network account username, password, home address, and email address had been compromised. Sony also mentioned the possibility that credit card data was taken—after claiming that encryption had been placed on the databases, which would partially satisfy PCI Compliance for storing credit card information on a server. Subsequent to the announcement on both the official blog and by e-mail, users were asked to safeguard credit card transactions by checking bank statements. This warning came nearly a week after the initial "external intrusion" and while the Network was turned off.
Some disputed this explanation and queried that if Sony deemed the situation so severe that they had to turn off the network, Sony should have warned users of possible data theft sooner than on April 26. Concerns have been raised over violations of PCI Compliance and the failure to immediately notify users. US Senator Richard Blumenthal wrote to Sony Computer Entertainment America CEO Jack Tretton questioning the delay.
Sony replied in a letter to the subcommittee:
Your statement indicated you have no evidence at this time that credit card information was obtained, yet you cannot rule out this possibility. Please explain why you do not believe credit card information was obtained and why you cannot determine if the data was in fact taken.
As stated above, Sony Network Entertainment America has not been able to conclude with certainty through the forensic analysis done to date that credit card information was not transferred from the PlayStation Network system. We know that for other personal information contained in the account database, the hacker made queries to the database, and the external forensics teams have seen large amounts of data transferred in response to those queries. Our forensics teams have not seen the queries and corresponding data transfers of the credit card information.
Unencrypted personal details
Credit card data was encrypted, but Sony admitted that other user information was not encrypted at the time of the intrusion. The Daily Telegraph reported that "If the provider stores passwords unencrypted, then it's very easy for somebody else – not just an external attacker, but members of staff or contractors working on Sony's site – to get access and discover those passwords, potentially using them for nefarious means." On May 2, Sony clarified the "unencrypted" status of users' passwords, stating that:
While the passwords that were stored were not “encrypted,” they were transformed using a cryptographic hash function. There is a difference between these two types of security measures which is why we said the passwords had not been encrypted. But I want to be very clear that the passwords were not stored in our database in cleartext form.
British Information Commissioners Office
Following a formal investigation of Sony for breaches of the UK's Data Protection Act 1998, the Information Commissioners' Office issued a statement highly critical of the security Sony had in place:
If you are responsible for so many payment card details and log-in details then keeping that personal data secure has to be your priority. In this case that just didn't happen, and when the database was targeted – albeit in a determined criminal attack – the security measures in place were simply not good enough.
There's no disguising that this is a business that should have known better. It is a company that trades on its technical expertise, and there's no doubt in my mind that they had access to both the technical knowledge and the resources to keep this information safe.
Sony was fined £250,000 ($395k) for security measures so poor they did not comply with the British law.
Sony Online Entertainment outage
On May 3 Sony stated in a press release that there may be a correlation between the attack that had occurred on April 16 towards the PlayStation Network and one that compromised Sony Online Entertainment on May 2. This portion of the attack resulted in the theft of information on 24.6 million Sony Online Entertainment account holders. The database contained 12,700 credit card numbers, particularly those of non-U.S. residents, and had not been in use since 2007 as much of the data applied to expired cards and deleted accounts. Sony updated this information the following day by stating that only 900 cards on the database were still valid. The attack resulted in the suspension of SOE servers and Facebook games. SOE granted 30 days of free time, plus one day for each day the server was down, to users of Clone Wars Adventures, DC Universe Online, EverQuest, EverQuest II, EverQuest Online Adventures, Free Realms, Pirates of the Burning Sea, PlanetSide, Poxnora, Star Wars Galaxies and Vanguard: Saga of Heroes, as well as other forms of compensation for all other Sony Online games.
Security experts Eugene Lapidous of AnchorFree, Chester Wisniewski of Sophos Canada and Avner Levin of Ryerson University criticized Sony, questioning its methods of securing user data. Lapidous called the breach "difficult to excuse" and Wisniewski called it "an act of hubris or simply gross incompetence".
Compensation to users
Sony hosted special events after the PlayStation Network returned to service. Sony stated that they had plans for PS3 versions of DC Universe Online and Free Realms to help alleviate some of their losses. In a press conference in Tokyo on May 1, Sony announced a "Welcome Back" program. As well as "selected PlayStation entertainment content" the program promised to include 30 days free membership of PlayStation Plus for all PSN members, while existing PlayStation Plus members received an additional 30 days on their subscription. Qriocity subscribers received 30 days. Sony promised other content and services over the coming weeks. Sony offered one year free identity theft protection to all users with details forthcoming.
On May 16, 2011, Sony announced that two PlayStation 3 games and two PSP games would be offered for free from lists of five and four† (respectively). The games available varied by region and were only available in countries which had access to the PlayStation Store prior to the outage. On May 27, 2011, Sony announced the "welcome back" package for Japan and the Asia region (Hong Kong, Singapore, Malaysia, Thailand and Indonesia). In the Asia region, a theme - Dokodemo Issyo Spring Theme - was offered for free in addition to the games available in the "welcome back" package.
|Game||North America||Europe (non-Germany)||Germany||Asia||Japan|
|Super Stardust HD||Yes||No||Yes||No||No|
|Ratchet & Clank: Quest for Booty||No||Yes||Yes||No||No|
|The Last Guy||No||No||No||Yes||Yes|
|Come on, LocoRoco!! BuuBuu Cocoreccho||No||No||No||Yes||Yes|
|Game||North America||Europe (non-Germany)||Germany||Asia||Japan|
|Everybody's Golf 2||No||No||Yes||No||No|
|Buzz Junior Jungle Party||No||No||Yes||No||No|
|Everybody's Stress Buster||No||No||No||Yes||Yes|
|Locoroco Midnight Carnival||No||No||No||Yes||Yes|
|What Did I Do to Deserve This, My Lord?||No||No||No||No||Yes|
The data theft concerned authorities around the world. Graham Cluley, senior technology consultant at Sophos, said the breach "certainly ranks as one of the biggest data losses ever to affect individuals".
The British Information Commissioner's Office stated that Sony would be questioned, and that an investigation would take place to discover whether Sony had taken adequate precautions to protect customer details. Under the UK's Data Protection Act, Sony was fined £250,000 for the breach.
Privacy Commissioner of Canada Jennifer Stoddart confirmed that the Canadian authorities would investigate. The Commissioner's office conveyed their concern as to why the authorities in Canada weren't informed of a security breach earlier.
US Senator Richard Blumenthal of Connecticut demanded answers from Sony about the data breach by emailing SECA CEO Jack Tretton arguing about the delay in informing its customers and insisting that Sony do more for its customers than just offer free credit reporting services. Blumenthal later called for an investigation by the US Department of Justice to find the person or persons responsible and to determine if Sony was liable for the way that it handled the situation.
Sony had been asked to testify before a congressional hearing on security and to answer questions about the breach of security on May 2, but sent a written response instead.
Legal action against Sony
A lawsuit was posted on April 27 by Kristopher Johns from Birmingham, Alabama on behalf of all PlayStation users alleging Sony "failed to encrypt data and establish adequate firewalls to handle a server intrusion contingency, failed to provide prompt and adequate warnings of security breaches, and unreasonably delayed in bringing the PSN service back online." According to the complaint filed in the lawsuit, Sony failed to notify members of a possible security breach and storing members' credit card information, a violation of PCI Compliance—the digital security standard for the Payment Card Industry.
A Canadian lawsuit against Sony USA, Sony Canada and Sony Japan claimed damages up to C$1 billion including free credit monitoring and identity theft insurance. The plaintiff was quoted as saying, "If you can't trust a huge multi-national corporation like Sony to protect your private information, who can you trust? It appears to me that Sony focuses more on protecting its games than its PlayStation users".
In October 2012 a Californian judge dismissed a lawsuit against Sony over the PSN security breach, ruling that Sony had not violated Californian consumer-protection laws, citing "there is no such thing as perfect security".
Credit card fraud
As of May 2011, there were no verifiable reports of credit card fraud related to the outage. There were reports on the Internet that some PlayStation users experienced credit card fraud; however, they were yet to be linked to the incident. Users who registered a credit card for use only with Sony also reported credit card fraud. Sony said that the CSC codes requested by their services were not stored, but hackers may have been able to decrypt or record credit card details while inside Sony's network.
Sony stated in their letter to the subcommittee:
How many PlayStation Network account holders provided credit card information to Sony Computer Entertainment?
Globally, approximately 12.3 million account holders had credit card information on file on the PlayStation Network system. In the United States, approximately 5.6 million account holders had credit card information on file on the system. These numbers include active and expired credit cards.
As of today, the major credit card companies have not reported that they have seen any increase in the number of fraudulent credit card transactions as a result of the attack, and they have not reported to us any fraudulent transactions that they believe are a direct result of the intrusions described above.
On May 5, a letter from Sony Corporation of America CEO and President Sir Howard Stringer emphasized that there had been no evidence of credit card fraud and that a $1 million identity theft insurance policy would be available to PSN and Qriocity users:
To date, there is no confirmed evidence any credit card or personal information has been misused, and we continue to monitor the situation closely. We are also moving ahead with plans to help protect our customers from identity theft around the world. A program for U.S. PlayStation Network and Qriocity customers that includes a $1 million identity theft insurance policy per user was launched earlier today and announcements for other regions will be coming soon.
Change to terms and conditions
It has been suggested that a change to the PSN terms and conditions announced on September 15, 2011, was motivated by the large damages being claimed by class action suits against Sony, in an effort to minimise the company's losses. The new agreement required users to agree to give up their right (to join together as a group in a class action) to sue Sony over any future security breach, without first trying to resolve legal issues with an arbitrator. This included any ongoing class action suits initiated prior to the August 20, 2011.
Another clause, which removed a user's right to trial by jury should the user opt out of the clause (by sending a letter to Sony), says:
If the Class Action Waiver clause is found to be illegal or unenforceable, this entire Section 15 will be unenforceable, and the dispute will be decided by a court and you and the Sony Entity you have a dispute with each agree to waive in that instance, to the fullest extent allowed by law, any trial by jury.
Sony guaranteed that a court of law in the respective country, in this case the US, would hold jurisdiction in regards to any rules or changes in the Sony PSN ToS:
These Terms of Service and all questions relating to the performance, interpretation, breach or enforcement of these Terms of Service, or the rights, obligations and liabilities of you and us under them are governed by the laws of the State of California. You agree that all disputes, claims or litigation arising from or related in any way to these Terms of Service and our relationship with you will be litigated only in a court of competent jurisdiction located in San Mateo County, State of California. You agree to be subject to personal jurisdiction and venue in that location.
- "PlayStation Network Restoration Begins". PlayStation Network / PSN News. United Kingdom: Sony. 2011-05-17. Retrieved 2011-10-20.
- "Sony faces legal action over attack on PlayStation network". BBC News (bbc.co.uk). 2011-04-28. Retrieved 2011-04-29.
- Richmond, Shane (2011-04-26). "Millions of internet users hit by massive Sony PlayStation data theft". London: Telegraph. Retrieved 2011-04-29.
- Griffith, Chris (2011-04-27). "PlayStation users in Australia urged to check credit card activity". Australian IT (The Australian). Retrieved 2011-11-20.
- "Kazuo Hirai's Letter to the U.S. House of Representatives". a photo set by Flickr user PlayStation.Blog. Flickr. 2011-05-03. Retrieved 2011-10-20.
Information appears to have been stolen from all PlayStation Network user accounts, although not every piece of information in those accounts appears to have been stolen, [...] The criminal intruders stole personal information from all of the approximately 77 million PlayStation Network and Qriocity service accounts.
- Owen Good (2011-05-20). "Welcome Back PSN: The Winners". Kotaku.com. Retrieved 2011-06-02.
- "PlayStation Network and Qriocity Outage FAQ – PlayStation.Blog.Europe". Blog.eu.playstation.com. Retrieved 2011-04-29.
- "PlayStation data breach deemed in 'top 5 ever' - Business - CBC News". Cbc.ca. 2011-04-27. Retrieved 2011-04-29.
- "Video: Sony PlayStation - Hacker Breaks Into Network And Steals Details Of Millions Of Gamers | Technology | Sky News". News.sky.com. Retrieved 2011-04-29.
- "PlayStation hack: top five data thefts". London: Telegraph. 2011-04-27. Retrieved 2011-04-29.
- "PlayStation Network down for seventh day". ComputerAndVideoGames.com. 2011-04-27. Retrieved 2011-04-29.
- "PS3 System Software Update – PlayStation Blog". Blog.us.playstation.com. 2010-12-20. Retrieved 2011-05-16.
- "Kazuo Hirai: PlayStation Network Restoration Announcement – PlayStation Blog". Blog.us.playstation.com. 2010-12-20. Retrieved 2011-05-16.
- Seybold, Patrick (2011). "Play On – PSN Restoration Begins Now – PlayStation Blog". blog.us.playstation.com. Retrieved 16 May 2011.
- "Update on PSN Service Outages". United States: PlayStation Blog. 2011-04-20. Retrieved 2011-04-29.
- "Timeline of Sony's PlayStation Network outage". hken.ibtimes.com. 2011-05-15. Retrieved 2011-05-15.
- "Latest Update on PSN Outage". United States: PlayStation Blog. 2011-04-21. Retrieved 2011-04-29.
- "Update On PlayStation Network/Qriocity Services". United States: PlayStation Blog. 2011-04-22. Retrieved 2011-04-29.
- "PlayStation Knowledge Center | Support - PlayStation.com". us.playstation.com. 2011-01-10. Retrieved 2011-04-29.
- "Latest Update for PSN/Qriocity Services – PlayStation Blog". Blog.us.playstation.com. 2011-04-23. Retrieved 2011-04-29.
- "PSN Update – PlayStation Blog". Blog.us.playstation.com. 2011-04-25. Retrieved 2011-04-29.
- "Update on PlayStation Network and Qriocity – PlayStation Blog". Blog.us.playstation.com. 2011-04-19. Retrieved 2011-04-29.
- "Some PlayStation Network And Qriocity Services To Be Available This Week – PlayStation.Blog.Europe". Blog.eu.playstation.com. Retrieved 2011-05-01.
- Yin-Poole, Wesley (2011-05-01). "PSN: Sony outlines "Welcome Back" gifts". PlayStation 3 (United Kingdom: Eurogamer). Retrieved 2011-10-20.
- "Some PlayStation Network And Qriocity Services To Be Available This Week – PlayStation.Blog.Europe". Blog.eu.playstation.com. Retrieved 2011-05-07.
- "Service Under Maintenance". SOE. 2010-03-31. Retrieved 2011-05-04.
- "Sony Confirms Thousands Of Credit Cards Stolen During Hack - GameInformer News". gameinformer.com. 2011-05-02. Retrieved 2011-05-02.
- "Sony’s Response to the U.S. House of Representatives – PlayStation Blog". Blog.us.playstation.com. 2010-12-20. Retrieved 2011-05-07.
- "Sony Offering Free ‘AllClear ID Plus’ Identity Theft Protection in the United States through Debix, Inc. – PlayStation Blog". Blog.us.playstation.com. Retrieved 2011-05-07.
- "A Letter from Howard Stringer – PlayStation Blog". Blog.us.playstation.com. 2010-12-20. Retrieved 2011-05-07.
- "Important Step for Service Restoration – PlayStation.Blog.Europe". Blog.eu.playstation.com. 2011-05-06. Retrieved 2011-05-07.
- JC Fletcher (2011-05-06). "PSN reactivation delayed for 'further testing,' likely not coming back this week". Joystiq. Retrieved 2011-05-07.
- "Twitter / @Sony Online Ent.: We wanted to let you know ...". twitter.com. 2011. Retrieved 16 May 2011.
- Reynolds, Isabel (2011-05-06). "Sony CEO apologises for data theft; shares fall 2 pct". Reuters. Retrieved 2011-05-07.
- Reynolds, Isabel (2011-05-06). "Sony removes data posted by hackers, delays PlayStation restart". Reuters. Retrieved 2013-10-10.
- "Sony Global - News Releases - RESTORATION OF PLAYSTATIONNETWORK AND QRIOCITY SERVICES BEGINS". Sony. May 15, 2011. Retrieved May 15, 2011.
- "PS3 System Software Update - PlayStation Blog". PlayStation Blog. May 14, 2011. Retrieved May 15, 2011.
- Mochizuki, Takashi (2010-04-07). "Japan Restart of Sony Online Games Services Not Yet Approved". FoxBusiness.com. Retrieved 2011-06-02.
- "Sony's PSN password page exploit". Eurogamer. May 18, 2011. Retrieved May 18, 2011.
- "Report: Sony PlayStation Network Password Reset Page Exploited, Customer Accounts Potentially Compromised". Kotaku. May 18, 2011. Retrieved May 18, 2011.
- "PlayStation Hack to Cost Sony $171M; Quake Costs Far Higher". PC Magazine. May 23, 2011.
- "Sony’s Response to the U.S. House of Representatives – PlayStation Blog". Blog.us.playstation.com. Retrieved 2011-05-05.
- "Clarifying a Few PSN Points – PlayStation Blog". Blog.us.playstation.com. 2011-04-26. Retrieved 2011-05-07.
- "Q&A #1 for PlayStation Network and Qriocity Services – PlayStation Blog". Blog.us.playstation.com. 2010-12-20. Retrieved 2011-04-29.
- Watt, Peggy (30 April 2011). "Sony: PlayStation Network Resumes This Week". pcworld.com. Retrieved 2 May 2011.
- Fletcher, JC (2011-05-01). "PSN 'welcome back program' includes a free download, 30 days free PlayStation Plus, Qriocity". joystiq.com. Retrieved 2011-05-02.
- "Another team added to Sony’s PSN investigation". VG247. Retrieved 2011-05-04.
- Bartz, Diane (2011-04-26). "Sony blames Anonymous for stage-setting theft". Reuters. Retrieved 2011-05-04.
- "Hackers deny involvement in PlayStation Network outage". Retrieved June 9, 2011.
- Edwards, Cliff (2011-04-26). "PlayStation Hackers May Have Stolen Data on 75 Million Users, Sony Says". Bloomberg. Retrieved 2011-04-29.
- "News - Opinion: Sony's Communication Problem". Gamasutra. Retrieved 2011-04-29.
- Barrera, Rey. "Netflix-still-works-on-your-ps3-despite-the-outage". PSNation. Retrieved 25 April 2011.
- "PlayStation Network Outage Bad News for Netflix and Hulu: Online Video News". Gigaom.com. Retrieved 2011-04-29.
- "BBC News - Sony's PlayStation hack apology". Bbc.co.uk. 2011-04-19. Retrieved 2011-04-29.
- Reynolds, Isabel (2009-02-09). "Furore at Sony after Playstation user data stolen". Reuters. Retrieved 2011-04-29.
- "Sony Defends Notification Delay in Data Fiasco". PC Pro. Retrieved 2011-04-29.
- "Senator: Lack of details on PlayStation Network outage 'troubling' - Game Hunters: In search of video games and interactive awesomeness - USATODAY.com". Content.USAToday.com. 2011-01-04. Retrieved 2011-04-29.
- Stuart, Keith (2011-04-27). "PlayStation Network hack: why it took Sony seven days to tell the world | Technology | guardian.co.uk". London: Guardian. Retrieved 2011-04-29.
- Williams, Christopher (2011-04-28). "PlayStation hack: Sony users urged to change passwords". London: Telegraph. Retrieved 2011-04-29.
- "PlayStation Network Security Update – PlayStation Blog". Blog.us.playstation.com. 2011-05-02. Retrieved 2011-05-07.
- "24.6 million SOE accounts potentially compromised". News (gamesindustry.biz). 2011-03-21. Retrieved 2011-05-04.
- Brightman, James (2011-05-03). "Sony Breach 'Difficult to Excuse' Say Security Experts". IndustryGamers. Retrieved 2011-05-05.
- Chung, Emily (2011-05-03). "Sony data breach update reveals 'bad practices'". CBC News. Retrieved 2011-05-05.
- Westervelt, Robert (2011-05-03). "Sony attack: Sony expands scope of its massive data security breach". SearchSecurity.com. Retrieved 2011-05-05.
- Schwartz, Matthew J. (2011-05-03). "Sony Reports 24.5 Million More Accounts Hacked". InformationWeek. Retrieved 2011-05-05.
- Sony Computer Entertainment America (2011-04-28). "Q&A #2 for Playstation Network and Qriocity". playstation.com. Retrieved 2011-04-29.
- Jackson, Leah (2011-04-27). "Hulu Offering Free Credit For PS3 Subscribers". TheFeed (G4tv.com). Retrieved 2011-10-20.
- "Details for PlayStation Network and Qriocity Customer Appreciation Program in North America". PlayStation Blog. May 16, 2011. Retrieved May 17, 2011.
- "Details Of The Welcome Back Programme For SCEE Users". PlayStation Blog. May 16, 2011. Retrieved May 17, 2011.
- "PlayStationNetwork・Qriocity（キュリオシティ）の一部サービス 日本およびアジアの国・地域でも再開" (in Japanese). SCEJ. May 27, 2011. Retrieved 20 October 2011.
- "Welcome Back Package for Hong Kong, Singapore, Malaysia, Thailand and Indonesia". PlayStation.com. May 27, 2011. Retrieved May 28, 2011.
- Richmond, Shane (April 26, 2011). "Millions of internet users hit by massive Sony PlayStation data theft". London: Telegraph. Retrieved April 29, 2011.
- Williams, Christopher (2011-04-27). "PlayStation hack: Sony faces watchdog's questions". London: Telegraph. Retrieved 2011-04-29.
- Wesley Yin-Poole. "ICO confirms it will quiz Sony over PSN News - PlayStation 3 - Page 1". Eurogamer.net. Retrieved 2011-04-29.
- Halliday, Josh (2013-01-24). "Data watchdog fines Sony £250,000 over PlayStation ID hack". The Guardian (London).
- "Privacy Commissioner's office looking into Sony PlayStation hack". Canada.com. Retrieved 2011-04-29.
- "Blumenthal Demands Answers from Sony over Playstation Data Breach". Richard Blumenthal-US senator for Connecticut: Home. Archived from the original on May 5, 2011. Retrieved 2011-04-26.
- "Blumenthal Calls for DOJ Investigation of Sony Playstation Data Breach". Richard Blumenthal-US senator for Connecticut: Home. Retrieved 2011-04-29.
- "US lawmakers press Sony for info on data breach". Associated Press. 2011-04-29. Retrieved 2011-04-30.
- Ogg, Erica (2011-03-24). "Sony sued for PlayStation Network data breach | Circuit Breaker - CNET News". News.cnet.com. Retrieved 2011-04-29.
- "Johns v. Sony Computer Entertainment America LLC et al". Justia. 2011-05-03. Retrieved 2011-05-03.
- Schwartz, Mathew J. "Sony Sued Over PlayStation Network Hack". InformationWeek. Retrieved 2011-04-29.
- "Canadian Law Firm Files $1 Billion Lawsuit Against Sony Over PSN Data Breach". Gamastura. 2011-05-04. Retrieved 2011-05-04.
- "Sony PlayStation Network Down: PSN Hit with $1.04B Class Action Suit". Gather. 2011-05-04. Retrieved 2011-05-04.
- Sony Monetary Penalty Notice, ICO, 2013
- "PlayStation users reporting credit card fraud". Retrieved April 30, 2011.
- "Hackers run up debt for PlayStation user". Retrieved April 30, 2011.
- Arthur, Charles (2011-04-29). "Hackers claim to have 2.2 million card details". The Guardian (London). Retrieved April 30, 2011.
- "Ars readers report credit card fraud". Retrieved April 30, 2011.
- "Q&A #1 for PlayStation Network and Qriocity Services – PlayStation Blog". blog.us.playstation.com. 2011. Retrieved 16 May 2011.
- "Sony asks gamers to sign new terms or face PSN ban". BBC News. 16 September 2011.
- "Sony's 'No-Sue' PlayStation Network Use Clause is Anti-Consumer". 19 September 2011.
- "Terms of Service". 2012.