The information includes about a million usernames and passwords of customers in the U.S., Netherlands and Belgium and is available for download and posted on the group’s site.
A release posted on LulzSec’s page said the group has more, but can’t copy all of the information it stole. The group also said none of the information it took from Sony was encrypted.
“Our goal here is not to come across as master hackers, hence what we’re about to reveal: SonyPictures.com was owned by a very simple SQL injection, one of the most primitive and common vulnerabilities, as we should all know by now,” the group wrote. “From a single injection, we accessed EVERYTHING. Why do you put such faith in a company that allows itself to become open to these simple attacks?”
“This is disgraceful and insecure,” the group said. “They were asking for it.”
LulzSec is not believed to be involved in the Sony breaches that resulted in 77 million user accounts being compromised in April, and the group has denied that it has ever attacked the PlayStation Network.
Jim Kennedy, executive vice president of Global Communications for Sony Pictures Entertainment, said in a statement, “We are looking into these claims.”
In a congressional hearing Thursday, Tim Schaaf, president of Sony Network Entertainment International, said the company supports standard legislation that would require companies to provide timely, accurate information on breaches and to provide customers with resources to combat the effects of an attack.
He also defended the methods Sony used to protect consumer passwords on its PlayStation Network and Qriocity service. When asked why the data was hashed instead of encrypted, he said it was standard industry practice.
On Wednesday, Sony finally restored its PlayStation Store, which had been down for a month following the April cyberattack.