Sony Online Entertainment Answers Some Questions

SOE has posted a new press release on their site in order to answer a few more questions. More details after the jump.

SOE Writes:

May 4, 2011

We want to thank you again for your patience as we work to get the SOE services back up and running. We received several questions and comments relating to the criminal attack to our network and would like to address some of the most common questions today. We are also going to continue to post updates to this website with new information as they become available.

We appreciate your continued patience and feedback.

Thank you,

Sony Online Entertainment

When will SOE’s services be back online?

We have been working around the clock to restore operations as quickly as possible, and we expect to have some of our games and services up and running soon. However, we want to be very clear that we will only restore operations when we believe that the network is secure.

How is the SOE intrusion related to the PSN/Qriocity intrusion? Was this a second attack on SOE?

While the two systems are distinct and operated separately, given that they are both under the Sony umbrella, there is some degree of overlap in design. The attacks were similar in nature. This is NOT a second attack; new information has been discovered as part of our ongoing investigation into the criminal attack in April.

How is SOE planning to notify customers whose data may have been stolen?

We are sending out customer service notification emails to the email addresses we have on file for the accounts that were affected. These emails will be sent by Innovyx, our third party email distributor, and will contain either ‘soe.innovyx.net’ or ‘soe.sony.com’ in the sender field.

SOE initially thought no data was extracted, what changed?

Essentially the perpetrators used sophisticated means not only to access the data, but also to cover their tracks. We committed to continue the investigation and in doing so, uncovered further information that we did not have when we initially believed the data was not stolen.

[Source]