Threat Landscape
Hollywood's digital transformation produced new revenue streams and a new attack surface that has been actively exploited for over a decade.
The media and entertainment threat landscape has been shaped by the industry's decade-long pivot from physical-media distribution to direct-to-consumer streaming, integrated digital production, and global IP-licensing operations. The transformation produced new revenue streams and operational efficiencies — and a substantially expanded attack surface that has been actively exploited by threat actors with a range of motivations. The Palo Alto Networks Unit 42 August 2024 study found media and entertainment experienced by far the highest monthly growth in attack surface of any industry studied.
The November 2014 Sony Pictures Entertainment attack — attributed by the US Department of Justice to North Korean state actor Park Jin-hyok of the Reconnaissance General Bureau — established the template for state-aligned attack on the entertainment industry. The "Guardians of Peace" attackers exfiltrated approximately 100 terabytes of data, deployed Wiper malware that erased data from Sony servers, and publicly released thousands of internal email exchanges (including those of co-chair Amy Pascal, who stepped down months later). The triggering issue was the planned release of "The Interview", an alternate-history film concerning the assassination of North Korean leader Kim Jong-un. Park was subsequently indicted by US DoJ in September 2018 and linked to the 2017 WannaCry ransomware attack. [01]
A decade after Sony, the 2024 Disney attack made the same point in a different register. Hacktivist group Nullbulge — motivated by antipathy toward AI-generated art — leaked 1+ terabyte of internal Disney Slack data including 4 million messages, employee PII, and unreleased project information. The attacker accessed the data via a single compromised software-development-manager account.
The 2024 named-incident calendar is comprehensive. Disney (July 2024, Nullbulge, 1+ TB Slack leak with 4 million messages, 18,800 spreadsheets, 13,000 PDFs); Roku (March 2024, 576,000 user accounts via credential stuffing in a follow-on second breach to an earlier credential incident); Live Nation / Ticketmaster (May–June 2024, ShinyHunters via Snowflake, 500M+ customer records); the November 2024 Internet Archive breach affecting 31 million users. The 2022 Rockstar Games attack — in which a 17-year-old Lapsus$ hacker exfiltrated approximately 90 GB of unreleased "Grand Theft Auto VI" footage and source code — established the template for unreleased-content extortion that has continued through 2024. [02]
The streaming-platform attack pattern is distinct. Roku 2024, the Disney+ launch-day account-hijacking incidents of 2019, persistent Netflix credential-stuffing attacks, and ongoing Spotify and YouTube account-takeover activity all leverage the consumer credential-reuse problem at scale. Streaming-platform user accounts are valuable both for direct-account-takeover monetisation (resale to lower-cost consumers) and for downstream credential-stuffing against the same email-and-password combinations used elsewhere by the same users.