Reports surfaced Friday that the hackers behind last week's breach of Sony's PlayStation Network obtained millions of credit card numbers, but the evidence so far appears weak. Reports surfaced Friday that the hackers behind last week’s breach of Sony’s PlayStation Network obtained millions of credit card numbers, but the evidence so far appears weak.Sony confirmed earlier this week that its PlayStation Network and Qriocity service had been hacked, and that there was a chance its customers’ credit card numbers may have been compromised.On Thursday, Trend Micro researcher Kevin Stevens posted a Twitter message that read: “The hackers that hacked PSN are selling off the DB [database]. They reportedly have 2.2 million credits cards with CVVs.” CVVs are Card Verification Values, the security codes required for online transactions.His source was chatter in underground hacker forums. “I have not seen the DB so I can not verify that it is true,” he added. A few hours later, Stevens seemed to think his tweet was being taken too seriously. “This #PSNHack is turning into a bunch of FUD, it really is. I posted up what I saw to warn people, not to incite the masses to create FUD,” he wrote.Later on Friday a Trend Micro spokesman declined to comment on the matter. A second company, Isec Partners, that had also claimed to see online discussion of the PlayStation Network hack, is also no longer talking publicly about the matter. The evidence so far — some anonymous boasts in underground hacker forums — is “highly suspect,” according to the Lo-Ping blog, which posted screenshots of the forum messages.Sony did not respond to a request for comment.E.J. Hilbert, president of Online Intelligence, which investigates fraud, thinks PlayStation hackers, called modders, may have accidentally stumbled upon the user data but not actually stolen it.“I dont think there really was an intrusion,” he said via e-mail. “I think the modders got access, Sony found it and freaked out. Technically that is an intrusion, but it’s possible nothing was stolen,” he said.“From Sony’s view, they just dont know what if anything was taken, so it is better to claim intrusion then to [wait and] ‘see what happens,'” he said.Robert McMillan covers computer security and general technology breaking news for The IDG News Service. Follow Robert on Twitter at @bobmcmillan. Robert’s e-mail address is robert_mcmillan@idg.com Related content news North Korean hackers mix code from proven malware campaigns to avoid detection Threat actors are combining RustBucket loader with KandyKorn payload to effect an evasive and persistent RAT attack. By Shweta Sharma Nov 28, 2023 3 mins Malware feature How a digital design firm navigated its SOC 2 audit L+R's pursuit of SOC 2 certification was complicated by hardware inadequacies and its early adoption of AI, but a successful audit has provided security and business benefits. By Alex Levin Nov 28, 2023 11 mins Certifications Compliance news GE investigates alleged data breach into confidential projects: Report General Electric has confirmed that it has started an investigation into the data breach claims made by IntelBroker. By Shweta Sharma Nov 27, 2023 3 mins Data Breach opinion A year after ChatGPT’s debut, is GenAI a boon or the bane of the CISO’s existence? You can try to keep the flood of generative AI at bay but embracing it with proper vigilance is likely the best hope to maintain control and prevent the scourge of it becoming shadow AI. By Christopher Burgess Nov 27, 2023 6 mins Generative AI Data and Information Security Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe