Sony remains in the firing line of hackers who have now brought down its PlayStation Network and PlayStation Store.
But hacker group Lizard Squad has claimed responsibility, and not GOP – or "Guardians of Peace" – who said they downed Sony Pictures Entertainment’s network on 24 November 2014.
Sony’s PlayStation Network (PSN) became unreachable to PS4 and PS3 users just after midnight on Sunday 7 December 2014 UK time, reports the Express.
The Lizard Squad tweeted the message: "PSN Login #offline #LizardSquad."
DDoS attacks are commonly used by competitors or activists to take services offline using a variety of techniques that make services impossible to reach.
READ MORE ABOUT SONY ATTACKS
- Sony hack exposes poor security practices
- Films leaked online after Sony Pictures hack
- North Korea denies Sony hack that exposed 47,000 personal records
- DDoS attacks hit Sony’s PlayStation Network and other gaming services
- FBI warning links wiper malware to Sony Pictures hack
Although some PSN users speculated that another DDoS attack was underway, this has not yet been confirmed by Sony.
The outage on the PlayStation network comes a week after Lizard Squad claimed responsibility for a similar day-long outage on Microsoft Xbox network.
The Xbox network was hit with a DDoS attack that overloaded the system, stopping users from getting online, reported the BBC.
Lizard Squad said the Xbox attack was just "a small dose" of what was to come over the Christmas season.
Sony Entertainment in Tokyo said the latest outage of PlayStation Network lasted two hours, but had been fixed globally. However, at the time of writing, the PlayStation Store still appeared to be offline.
Sony Entertainment said the latest outage is under investigation, but there is no sign of any material being stolen, reports Phys Org.
In the attack on Sony Pictures two weeks ago, hackers are believed to have accessed a wide variety of data, including a list of employee salaries and bonuses; social security numbers and dates of birth; employee performance reviews; criminal background checks and termination records; correspondence about employee medical conditions; passport and visa information for film actors and crew; internal emails; and unreleased films.