Security researchers have discovered more information on how the Sony hackers managed to stay undetected

Jon Stewart the interviewComedy Central/’The Daily Show’US TV host John Stewart with a poster for ‘The Interview.’

More details of the hack that wiped out Sony Pictures’ computer systems and resulted in thousands of internal emails and documents leaking online are emerging, almost a full year since news of the breach emerged.

The Register reports that two security researchers from US security company Damballa have found evidence of the tools used by the Sony hackers to avoid detection.

One tool the researchers believe was used by the hackers is named “setMFT.” setMFT can be used by a hacker to do something called “timestomping,” which changes the dates associated with files and stops them appearing to investigators looking for evidence of a hack.

Another tool discovered was “afset,” which also timestomps files and tries to hide hacking evidence from investigators. But the researchers say the tool didn’t work completely, so it didn’t hide all the files it was supposed to.

There’s still little public evidence as to the identity of the hackers behind the attack on Sony Pictures. The US government took the unusual step of publicly accusing North Korea as being behind the hack, but it hasn’t released proof as to how it found the country was behind the crime.

The group that carried out the hack, known as “Guardians of Peace,” eventually informed Sony that the attacks were carried out to try to stop the release of “The Interview,” a Seth Rogen and James Franco comedy movie that sees the pair travel to North Korea to try to kill Kim Jong-un, the country’s leader. The movie’s release was delayed after hackers threatened cinemas with violence if they screened the film.

NOW WATCH: Why people are calling this 19-year-old gamer the ‘Michael Jordan’ of eSports

Business Insider Emails & Alerts

Site highlights each day to your inbox.

Follow Business Insider Australia on Facebook, Twitter, LinkedIn, and Instagram.