Technology Get the latest on technology, electronics and software…

Anon Lets Fly With Symantec Code After Ransom Talks Collapse

Thread Tools
 
Old 02-07-2012, 04:42 PM
  #1  
The sizzle in the Steak
Thread Starter
 
Moog-Type-S's Avatar
 
Join Date: Nov 2001
Location: Southern California
Posts: 71,436
Received 1,877 Likes on 1,297 Posts
Anon Lets Fly With Symantec Code After Ransom Talks Collapse

A hacker who was negotiating a ransom for stolen source code to a Symantec (Nasdaq: SYMC) product released the data via peer-to-peer networks on Tuesday after negotiations fell through.

The code is for security vendor Symantec's pcAnywhere remote access software.

Symantec had last month warned pcAnywhere users to observe best security practices and told them they might have to disable the application. The company launched its own investigation and called in law enforcement.

Publishing the source code for pcAnywhere could be very dangerous because "most pcAnywhere installations are at remote sites with no IT staff access," Tan Sarihan, president of Kobil Technologies, told TechNewsWorld. "Some of them are running on critical systems."

In January, the hacker group also posted code for Symantec's End Point 11 (SEP 11) and Symantec Antivirus Corporate Edition (SAV) 10.2 on the Web.

No Money for Nothing

A data thief using the moniker "YamaTough" on Tuesday also posted emails he or she exchanged with a Symantec representative discussing a payment of US$50,000 in return for not publishing the code for pcAnywhere.

The negotiations ran from mid-January through Monday. However, they appeared to founder Feb. 1, when YamaTough apparently realized the other party, who purported to be a Symantec staffer by the name of "Sam Thomas," might have some links to the FBI.

Sam Thomas's email address, which was used in the negotiations, was actually a fake email address set up by law enforcement, Symantec spokesperson Cris Paden told TechNewsWorld.

The ransom was suggested during the exchange between law enforcement and YamaTough, and "No bribe attempt was made by Symantec," Paden added.

Haggling With the Hacker

"Sam Thomas" asked YamaTough to send over sample files and the path where the hacker found the file to a Gmail address apparently belonging to Thomas.

The cat-and-mouse games then began, with law enforcement attempting to drag out the negotiations and YamaTough repeatedly issuing new deadlines.

Eventually, YamaTough suggested Symantec make payments through Liberty Reserve, a Costa Rica-based payment processor.

"Sam Thomas" countered by suggesting Paypal as an interim choice and offered US$1,000 upfront. After being rebuffed, "Thomas" offered US$50,000. YamaTough would get $2,500 a month for the first three months, and the rest after proving the code had been destroyed.

Shortly afterwards, YamaTough told Thomas to "say hi to the FBI."

Negotiations broke off Monday, and the hacker then tweeted about the $50,000 offer.

Yesterday's Techniques, Today's Crooks

"Clearly this [approach] didn't work because the hacker suspected he was being phished," remarked Rob Enderle, principal analyst at the Enderle Group. "I doubt the approach taken would have ever worked."

"[Law enforcement] should have set up a drop. Physical methods for catching a kidnapper or blackmailer are far more advanced with law enforcement," Enderle told TechNewsWorld. "It's likely the hacker would have known about most electronic tracking methods but would have been relatively inexperienced in more traditional tracking methods."

Given that the stolen code was Symantec's intellectual property and cybercriminals could use it to launch widespread attacks, should the law enforcement agents perhaps have offered more than $50,000? YamaTough appeared to sneer at this sum in one of the tweets.

"It's hard to believe that a hacker wouldn't think any offer a trap, as it's very unlikely a security firm would ever pay a ransom for something so easily duplicated," Enderle stated.

The Danger of the Stolen Code

The theft of Symantec's source code "shows how important data loss prevention and third-party testing of software is," Kobil's Sarihan said. "It's very important to only allow employees to access critical source code and intellectual property on a need-to-know basis."

Third-party testing is important "because a company's own testing teams might not be able to see the vulnerabilities [in their code]," Sarihan stated.

It seems nobody, including security and antivirus vendors, is secure.

"Whether it's Sony (NYSE: SNE), RSA, Stratfor or Symantec, no one is spared in the world of organized hacking," Parvin Kothari, founder and CEO of CipherCloud, told TechNewsWorld.

"Organizations must protect their data at each layer using encryption and other controls," Kothari remarked. "People expect such practices from a security company."

Enterprises and consumers "should be constantly examining the level of risk in their data and infrastructure because their infrastructure is constantly changing," Kothari suggested. "They should always protect their data at each layer using encryption and [other] controls."
http://www.technewsworld.com/story/A...pse-74370.html
Old 02-09-2012, 11:18 PM
  #2  
Suzuka Master
 
mcflyguy24's Avatar
 
Join Date: Feb 2007
Location: Oreland, Pa
Age: 41
Posts: 5,846
Received 24 Likes on 20 Posts
Well this doesn't look good for Symantec. Also I hate low-life hackers to no end.
The following users liked this post:
jupitersolo (02-10-2012)
Old 02-10-2012, 06:56 AM
  #3  
Go Giants
 
Whiskers's Avatar
 
Join Date: Aug 2004
Location: PA
Age: 52
Posts: 69,901
Received 1,231 Likes on 821 Posts
Who uses PC Anywhere anymore anyway...
Old 02-10-2012, 07:40 AM
  #4  
Moderator
iTrader: (1)
 
justnspace's Avatar
 
Join Date: Feb 2010
Posts: 86,295
Received 16,260 Likes on 11,971 Posts
theres a Symantec office right across my office. LOLOLOLLOL

elevator ride up to the 3rd floor.
"so, how's it going!?"
Old 02-17-2012, 11:43 AM
  #5  
Team Owner
 
doopstr's Avatar
 
Join Date: Jan 2001
Location: Jersey
Age: 52
Posts: 25,332
Received 2,050 Likes on 1,136 Posts
<-hates Symantec. They bought a bunch of great products and made them all suck, similar story at CA.
Old 02-17-2012, 02:39 PM
  #6  
1919
 
Scottman111's Avatar
 
Join Date: Mar 2005
Age: 38
Posts: 21,467
Likes: 0
Received 162 Likes on 134 Posts
Originally Posted by doopstr
<-hates Symantec. They bought a bunch of great products and made them all suck, similar story at CA.


They're corporate anti-virus software is the biggest joke I have ever seen in my life.
Old 02-17-2012, 03:15 PM
  #7  
Safety Car
 
Anachostic's Avatar
 
Join Date: Jul 2007
Posts: 4,845
Received 145 Likes on 90 Posts
Originally Posted by doopstr
<-hates Symantec. They bought a bunch of great products and made them all suck, similar story at CA.
Isn't CA's corporate slogan, "CA: Where great software goes to die."
Old 02-17-2012, 03:37 PM
  #8  
Az User
 
03SSMTL-S's Avatar
 
Join Date: Feb 2005
Location: parts unknown
Age: 45
Posts: 12,492
Received 2,486 Likes on 1,645 Posts
Symantec software is the first thing i uninstall on any machine i fix for friends
Old 02-19-2012, 07:03 AM
  #9  
Race Director
 
Beelzebub's Avatar
 
Join Date: Jan 2003
Location: Long Island, NY
Age: 54
Posts: 10,508
Received 840 Likes on 521 Posts
Originally Posted by Anachostic
Isn't CA's corporate slogan, "CA: Where great software goes to die."
Hey


I resemble that remark.


And I won't say what really goes on in a corporate software company. It is too long and too much bullshit.
Old 02-19-2012, 07:07 AM
  #10  
Race Director
 
Beelzebub's Avatar
 
Join Date: Jan 2003
Location: Long Island, NY
Age: 54
Posts: 10,508
Received 840 Likes on 521 Posts
Oh and CA security software hasn't been CA for at least 3 years.
We sold it off to another company, they have just left our name on it. But that agreement has ended, and we are not even using it any more.
Related Topics
Thread
Thread Starter
Forum
Replies
Last Post
Jamus22
2G TL Problems & Fixes
24
06-11-2023 10:08 AM
thegipper
3G TL (2004-2008)
5
09-28-2015 01:01 PM
shawnafoxx
1G RL (1996-2004)
2
09-28-2015 12:33 PM



Quick Reply: Anon Lets Fly With Symantec Code After Ransom Talks Collapse



All times are GMT -5. The time now is 12:25 PM.