Technology Get the latest on technology, electronics and software…

Anon Lets Fly With Symantec Code After Ransom Talks Collapse

Thread Tools
 
Old Feb 7, 2012 | 04:42 PM
  #1  
Moog-Type-S's Avatar
Thread Starter
The sizzle in the Steak
 
Joined: Nov 2001
Posts: 71,436
Likes: 1,877
From: Southern California
Anon Lets Fly With Symantec Code After Ransom Talks Collapse

A hacker who was negotiating a ransom for stolen source code to a Symantec (Nasdaq: SYMC) product released the data via peer-to-peer networks on Tuesday after negotiations fell through.

The code is for security vendor Symantec's pcAnywhere remote access software.

Symantec had last month warned pcAnywhere users to observe best security practices and told them they might have to disable the application. The company launched its own investigation and called in law enforcement.

Publishing the source code for pcAnywhere could be very dangerous because "most pcAnywhere installations are at remote sites with no IT staff access," Tan Sarihan, president of Kobil Technologies, told TechNewsWorld. "Some of them are running on critical systems."

In January, the hacker group also posted code for Symantec's End Point 11 (SEP 11) and Symantec Antivirus Corporate Edition (SAV) 10.2 on the Web.

No Money for Nothing

A data thief using the moniker "YamaTough" on Tuesday also posted emails he or she exchanged with a Symantec representative discussing a payment of US$50,000 in return for not publishing the code for pcAnywhere.

The negotiations ran from mid-January through Monday. However, they appeared to founder Feb. 1, when YamaTough apparently realized the other party, who purported to be a Symantec staffer by the name of "Sam Thomas," might have some links to the FBI.

Sam Thomas's email address, which was used in the negotiations, was actually a fake email address set up by law enforcement, Symantec spokesperson Cris Paden told TechNewsWorld.

The ransom was suggested during the exchange between law enforcement and YamaTough, and "No bribe attempt was made by Symantec," Paden added.

Haggling With the Hacker

"Sam Thomas" asked YamaTough to send over sample files and the path where the hacker found the file to a Gmail address apparently belonging to Thomas.

The cat-and-mouse games then began, with law enforcement attempting to drag out the negotiations and YamaTough repeatedly issuing new deadlines.

Eventually, YamaTough suggested Symantec make payments through Liberty Reserve, a Costa Rica-based payment processor.

"Sam Thomas" countered by suggesting Paypal as an interim choice and offered US$1,000 upfront. After being rebuffed, "Thomas" offered US$50,000. YamaTough would get $2,500 a month for the first three months, and the rest after proving the code had been destroyed.

Shortly afterwards, YamaTough told Thomas to "say hi to the FBI."

Negotiations broke off Monday, and the hacker then tweeted about the $50,000 offer.

Yesterday's Techniques, Today's Crooks

"Clearly this [approach] didn't work because the hacker suspected he was being phished," remarked Rob Enderle, principal analyst at the Enderle Group. "I doubt the approach taken would have ever worked."

"[Law enforcement] should have set up a drop. Physical methods for catching a kidnapper or blackmailer are far more advanced with law enforcement," Enderle told TechNewsWorld. "It's likely the hacker would have known about most electronic tracking methods but would have been relatively inexperienced in more traditional tracking methods."

Given that the stolen code was Symantec's intellectual property and cybercriminals could use it to launch widespread attacks, should the law enforcement agents perhaps have offered more than $50,000? YamaTough appeared to sneer at this sum in one of the tweets.

"It's hard to believe that a hacker wouldn't think any offer a trap, as it's very unlikely a security firm would ever pay a ransom for something so easily duplicated," Enderle stated.

The Danger of the Stolen Code

The theft of Symantec's source code "shows how important data loss prevention and third-party testing of software is," Kobil's Sarihan said. "It's very important to only allow employees to access critical source code and intellectual property on a need-to-know basis."

Third-party testing is important "because a company's own testing teams might not be able to see the vulnerabilities [in their code]," Sarihan stated.

It seems nobody, including security and antivirus vendors, is secure.

"Whether it's Sony (NYSE: SNE), RSA, Stratfor or Symantec, no one is spared in the world of organized hacking," Parvin Kothari, founder and CEO of CipherCloud, told TechNewsWorld.

"Organizations must protect their data at each layer using encryption and other controls," Kothari remarked. "People expect such practices from a security company."

Enterprises and consumers "should be constantly examining the level of risk in their data and infrastructure because their infrastructure is constantly changing," Kothari suggested. "They should always protect their data at each layer using encryption and [other] controls."
http://www.technewsworld.com/story/A...pse-74370.html
Reply
Old Feb 9, 2012 | 11:18 PM
  #2  
mcflyguy24's Avatar
Suzuka Master
 
Joined: Feb 2007
Posts: 5,846
Likes: 24
From: Oreland, Pa
Well this doesn't look good for Symantec. Also I hate low-life hackers to no end.
Reply
Old Feb 10, 2012 | 06:56 AM
  #3  
Whiskers's Avatar
Go Giants
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Aug 2004
Posts: 70,003
Likes: 1,260
From: PA
Who uses PC Anywhere anymore anyway...
Reply
Old Feb 10, 2012 | 07:40 AM
  #4  
justnspace's Avatar
Moderator
15 Year Member
Liked
Loved
Community Favorite
iTrader: (1)
 
Joined: Feb 2010
Posts: 86,293
Likes: 16,291
theres a Symantec office right across my office. LOLOLOLLOL

elevator ride up to the 3rd floor.
"so, how's it going!?"
Reply
Old Feb 17, 2012 | 11:43 AM
  #5  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
<-hates Symantec. They bought a bunch of great products and made them all suck, similar story at CA.
Reply
Old Feb 17, 2012 | 02:39 PM
  #6  
Scottman111's Avatar
1919
 
Joined: Mar 2005
Posts: 21,467
Likes: 162
Originally Posted by doopstr
<-hates Symantec. They bought a bunch of great products and made them all suck, similar story at CA.


They're corporate anti-virus software is the biggest joke I have ever seen in my life.
Reply
Old Feb 17, 2012 | 03:15 PM
  #7  
Anachostic's Avatar
Safety Car
 
Joined: Jul 2007
Posts: 4,845
Likes: 145
Originally Posted by doopstr
<-hates Symantec. They bought a bunch of great products and made them all suck, similar story at CA.
Isn't CA's corporate slogan, "CA: Where great software goes to die."
Reply
Old Feb 17, 2012 | 03:37 PM
  #8  
03SSMTL-S's Avatar
Banned
 
Joined: Feb 2005
Posts: 13,252
Likes: 2,654
From: parts unknown
Symantec software is the first thing i uninstall on any machine i fix for friends
Reply
Old Feb 19, 2012 | 07:03 AM
  #9  
Beelzebub's Avatar
Race Director
20 Year Member
Photogenic
Liked
Loved
 
Joined: Jan 2003
Posts: 10,929
Likes: 1,051
From: Long Island, NY
Originally Posted by Anachostic
Isn't CA's corporate slogan, "CA: Where great software goes to die."
Hey


I resemble that remark.


And I won't say what really goes on in a corporate software company. It is too long and too much bullshit.
Reply
Old Feb 19, 2012 | 07:07 AM
  #10  
Beelzebub's Avatar
Race Director
20 Year Member
Photogenic
Liked
Loved
 
Joined: Jan 2003
Posts: 10,929
Likes: 1,051
From: Long Island, NY
Oh and CA security software hasn't been CA for at least 3 years.
We sold it off to another company, they have just left our name on it. But that agreement has ended, and we are not even using it any more.
Reply
Related Topics
Thread
Thread Starter
Forum
Replies
Last Post
Jamus22
2G TL Problems & Fixes
24
Jun 11, 2023 10:08 AM
thegipper
3G TL (2004-2008)
5
Sep 28, 2015 01:01 PM
shawnafoxx
1G RL (1996-2004)
2
Sep 28, 2015 12:33 PM




All times are GMT -5. The time now is 11:38 PM.