Categories: HackingSecurity

Symantec too many doubts, disable pcAnywhere software

Remember the sensational theft of the source code of the Symantec products occurred in the last weeks? On that occasion the company, with impeccable timing, immediately took the distance from the event claiming that its customers could remain calm because the souce code stolen were older and in any case the data breanch was not affected enterprise systems but the network of Indian Government that possesed the codes through an agreement with the company.


The news of course is one of those sensational, one of the leading players in the field of computer security may have been mocked by a group of Indian hackers, of course, until there isn’t a direct fallout on the end user every event remains confined to the web without some discussion lead to further problems.

Immediately, the situation was complicated, on the web some rumors indicated that the source code, even dating back to 2006, had been stolen directly from Symantec’s network, aggravating the position of the company.
Why in fact the company had declared the false, and no one has asked why the Indian government that was accused of being mocked has not publicly denied the Symantec.

Another disturbing fact absurd a management point of view of the event is the media claiming that the customers there would be no impact and instead the Reuters news agency yesterday announced that the Symanec asked to its users to disable its pcAnywhere software.

The situation is obviously serious and maybe hide other truths. Like me, you’re probably wondering which truths, but I can only venture a few hypotheses.

  • First, the theft of a source is a major event in the developer. I have a past as a expert developer and in all certainty I can say that the source code can be a goldmine for those who study it, in a particular way for applications developed in areas such as security and industry. Inside source code are always available notes and comments of the developers, a mine of information that provides details on the design of the system and also on those on who have made their contribution. This information makes it anything but a dated system!
  • Another consideration, who has developed a code knows that there is a great reuse of programming libraries, patterns and modules developed in the past years that are used as Lego building blocks in the composition of new products. Do not reinvent the wheel! Just reuse and modularity are the cornerstones of programming. Questionable how many and which of those bricks were stolen.
  • But what I find most disturbing is the silence of the Indian Military as a result of Symantec’s initial prosecution. It ‘obvious that there are other reasons, far more serious of the reputation of the security of indian network. But what is more important of the integrity of a military network. Reasonable to think that between government and the company there are other agreements underground, maybe a backdoor installed on the products available in the country, fanciful hypotheses as possible. The silence of the Indian authorities could also be tied to the fact that the agreement with the Symantec is just one of many, and that the kept sources code just a small slice of what is available. Have you wondered if on the same network were stored components of Apple IOS software or RIM OS? Does the term RINOA tells you nothing? Likely that the Indian government has kept secret to avoid to provide additional explanations that could reveal uncomfortable truths.

Let’s return then the announcement made yesterday by Symantec, most direct acknowledgement to date that the stolen source code put customers at risk of attack, that is why the company has requested to uninstall PcAnywhere, a software present in many Symantec bundle used manage remote access connection.

The decision was taken, however, only after the announcement that an attacker named YamaTough released the source code of PC software and Norton Utilities and he after he have threatened to publish widely used anti-virus programs. The company has published a white paper that indicates the situation is more serious.

“At this time, Symantec recommends disabling the product until Symantec releases a final set of software updates that resolve currently known vulnerability risks,” it said in the white paper. (bit.ly/wPzX7v).

“The code that has been exposed is so old that current out-of-the-box security settings will suffice against any possible threats that might materialize as a result of this incident,” it said on its website. (bit.ly/wqtxTI)

I conclude by raising serious doubts about the way in which Symantec is managing the event, a series of contradictory announcements that tend to hide the truth to the customer. Therefore what has already been exposed and what are the consequences for those who have used its products. A company likes Symantec should handle the matter in quite another way, no doubt giving greater transparency about the events.
Better the silence that lies.

Pierluigi Paganini

Refereces

http://www.reuters.com/article/2012/01/25/us-symantec-hacking-idUSTRE80O1UY20120125

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

FIN7 targeted a large U.S. carmaker phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

1 hour ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

6 hours ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

11 hours ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

14 hours ago

Linux variant of Cerber ransomware targets Atlassian servers

Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of…

1 day ago

Ivanti fixed two critical flaws in its Avalanche MDM

Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can…

1 day ago

This website uses cookies.