Attacks/Breaches
2/7/2012
12:05 PM
50%
50%

Extortion Plot Behind Anonymous Release Of pcAnywhere: Symantec

Symantec says Anonymous hackers tried to carry out an extortion plot before releasing source code to pcAnywhere; law enforcement agencies involved in sting and ongoing investigation.

Anonymous: 10 Facts About The Hacktivist Group
Anonymous: 10 Facts About The Hacktivist Group
(click image for larger view and for slideshow)

Anonymous appears to have released the source code to a 2006 version of the pcAnywhere remote access software from Symantec.

The AnonymousIRC channel on Twitter, a reliable source of Anonymous-related information, said late Monday that the group had indexed a copy of the pcAnywhere source code on The Pirate Bay, a Swedish site that indexes BitTorrent files available for download. The torrent file in question, billed as "Symantec's pcAnywhere Leaked Source Code" downloads a 1.27 GB file named "pcanywhere.rar." In comments on the download page, people said the RAR file extracted to 2.75 GB of data.

A message on the download page reads: "'Symantec has been lying to its customers. We exposed this point thus spreading the world that ppl need' - #AntiSec #Anonymous #AntiSec_Ops." Interestingly, the so-called AntiSec operation--formed by LulzSec and Anonymous--was meant to target security firms, on the grounds that they scared people into purchasing their wares. In reality, however, most AntiSec operations appeared to target governments and especially police departments. Now, however, AntiSec appears to have tackled one of the world's largest security vendor.

In an emailed statement to InformationWeek, Symantec confirmed that it had initially communicated with one or more hackers that claimed to possess its source code. "In January an individual claiming to be part of the 'Anonymous' group attempted to extort a payment from Symantec in exchange for not publicly posting stolen Symantec source code they claimed to have in their possession," said the company. "Symantec conducted an internal investigation into this incident and also contacted law enforcement given the attempted extortion and apparent theft of intellectual property. The communications with the person(s) attempting to extort the payment from Symantec were part of the law enforcement investigation."

Indeed, according to a collection of emails posted Monday to Pastebin under the account name "Sam Thomas," Yama Tough Monday issued an ultimatum, demanding that Symantec wire $50,000 into an offshore account within 10 minutes, or else "two of your codes fly to the moon PCAnywhere and Norton Antivirus totaling 2350MB in size." In addition, he said, "this time we've made mirrors so it will be hard for you to get rid of it."

The emails show Yama Tough contacting a Symantec employee named "Sam Thomas" beginning January 17, 2012. But Yama Tough had to switch from emailing Symantec directly, to emailing a Gmail account in Sam Thomas's name, since the file attachments he sent--to prove that he's really in possession of the stolen source code--don't seem to have gotten through Symantec's email server.

Subsequently, Symantec offered to pay Yama Tough, but not the amount that he'd requested. "We can't pay you $50,000 at once for the reasons we discussed previously," the emails read. "We can pay you $2,500 per month for the first three months. In exchange, you will make a public statement on behalf of your group that you lied about the hack (as you previously stated). Once that's done, we will pay the rest of the $50,000 to your account and you can take it all out at once. That should solve your problem."

According to Symantec, it was working with law enforcement officials when it communicated with Yama Tough. "The e-mail string posted by Anonymous was actually between them and a fake e-mail address set up by law enforcement," according to an emailed statement from Symantec. "Anonymous actually reached out to us, first, saying that if we provided them with money, they would not post any more source code. At that point, given that it was a clear cut case of extortion, we contacted law enforcement and turned the investigation over to them. All subsequent communications were actually between Anonymous and law enforcement agents--not Symantec. This was all part of their investigative techniques for these types of incidents." Symantec declined to detail the law enforcement agencies involved, saying their investigation was ongoing.

Negotiations aside, Yama Tough--who said he'd already shared the source code with Anonymous--apparently stuck by his ultimatum with the Monday release of the source code. Furthermore, the pcAnywhere release will apparently not be the last such disclosure. A Tuesday post to the Twitter channel "LoD"--for Lords of Dharmaraja, the self-described "Anonymous Avengers of Indian Independence Frontier"--promised that the source code to Norton AntiVirus would be released later in the day.

Yama Tough is the leader of Lords of Dharmaraja, which also claimed to possess memos between the Indian government and smartphone manufacturers, proving that the device makers had traded secret all-access codes to their hardware--backdoors--in exchange for access to India's telecommunications market. Many experts, however, think those memos were faked.

But other information stolen by the self-described hacktivist group appears to be real. That includes source code for an older Symantec's Norton antivirus product, as well as its pcAnywhere remote-access software.

Symantec at first dismissed claims that hackers possessed such source code. But it later recanted and said it had discovered that a 2006 security incident had resulted in the theft of some of its security software source code, including the complete source code--circa 2006--for pcAnywhere. That led Symantec to issue a rare security bulletin warning that all installations of pcAnywhere should be disabled or deleted unless absolutely needed, and then only used after locking down machines to help prevent the software from being exploited.

Subsequently, Symantec released an updated version of pcAnywhere that was patched against unknown vulnerabilities, but questions persist about whether malicious actors may yet unearth unknown--or zero-day--vulnerabilities that they could surreptitiously exploit in the latest version of the software.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8893
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) mainpage.jsp and (2) GetImageServlet.img in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-8894
Published: 2015-01-28
Open redirect vulnerability in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via the out parameter.

CVE-2014-8895
Published: 2015-01-28
IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote attackers to bypass intended access restrictions and read the image files of arbitrary users via a crafted URL.

CVE-2014-8917
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) dojox/form/resources/uploader.swf (aka upload.swf), (2) dojox/form/resources/fileuploader.swf (aka fileupload.swf), (3) dojox/av/resources/audio.swf, and (4) dojox/av/resources/video.swf in the IBM Dojo Toolkit, as used in IBM Social Media A...

CVE-2014-8920
Published: 2015-01-28
Buffer overflow in the Data Transfer Program in IBM i Access 5770-XE1 5R4, 6.1, and 7.1 on Windows allows local users to gain privileges via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If youíre a security professional, youíve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.