Perimeter
2/9/2012
02:14 PM
Tom Parker
Tom Parker
Commentary
50%
50%

Between Source Code And Cyanide

What the Symantec source-code leak really means

With all of the talk about source-code theft, extortion attempts by a shadowy probably-Anonymous-affiliated group, and most importantly the Giants winning the Super Bowl, I thought I’d spend a moment to reflect on what the release of source code for PCAnywhere and, in all likelihood, a depreciated version of Norton Antivirus could mean for the average persistent threat.

Much of the commentary on the topic, specifically that relating to PCAnywhere, has downplayed the release, owing to the age of the stolen code and number of active users. While it is true that installations of PCAnywhere certainly do not seem to be as widespread as they once were, it is certainly still out there and remains utilized by large private and government organizations. Although I don’t consider the release of PCAnywhere source to be particularly severe, I do question why Symantec chose to advise users to cease use of the product after the release and not before. And what makes it so sure that the product is now safe? In any case, the question of Norton Antivirus may be a little complex.

Targeting security products (whether that be an IDS, firewall, or AV product) is hot business these days, and vulnerabilities in antivirus engines can be extremely valuable to attackers if it means they are now able to slip an email attachment or drive-by download that would have otherwise been caught onto the target's system.

Anyone that has ever worked with, or had anything to do with, any kind of software product company will know that while names, logos, and even the interface for a product may change over time, the code behind it all will not necessarily follow suit. Even in circumstances where a “complete rewrite” has been done, they seldom ever are, and even in extreme cases we all know that a certain amount of CTRL-C/V action is going to go down somewhere along the way.

Note that although at the time that this was written the source code for Norton Antivirus does not appear to have been made public, we can safely assume that the stolen code has been shared privately, amongst a closed community associated with the individual responsible for the original heist.

So what does this all mean? Well, for the high-end adversary, probably not a whole lot as you’re likely to already have a copy of the source code. And it’s likely to be a much more recent version. On the other hand, folks who do not have a few hundred Gs laying around for bribing the employee of a software vendor so he’ll cut you a DVD full of source code are likely to see this as something of an opportunity. Through the use of not-uncommon analysis tools, figuring out which code segments are shared between the compromised source and possible modern derivatives thereof is a relatively trivial and inexpensive task.

While many groups who may do such a thing have probably put Symantec products under the microscope before, source-code analysis often opens up a whole, new world of subtle bugs in hard-to-reach regions of code that may have previously gone unnoticed. While the world's most well-funded and sophisticated actors are unlikely to find the release of source code particularly exciting, this may provide an excellent opportunity for less well-resourced groups involved in organized crime (such as botnet herders) and acts of industrial espionage to get one up on a product that has in the past spoiled the fun.

Tom Parker is Chief Technology Officer at FusionX.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sabrina
50%
50%
Sabrina,
User Rank: Apprentice
2/10/2012 | 6:55:04 AM
re: Between Source Code And Cyanide
Norton is not doing good after the source code leak and also many customers moved away from them-á
Georgeken
50%
50%
Georgeken,
User Rank: Apprentice
2/10/2012 | 5:22:39 AM
re: Between Source Code And Cyanide
pretty cool stuff mate.Symantec source code hack is spreading a lot .is that Norton AV performance is affected due to this hack?I am having this doubt from long before.
CPADEN000
50%
50%
CPADEN000,
User Rank: Apprentice
2/9/2012 | 10:41:51 PM
re: Between Source Code And Cyanide
Symantec-áanticipates that Anonymous will post the rest of the code they have claimed to have in their possession.-á So far, they have posted code for the 2006 versions of Norton Utilities and pcAnywhere. -áWe also anticipate that at some point, they will post the code for the 2006 versions of Norton Antivirus Corporate Edition and Norton Internet Security.-á As we have already stated publicly, this is old code, and Symantec and Norton customers will not be at an increased risk as a result of any further disclosure related to these 2006 products.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1421
Published: 2014-11-25
mountall 1.54, as used in Ubuntu 14.10, does not properly handle the umask when using the mount utility, which allows local users to bypass intended access restrictions via unspecified vectors.

CVE-2014-3605
Published: 2014-11-25
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-6407. Reason: This candidate is a reservation duplicate of CVE-2014-6407. Notes: All CVE users should reference CVE-2014-6407 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2014-6093
Published: 2014-11-25
Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 7.0.x before 7.0.0.2 CF29, 8.0.x through 8.0.0.1 CF14, and 8.5.x before 8.5.0 CF02 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-6196
Published: 2014-11-25
Cross-site scripting (XSS) vulnerability in IBM Web Experience Factory (WEF) 6.1.5 through 8.5.0.1, as used in WebSphere Dashboard Framework (WDF) and Lotus Widget Factory (LWF), allows remote attackers to inject arbitrary web script or HTML by leveraging a Dojo builder error in an unspecified WebSp...

CVE-2014-7247
Published: 2014-11-25
Unspecified vulnerability in JustSystems Ichitaro 2008 through 2011; Ichitaro Government 6, 7, 2008, 2009, and 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; and Ichitaro 2014 Tetsu allows remote attackers to execute arbitrary code via a crafted file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?