Perimeter
2/9/2012
02:14 PM
Tom Parker
Tom Parker
Commentary
50%
50%

Between Source Code And Cyanide

What the Symantec source-code leak really means

With all of the talk about source-code theft, extortion attempts by a shadowy probably-Anonymous-affiliated group, and most importantly the Giants winning the Super Bowl, I thought I’d spend a moment to reflect on what the release of source code for PCAnywhere and, in all likelihood, a depreciated version of Norton Antivirus could mean for the average persistent threat.

Much of the commentary on the topic, specifically that relating to PCAnywhere, has downplayed the release, owing to the age of the stolen code and number of active users. While it is true that installations of PCAnywhere certainly do not seem to be as widespread as they once were, it is certainly still out there and remains utilized by large private and government organizations. Although I don’t consider the release of PCAnywhere source to be particularly severe, I do question why Symantec chose to advise users to cease use of the product after the release and not before. And what makes it so sure that the product is now safe? In any case, the question of Norton Antivirus may be a little complex.

Targeting security products (whether that be an IDS, firewall, or AV product) is hot business these days, and vulnerabilities in antivirus engines can be extremely valuable to attackers if it means they are now able to slip an email attachment or drive-by download that would have otherwise been caught onto the target's system.

Anyone that has ever worked with, or had anything to do with, any kind of software product company will know that while names, logos, and even the interface for a product may change over time, the code behind it all will not necessarily follow suit. Even in circumstances where a “complete rewrite” has been done, they seldom ever are, and even in extreme cases we all know that a certain amount of CTRL-C/V action is going to go down somewhere along the way.

Note that although at the time that this was written the source code for Norton Antivirus does not appear to have been made public, we can safely assume that the stolen code has been shared privately, amongst a closed community associated with the individual responsible for the original heist.

So what does this all mean? Well, for the high-end adversary, probably not a whole lot as you’re likely to already have a copy of the source code. And it’s likely to be a much more recent version. On the other hand, folks who do not have a few hundred Gs laying around for bribing the employee of a software vendor so he’ll cut you a DVD full of source code are likely to see this as something of an opportunity. Through the use of not-uncommon analysis tools, figuring out which code segments are shared between the compromised source and possible modern derivatives thereof is a relatively trivial and inexpensive task.

While many groups who may do such a thing have probably put Symantec products under the microscope before, source-code analysis often opens up a whole, new world of subtle bugs in hard-to-reach regions of code that may have previously gone unnoticed. While the world's most well-funded and sophisticated actors are unlikely to find the release of source code particularly exciting, this may provide an excellent opportunity for less well-resourced groups involved in organized crime (such as botnet herders) and acts of industrial espionage to get one up on a product that has in the past spoiled the fun.

Tom Parker is Chief Technology Officer at FusionX.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sabrina
50%
50%
Sabrina,
User Rank: Apprentice
2/10/2012 | 6:55:04 AM
re: Between Source Code And Cyanide
Norton is not doing good after the source code leak and also many customers moved away from them-á
Georgeken
50%
50%
Georgeken,
User Rank: Apprentice
2/10/2012 | 5:22:39 AM
re: Between Source Code And Cyanide
pretty cool stuff mate.Symantec source code hack is spreading a lot .is that Norton AV performance is affected due to this hack?I am having this doubt from long before.
CPADEN000
50%
50%
CPADEN000,
User Rank: Apprentice
2/9/2012 | 10:41:51 PM
re: Between Source Code And Cyanide
Symantec-áanticipates that Anonymous will post the rest of the code they have claimed to have in their possession.-á So far, they have posted code for the 2006 versions of Norton Utilities and pcAnywhere. -áWe also anticipate that at some point, they will post the code for the 2006 versions of Norton Antivirus Corporate Edition and Norton Internet Security.-á As we have already stated publicly, this is old code, and Symantec and Norton customers will not be at an increased risk as a result of any further disclosure related to these 2006 products.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-8090
Published: 2014-11-21
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nes...

CVE-2014-8469
Published: 2014-11-21
Cross-site scripting (XSS) vulnerability in Guests/Boots in AdminCP in Moxi9 PHPFox before 4 Beta allows remote attackers to inject arbitrary web script or HTML via the User-Agent header.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?