赛门铁克pcAnywhere泄漏源码

2012-02-07 23:44:09 +08:00
 JesseZ
Symantec's pcAnywhere Leaked Source Code
http://thepiratebay.se/torrent/7014253/Symantec_s_pcAnywhere_Leaked_Source_Code

oth:
YamaTough Hacker Demanded $50,000 for not releasing Stolen Symantec Source Code


According to email transcripts posted to Pastebin yesterday, and confirmed by the company, a group of hackers attempted to extort $50,000 from Symantec in exchange for not releasing its stolen PCAnywhere and Norton Antivirus source code. Hackers associated with the group Anonymous known as the Lords of Dharamaja leaked what appears to be another 1.27 gigabytes of source code from Symantec Monday night, what they claim is the source code of the Symantec program PCAnywhere.

A 1.2GB file labeled "Symantec's pcAnywhere Leaked Source Code" has been posted to The Pirate Bay. We have asked Symantec whether this code is authentic and will update when we hear back.



The leak comes as little surprise: Symantec had previously revealed that the hackers had obtained 2006 versions of that code along with other Symantec products from the same time period, and warned users of PCAnywhere to disable its functionality until they patched the program earlier this month.

The emails between Symantec employee Sam Thomas and the hacker(s) Yamatough, began in January. Symantec confirmed in a statement that it had contacted law enforcement after confirming the theft of the code and that the email exchange was, in fact, part of a criminal investigation. The email thread ended yesterday with Yamatough threatening to immediately release the code:

Since no code yet being released and our email communication wasn't also released we give you 10 minutes to decide which way you go after that two of your codes fly to the moon PCAnywhere and Norton Antivirus totaling 2350MB in size (rar) 10 minutes if no reply from you we consider it a START this time we've made mirrors so it will be hard for you to get rid of it.

“You won’t believe it but Symantec offered us money to keep quiet,” a hacker from the group who uses the name YamaTough wrote on Twitter. “And quess what they couldn’t make it over 50k for the whole range of their src shit, therefore the show starts as of tuday.”In fact, Symantec says it never made any offer to meet the hackers’ extortion demands. “Sam Thomas,” Symantec spokesperson Cris Paden told , was the false name created by law enforcement agents who pretended to pursue the negotiations only to attempt to trace the hackers.

Read the entire leaked email chain between the hacker YamaTough and the law enforcement agent pretending to be a Symantec exec here.

from:http://thehackernews.com/2012/02/yamatough-hacker-demanded-50000-for-not.html?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Daily+Cyber+News+Updates%29
4807 次点击
所在节点    分享发现
2 条回复
fline
2012-02-07 23:46:15 +08:00
《黑客勒索赛门铁克实为执法机构圈套》 http://www.cnbeta.com/articles/171800.htm
JesseZ
2012-02-07 23:49:34 +08:00
"Symantec has been lying to its customers. We exposed this point thus spreading the world that ppl need" - #AntiSec #Anonymous


Spread and share!


AntiSec称“赛门铁克向它的用户撒谎,所以我们揭露此举并向世界上有需要的人提供这个”。

这是一个专为移动设备优化的页面(即为了让你能够在 Google 搜索结果里秒开这个页面),如果你希望参与 V2EX 社区的讨论,你可以继续到 V2EX 上打开本讨论主题的完整版本。

https://www.v2ex.com/t/26859

V2EX 是创意工作者们的社区,是一个分享自己正在做的有趣事物、交流想法,可以遇见新朋友甚至新机会的地方。

V2EX is a community of developers, designers and creative people.

© 2021 V2EX