Norton Scientific Reviews

Norton Scientific Reviews Source Code Leaked by Hackers

A group of hackers who call themselves the Lords of Dharmaraja, (and is associated with Anonymous) have published the source code of Symantec, a digital security firm know for the Norton antivirus program and pcAnywhere, raising concerns that others could exploit the security holes and try to control the users computer.

 

CanWest Global Place, Winnipeg -- (SBWIRE) -- 02/10/2012 -- A group of hackers who call themselves the Lords of Dharmaraja, (and is associated with Anonymous) have published the source code of Symantec, a digital security firm know for the Norton antivirus program and pcAnywhere, raising concerns that others could exploit the security holes and try to control the users computer.

The release of the source code came after the 'extortion' attempt failed as Symantec did not comply with their numerous deadlines.

Negotiations through email messages between a representative of the hacker group, YamaTough, and someone from Symantec were also released online. The exchange of messages are about Symantec's offer to pay USD 50,000 for the hackers to stop disclosing the source code and announce to the public that the whole Symantec hack was a fake, which made them a subject of mockery for appearing to buy protection.

Both sides admitted that their participation was just a trick.

The hackers denied any extortion aim, saying that they never intended to take the money and were going to publish the source code whatever happens; they simply want to humiliate them so they played along. While Symantec said that they are not actually the one in communication with the hacker, but a law enforcement agent.

The long negotiation worked to the favor of Symantec as they have been able to come up with patches to theirNorton and pcAnywhere programs. Symantec has advised their users to stop using the softwares in the meantime until they have issued more patches for them.

Symantec released a statement saying that they have always been prepared for the leak of the source code so they've made and distributed hotfixes on January to secure their users.

The drawn-out negotiation is an obvious sign of a law enforcer on the other line. Delaying tactics is one of their assets to obtain insight into the enemy. More importantly, it will create more transactions where paper trail will be left along the way -- utilizing persons who have been involved in the process and the records themselves to trace the suspects.

It has been a common ploy of investigators like the FBI who deal with kidnappers or extortionists to break down the amount into several smaller payouts.