Symantec expects Anonymous to publish more stolen source code

Confirms that BitTorrent file is pcAnywhere's source code after sting operation fails

By , Computerworld |  Security, anonymous, pcanywhere

The negotiations went on for nearly a month -- the emails began on Jan. 18 -- but broke down when Yama Tough rejected Thomas' conditions, which included an offer of payments of $2,500 each month for the first three months, with the balance to be paid on proof that the copy of the stolen source code had been destroyed.

Yama Tough tried to spin a different story on Twitter.

"They've been tricked trolled into offering a bribe so the false statement be [sic] made we never had the code and lied =)," Yama Tough said yesterday in a tweet .

Symantec's Paden also said today that it expects Anonymous to shortly publish source code belonging to other products.

"We also anticipate Anonymous to post the rest of the code they have claimed have in their possession," Paden said. "So far, they have posted code for the 2006 version of Norton Internet Security and pcAnywhere. We also anticipate that at some point, they will post the code for Norton Antivirus Corporate Edition and Norton SystemWorks. Both products no longer exist."

Yama Tough promised that the source code for Norton Antivirus (NAV) Corporate Edition would hit the Web today. "NAV release coming in seven hours," Yama Tough said on Twitter about six hours ago.

Two weeks ago, Symantec took the unprecedented step of telling users of pcAnywhere to disable or uninstall the software until it could finish patching vulnerabilities it had uncovered. Symantec wrapped up that patching last week, and gave the all-clear to customers .

Symantec has also offered free upgrades to pcAnywhere 12.5 for users of editions prior to version 12.0.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer , on Google+ or subscribe to Gregg's RSS feed . His e-mail address is .

See more articles by Gregg Keizer .

Originally published on Computerworld |  Click here to read the original story.
Join us:






Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a Question