SlideShare una empresa de Scribd logo
1 de 9
SYMANTEC CODE RELEASED! SO WHAT?

                                 What it means to users

                                     The Lorenzi Group




(C) 2012 THE LORENZI GROUP LLC
SYMANTEC
•    Largest maker of security software for computers in the world


•    Based in Mountain View, CA USA
•    Sample of Brand Names: Symantec, Norton, Ghost, Veritas, Endpoint,
•    Publicly Traded: SYMC
•    F500 and S&P 500
•    Employees: +18,000
•    Revenue: $6B


•    NOTE: Symantec, Norton, Ghost, Veritas, & Endpoint are products and brand names own
     by Symantec Corporation.



(C) 2012 THE LORENZI GROUP LLC
EVENT

•    A hacker with the screen name “Yama Tough” from the Indian hacking group Lords of
     Dhramaraja penetrated a 3rd party’s IT security (NOTE: This unconfirmed 3rd party
     organization, held sensitive Symantec documentation) and stole the source code for
     Symantec’s Endpoint and AntiVirus products.




(C) 2012 THE LORENZI GROUP LLC
RESULTS
•    Confidential source code (the core software of the programs) has been released publicly
     by the hackers and posted online.
•    Symantec claims there will be little effect on users.
•    Experts disagree with Symantec’s assessment that this is a minor event and that it will not
     affect a significant amount of users.




(C) 2012 THE LORENZI GROUP LLC
WHY DO EXPERTS DISAGREE WITH SYMANTEC?
1. The software isn’t as old or out-dated as Symantec makes it appear
2. The software is currently being used by many organizations around the world
3. Most software today is built to be modular, meaning that pieces are created individually
   and connected together using code. This is done to create more flexibility and reduce
   design costs. It is unrealistic to think that some parts or all of this leaked code is not
   being used in some format or style in current or future Symantec software.
4. Even if none of the code is used in current software, the leaked and posted
   documentation gives hackers and professional criminals insight into the software
   languages being used by Symantec, the format of the code, the Symantec coding
   process, and ideas on how Symantec things about software security.




(C) 2012 THE LORENZI GROUP LLC
HOW DID THIS HAPPEN?
•    Set it and Forget it Security:
      • Symantec and it’s 3 rd party organizations set up AntiVirus, AntiSpyware, and
        Firewalls and do not actively monitor them.
•    Symantec does not have proper BAA’s (Business Associate Agreements) in place.
•    Symantec does not properly audit 3 rd parties that hold confidential data
•    Symantec and it’s 3 rd parties do not proactively monitor their networks and devices for
     anomalies
•    It is HIGHLY likely that “Yama Tough” or another member of Lords of Dhramaraja is an
     employee of Symantec or it’s 3 rd party partner.


•    Set It and Forget It Security is DEAD! Proactive monitoring of networks and devices
     24x7, and the use of AV/AS software, Firewalls, and DLP devices, are the only way to
     protect data today.



(C) 2012 THE LORENZI GROUP LLC
WHY YOU SHOULD CARE
•    If you use Symantec software, you are at risk. NOTE: It can be ANY software from
     Symantec, not just their AntiVirus software.
•    If you have friends, family, peers, or interact with organizations that use Symantec
     software, you are at risk.
•    Expect to receive an increase of emails, posts, IM requests, and SPAM because of this.
     Accidently clicking on any of these may expose your data.




(C) 2012 THE LORENZI GROUP LLC
WHAT YOU CAN DO
•    Run all software updates for Operating Systems and Antivirus, AntiSpyware, and Firewall
     software.
•    Run Software and Firmware updates for Firewalls, DLP, and other security devices.
•    Educate employees on the potential new wave of threats, their risks, and how to avoid
     them.
•    Begin evaluating AntiVirus software from vendors other than Symantec.
•    Begin proactively monitoring all traffic on network devices, including those of remote and
     mobile workers.




(C) 2012 THE LORENZI GROUP LLC
THE LORENZI GROUP

                                          Digital Forensics
                                            Data Security
                         Proactive Network & Device monitoring (Lorenzi ANM)
                                 Research & Reputation Management


                                           866-632-9880
                                      www.thelorenzigroup.com
                                      info@thelorenzigroup.com




(C) 2012 THE LORENZI GROUP LLC

Más contenido relacionado

Destacado (11)

ALGO BREVE DE UN BLOG
ALGO BREVE DE UN BLOGALGO BREVE DE UN BLOG
ALGO BREVE DE UN BLOG
 
Indices 18 sep2013051422
Indices 18 sep2013051422Indices 18 sep2013051422
Indices 18 sep2013051422
 
Seminari coordinaciópile 3 ceb
Seminari coordinaciópile 3 cebSeminari coordinaciópile 3 ceb
Seminari coordinaciópile 3 ceb
 
ექსკრეტორული სისტემა
ექსკრეტორული სისტემაექსკრეტორული სისტემა
ექსკრეტორული სისტემა
 
Modul Řízení značky
Modul Řízení značkyModul Řízení značky
Modul Řízení značky
 
Manifesto do shopping popular
Manifesto do shopping popularManifesto do shopping popular
Manifesto do shopping popular
 
PresentacióN1ppt
PresentacióN1pptPresentacióN1ppt
PresentacióN1ppt
 
Abs 2
Abs 2Abs 2
Abs 2
 
Thiago y diego la inmigracion e precidencias
Thiago y diego la inmigracion e precidenciasThiago y diego la inmigracion e precidencias
Thiago y diego la inmigracion e precidencias
 
José antonio aragón roldán pte mpl de mixtepec
José antonio aragón roldán pte mpl de mixtepecJosé antonio aragón roldán pte mpl de mixtepec
José antonio aragón roldán pte mpl de mixtepec
 
Sspp seminar 2014 #2
Sspp seminar 2014   #2Sspp seminar 2014   #2
Sspp seminar 2014 #2
 

Más de The Lorenzi Group

ROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat HelperROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat Helper
The Lorenzi Group
 
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
The Lorenzi Group
 
ROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital Enviroments
The Lorenzi Group
 
ROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture PerfectROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture Perfect
The Lorenzi Group
 

Más de The Lorenzi Group (20)

Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out
 
ROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat HelperROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat Helper
 
ROAR for IT Managers
ROAR for IT ManagersROAR for IT Managers
ROAR for IT Managers
 
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
 
The Many Faces of SHIELD
The Many Faces of SHIELDThe Many Faces of SHIELD
The Many Faces of SHIELD
 
ROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital Enviroments
 
ROARing Compliance
ROARing ComplianceROARing Compliance
ROARing Compliance
 
ROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture PerfectROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture Perfect
 
ROAR in Pictures: Biking
ROAR in Pictures: BikingROAR in Pictures: Biking
ROAR in Pictures: Biking
 
DDoS Explained
DDoS ExplainedDDoS Explained
DDoS Explained
 
Digital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' DilemmaDigital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' Dilemma
 
Rising Cost of Child Porn Defense
Rising Cost of Child Porn DefenseRising Cost of Child Porn Defense
Rising Cost of Child Porn Defense
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
 
So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....
 
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next FrontierDigital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
 
Digital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial ExecutiveDigital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial Executive
 
Digital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesDigital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR Executives
 
eDiscovery IS Data Security
eDiscovery IS Data SecurityeDiscovery IS Data Security
eDiscovery IS Data Security
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of Mind
 
Introduction to the Epsilon Data Breach
Introduction to the Epsilon Data BreachIntroduction to the Epsilon Data Breach
Introduction to the Epsilon Data Breach
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

The long term effects of Symantec's Code Leak

  • 1. SYMANTEC CODE RELEASED! SO WHAT? What it means to users The Lorenzi Group (C) 2012 THE LORENZI GROUP LLC
  • 2. SYMANTEC • Largest maker of security software for computers in the world • Based in Mountain View, CA USA • Sample of Brand Names: Symantec, Norton, Ghost, Veritas, Endpoint, • Publicly Traded: SYMC • F500 and S&P 500 • Employees: +18,000 • Revenue: $6B • NOTE: Symantec, Norton, Ghost, Veritas, & Endpoint are products and brand names own by Symantec Corporation. (C) 2012 THE LORENZI GROUP LLC
  • 3. EVENT • A hacker with the screen name “Yama Tough” from the Indian hacking group Lords of Dhramaraja penetrated a 3rd party’s IT security (NOTE: This unconfirmed 3rd party organization, held sensitive Symantec documentation) and stole the source code for Symantec’s Endpoint and AntiVirus products. (C) 2012 THE LORENZI GROUP LLC
  • 4. RESULTS • Confidential source code (the core software of the programs) has been released publicly by the hackers and posted online. • Symantec claims there will be little effect on users. • Experts disagree with Symantec’s assessment that this is a minor event and that it will not affect a significant amount of users. (C) 2012 THE LORENZI GROUP LLC
  • 5. WHY DO EXPERTS DISAGREE WITH SYMANTEC? 1. The software isn’t as old or out-dated as Symantec makes it appear 2. The software is currently being used by many organizations around the world 3. Most software today is built to be modular, meaning that pieces are created individually and connected together using code. This is done to create more flexibility and reduce design costs. It is unrealistic to think that some parts or all of this leaked code is not being used in some format or style in current or future Symantec software. 4. Even if none of the code is used in current software, the leaked and posted documentation gives hackers and professional criminals insight into the software languages being used by Symantec, the format of the code, the Symantec coding process, and ideas on how Symantec things about software security. (C) 2012 THE LORENZI GROUP LLC
  • 6. HOW DID THIS HAPPEN? • Set it and Forget it Security: • Symantec and it’s 3 rd party organizations set up AntiVirus, AntiSpyware, and Firewalls and do not actively monitor them. • Symantec does not have proper BAA’s (Business Associate Agreements) in place. • Symantec does not properly audit 3 rd parties that hold confidential data • Symantec and it’s 3 rd parties do not proactively monitor their networks and devices for anomalies • It is HIGHLY likely that “Yama Tough” or another member of Lords of Dhramaraja is an employee of Symantec or it’s 3 rd party partner. • Set It and Forget It Security is DEAD! Proactive monitoring of networks and devices 24x7, and the use of AV/AS software, Firewalls, and DLP devices, are the only way to protect data today. (C) 2012 THE LORENZI GROUP LLC
  • 7. WHY YOU SHOULD CARE • If you use Symantec software, you are at risk. NOTE: It can be ANY software from Symantec, not just their AntiVirus software. • If you have friends, family, peers, or interact with organizations that use Symantec software, you are at risk. • Expect to receive an increase of emails, posts, IM requests, and SPAM because of this. Accidently clicking on any of these may expose your data. (C) 2012 THE LORENZI GROUP LLC
  • 8. WHAT YOU CAN DO • Run all software updates for Operating Systems and Antivirus, AntiSpyware, and Firewall software. • Run Software and Firmware updates for Firewalls, DLP, and other security devices. • Educate employees on the potential new wave of threats, their risks, and how to avoid them. • Begin evaluating AntiVirus software from vendors other than Symantec. • Begin proactively monitoring all traffic on network devices, including those of remote and mobile workers. (C) 2012 THE LORENZI GROUP LLC
  • 9. THE LORENZI GROUP Digital Forensics Data Security Proactive Network & Device monitoring (Lorenzi ANM) Research & Reputation Management 866-632-9880 www.thelorenzigroup.com info@thelorenzigroup.com (C) 2012 THE LORENZI GROUP LLC