back to article Who pwns the watchmen? Maybe Russians selling the source code for three US antivirus vendors

A Russian hacking outfit says it has stolen confidential data from a trio of US antivirus companies. Security firm Advanced Intelligence (AdvIntel) has "high confidence" in the legitimacy of a posting from hacking group calling itself Fxmsp, which is advertising data and source code from the three unnamed AV companies. …

  1. Anonymous Coward
    Anonymous Coward

    Is this the data..

    That finally reveal that AV programs are just random number generators with interesting sounding messages embedded in them?

    1. Dan 55 Silver badge

      Re: Is this the data..

      Don't forget tickling the kernel in just the right places to cause BSODs or program lock-ups every once in a while.

      1. 404

        Re: Is this the data..

        That's how you know it's working lmfao...

    2. Nick Kew
      Big Brother

      Time for conspiracy theories

      More interestingly, the data that reveals the NSA spy.

      Who's going to reverse engineer the protocol for communicating with a clandestine messenger in a router, to phone nsahome without making an IP connection that would soon be spotted as suspicious? Resolve the question of all the sound and fury over Huawei?

  2. EVP

    Human factory

    How does that perv in the photo relate to the story? I cannot imagine any self-respecting cracker to use a tablet to do cracking and to wear such apparel while penetrating AV vendors. There is a time and place for masked penetration, but I believe it doesn’t usually involve computers. One zipper on the mask is missing too.

    Anyway, it’s a big loss for the companies breached. I just cannot believe them to be techinally that incompetent, but there has to be a human factor involved in those breaches. Then again, I could be wrong.

    1. Anonymous Coward
      Anonymous Coward

      Re: Human factor.

      Most accurate successful "hacker" there is.

      The human aspect and physical access. Nick the device with valid logins. This the location and the ipad.

      The mask? Not to hide while stealing the device but so the mark does not recognize you when you threaten them to get the pin. As who needs to hack the secure enclave when they can give you the pin?

      Though in reality I'd never want any data worth that much to attack me for!

  3. Terry 6 Silver badge

    It's kind of worrying if these companies don't have source code air gapped. In my naive innocent mind I'd always, if I'd thought about it at all, imagined that the key coding and design work would be in a top security location with absolutely no contact to the public (or any external) network whatsoever.

    Now we'll probably find out that they work from their local branch of Costa using a mate's laptop.

    1. NoneSuch Silver badge
      Coffee/keyboard

      Air-gapping is a term thrown around by PC magazine columnists. It's not easy to set up, maintain or police. As long as you have users on that network, it will drive your security bods mad with their continuous attempts at idiocy.

      1. Terry 6 Silver badge

        I was thinking more along the lines of....

        https://www.dropbox.com/s/jg6ogty0art3615/DSCN6654.jpg?dl=0

    2. Nick Kew

      Perhaps the code was just pulled from somewhere you'd never think to look for anything top-secret.

      Like github.

    3. Anonymous Coward
      Anonymous Coward

      Security theory v security practice

      Having worked briefly with a organisation that (allegedly) are extremely strict about security it came as a surprise to discover the actual route for transferring patches to the secure networks was briefly switch cables between computers and then do a file transfer using a certain well-known database port because the IDS didn't monitor it.

  4. adam payne

    Russian hacking outfit says it has stolen confidential data from a trio of US antivirus companies.

    Mcafee, Symantec but who else?!?

    1. jon909

      Mcafee, Symantec but who else?!?

      Trend Micro? Are they still considered American now their HQ is in Japan?

    2. x 7

      Mcafee, Symantec but who else?!?

      No great loss there with those two........

      crap software that gums machines up

    3. martinusher Silver badge

      Not really "Russians".....

      That's muddying the water a bit.....the group is international (like a lot of modern development groups) and their membership includes Russians (because they're a) cheap and b) well educated).

      The big story that wasn't mentioned in this article is that the hackers got in through spearfishing. You would have thought that anti-virus companies of all organizations would know better, they'd have extensive precautions against hostile mail scripts and they'd have their source code well guarded. But then I expect they're like any other enterprise (see the WSL article and thread) .... the front office does its Office thing its way and doesn't really take any notice of those troglodytes around the back who are doing the development work.

      1. Anonymous Coward
        Anonymous Coward

        Spearfishing.

        You can install as much AV as you like. But securing the users... that's the hard part.

  5. Stevie

    Bah!

    The one piece of information that everyone who opened this article would want to see is, curiously, missing.

    So much for journalism.

  6. Camilla Smythe

    Is that...

    $300,000 to fix it for them?

  7. Anonymous Coward
    Anonymous Coward

    Seriously, as someone in the industry that has to recommend AV software to customers - I think I am going to tell them all to switch to Windows Defender or unplug from the internet. But then again, if sales bonuses weren't so dependent on maxing out add ons to basic hardware that there are no margins on, and of course why would they buy the basic hardware if they can't use it on the internet to watch "kitty" videos.

  8. JimC

    I wonder if the time will come

    When all business networks have to be air gapped from the Internet. But my goodness, it will be a mega pain to enforce as nonesuch alludes above.

  9. 33rpm

    Explains the Resignation

    https://www.ft.com/content/e1a4e3c2-729d-11e9-bf5c-6eeb837566c5

    Symantec on Thursday said Greg Clark, its president and chief executive, had stepped down, sending shares in the US cyber security company tumbling as much as 15 per cent in after-hours trade.

    The Norton antivirus maker said Mr Clark’s resignation was “effective immediately” and that it had appointed Richard Hill, a Symantec director and the former chief executive of Novellus Systems, as interim president and chief executive. Symantec said it would now search for a replacement.

  10. Anonymous Coward
    Anonymous Coward

    meh

    "AdvIntel says that late last month the group began advertising in various darknet forums that it had obtained network access and source code for the three companies and was selling its purloined loot for the sum of $300,000."

    meh,

    From what I know of AV products the source code is is probably identical to most Android apps...

    Packed full of SDK's from Facebook and Google that slurp up users data to be served up ads and exploit users fears with scary warnings that push users to install even more "security" products from their affiliates.

  11. Yet Another Anonymous coward Silver badge

    Isn't this good news?

    Wouldn't good security products publish source code for widespread inspection and audit ?

    1. Terry 6 Silver badge

      Re: Isn't this good news?

      As i understand this (and there are people on El Reg who actually knowabout this stuff and will probably shoot me down for this) the deep inner workings of the AV software is kept secret so that the bad guys can't look for ways to subvert it.

      1. Joe Montana

        Re: Isn't this good news?

        The bad guys do have access to the source code via illicit means (as this story demonstrates), keeping source secret only hurts the legitimate users.

        And bad guys can (and do) look for circumvention methods without needing the source code anyway.

        1. Terry 6 Silver badge

          Re: Isn't this good news?

          There's a significant gap between why they (try to) do it and whether it works. So that's kind of not the point.

          1. doublelayer Silver badge

            Re: Isn't this good news?

            This is when security through obscurity actually has a chance, because security for an antivirus is very different than security for an operating system. The difference is this:

            OS security: Malware can't get in, malware can't escalate, etc.

            AV security: malware can't evade

            In other words, malware wants to break into and exploit things in the operating system, but just wants to hide from antivirus. So the operating system components need to be audited by a lot of people to understand how they work and try to identify any holes before the malware people find them, but the antivirus system needs to prevent the malware writers from doing the same kind of thing to its code.

            1. Terry 6 Silver badge

              Re: Isn't this good news?

              Which makes worryingly good sense.

              1. Michael Wojcik Silver badge

                Re: Isn't this good news?

                It might, if attackers couldn't easily acquire AV products and do the same sort of reverse engineering on them that researchers do on malware.

                Reverse engineering a large software package is resource-intensive and so very, very boring,1 but as with most software a majority of the code in an AV product is UI and infrastructure, and can be ignored. It's not especially hard for attackers to find the interesting stuff - OS hooks, ALPCs, logic for behavioral heuristics, etc - and gain a useful understanding of what it's doing.

                For that matter, once they have the AV running in a controlled environment, ambitious attackers could use instrumentation and automated-fuzzing techniques (similar to what American Fuzzy Lop does, for example) to "evolve" malware variants that evade particular AV packages in a largely-unsupervised fashion.

                I don't think confidential source code represents a significant security benefit to AV and other anti-malware products. Motivated attackers can derive the information they need regardless. The source would mostly be of benefit to competitors - and even then not a lot of benefit - and to users who want to break the licensing mechanism or fork the source.

                1But then attention is a resource too.

  12. onebignerd

    People

    People will always be the weakest link in securing PCs or network. The systems at Iran's secret nuclear facility hit with Stuxnet was air gaped.

    The NSA cracked most of the AV suites to spy with soon after 9/11, Kaspersky was the only one they couldn't as of the Snowden leaks.

  13. normal1

    So, CLAMAV?

    It seems the open source way may be better than security through obscurity?

    1. Anonymous Coward
      Anonymous Coward

      Re: So, CLAMAV?

      If you like your virus checker to randomly pick a handful of files every few months to mark as 'Suspect', then Clam is the one for you!

      (A few years ago it started flagging busybox as a trojan [/bin/busybox: Unix.Trojan.Mirai-5607459-1 FOUND], it's also got upset about wireless card drivers in a standard Ubuntu install too)

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like