- Jan 8, 2017
- 1,320
Symantec, McAfee and Trend Micro: Fxmsp Chat Logs Reveal the Hacked Antivirus Vendors, AVs Respond
So using an AV that 'nobody cares about' is probably not a bad idea. Using no AV at all and relying on locking down Windows, SRP, Anti-EXE and other things is probably an even better idea. But if you insist on using an AV perhaps it is wise to consider one of the less popular ones
Clearly lateral movement within these networks was not guarded. That's actually incredibly lame for security computers... Also, many (including myself) have advocated here a form of security through obscurity.
That often, it isn't wise to use what everyone else, or even a significant portion of people use. Especially if that usage places you in the company of targets - that is a product many targeted people (for whatever reason) would themselves use. As that fact would increase the threat surface of the product and everyone using it. If you think AV companies can contain their code and maintain secrecy and safety you are wrong. Not even Kaspersky can do that as we found out in a serious of breaches of them as well.
So using an AV that 'nobody cares about' is probably not a bad idea. Using no AV at all and relying on locking down Windows, SRP, Anti-EXE and other things is probably an even better idea. But if you insist on using an AV perhaps it is wise to consider one of the less popular ones.
Emsisoft is divergent in that their distributed company format could potentially give it greater security and privacy if they conduct it with efficient and serious protections. But if they aren't diligent that distributed environment could expose them to ancillary breaches.
Trend, Symantec and McAfee are largely rendered irrelevant now. This theft appears extensive. They'd have to re-engineer their entire product line to overcome such a wide ranging theft if the reports are accurate. As a result, I would immediately cease usage of all three products. Also keep in mind, if you use a router with Trend Micro, that could also be a problem as it shares code from the desktop versions in how it manages web filtration. I'd expect as more leaks unfold the detection level of exploits of these products escalates accordingly.
PS: SIGNIFICANT portions of US Govt., Infrastructure and Military use the above three products.
Imagine if you were using Trend. That bleepingcomputer piece is pretty concerning if those chat logs are real.
Yeah it would be rocky times at Trend I do say @blackice ... I fully agree. Not good by any means. If those chat logs are true and can be verified one way or another the folks at Trend gotta be shaking in their boots per say..
Any company that has been subject to this type of stuff would be shaking in their boots really. Honeypot theory or no honeypot theory - not good!
What is a honeypot in security lingo? Do a small Dr. Google search and anyone can find out. Needless to day, if these folks got the actual stuff then all bets are off on what may happen. Sad day n' age we live in. I hope things shake out ok for the companies - all companies - involved.
~Brian
I’m familiar with honeypots. But if they play a game of obfuscation on what really happened it’ll make a lot of customers feel burned. I don’t know if any business would agree to that. Not to mention Symantec having a high profile employee step down within a day.
Maybe most people won't make the connection between Norton and Symantec, especially not its LifeLock customers, ya think? Wow.
Oh honeypots wasn't directed to you but just in general for folks. No worries.
Yeah something fishy is goin' on that's for sure. I don't believe for one second that its just really coincidence that those folks are stepping down at this point of time.. If it is coincidence then very bad coincidence it is indeed..Obfuscation no good comes from obfuscation .. You are right!
A lot of folks will feel burned for sure. Great points @blackice !
~Brian
"Symantec is aware of recent claims that a number of US-based antivirus companies have been breached. We have been in contact with researchers at AdvIntel, who confirmed that Symantec (Norton) has not been impacted. We do not believe there is reason for our customers to be concerned."
Trend MicroA statement we received from AdvIntel agrees with Symantec's comment, noting that more proof was required in order to conclude that an unauthorized entity was indeed present on Symantec's network.
"We have an active investigation underway related to recent claims, and while it is not complete, we want to transparently share what we have learned. Working closely with law enforcement, our global threat research and forensic teams are leading this investigation. At this moment, we are aware that unauthorized access had been made to a single testing lab network by a third party and some low-risk debugging related information was obtained. We are nearing the end of our investigation and at this time we have seen no indication that any customer data nor source code were accessed or exfiltrated. Immediate action was taken to quarantine the lab and additionally secure all corresponding environments. Due to the active nature of the investigation, we are not in a position to share any additional information, but we will provide an update when additional insights become available and can be disclosed."
McAfeeAccording to Boguslavskiy, Trend Micro's statement is incorrect.
"McAfee is aware of this threat claim targeting the industry. We’ve taken necessary steps to monitor for and investigate it."
The question should be not if there will be others to follow (it would IMO) but whether if we find out it or not. Very strange thing that only US based companies were attacked.I wonder if there will be others to follow.
So which ones are not popular? Nano? Dr. Web? K7 Computing? ZoneAlarm?So using an AV that 'nobody cares about' is probably not a bad idea. Using no AV at all and relying on locking down Windows, SRP, Anti-EXE and other things is probably an even better idea. But if you insist on using an AV perhaps it is wise to consider one of the less popular ones.