Symantec hackers: We've released pcAnywhere source code
Hackers claim to have released pcAnywhere source code, whilst threatening to release information on Norton software.


Hackers using the Anonymous name have continued their baiting of security giant Symantec, releasing what they claim to be source code for pcAnywhere.
The release on Pirate Bay came after law enforcement set up a sting operation in which the hackers demanded $50,000 in return for keeping the source code offline, Symantec said.
The hackers, meanwhile, said they had not made any ransom requests.
"Symantec has been lying to its customers. We exposed this point thus spreading the world that ppl need," the message accompanying the Pirate Bay release read.
Symantec has sought to distance itself from claims that it led the sting operation.
"Anonymous actually reached out to us, first, saying that if we provided them with money, they would not post any more source code," the company said.
"At that point, given that it was a clear cut case of extortion, we contacted law enforcement and turned the investigation over to them. All subsequent communications were actually between Anonymous and law enforcement agents - not Symantec."
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
However, the hacker claiming to be behind the Lords of Dharmaraja, supposedly an Anonymous off shoot, said Symantec had approached them rather than the other way around.
"You won't believe it but Symantec offered us money to keep quiet," a tweet from @YamaTough read.
The same user has indicated they plan to release information relating to Norton Antivirus. "NAV release coming in 7 hours," another tweet read.
The hacker has posted what they claim to be bits of code for Norton Utilities and other programs online over the past few weeks.
For IT guys
The security giant has stuck with the advice it gave customers last week, asking them to update the remote access software so vulnerabilities exposed by the source code leak were patched.
Initially, Symantec had advised customers to turn pcAnywhere off entirely.
"Symantec recommends that customers ensure pcAnywhere 12.5 is installed, apply all relevant patches as they are released, and follow general security best practices," the security firm said.
"If customers are unable to adhere to this guidance and have not installed the latest version with current patches, we recommend that they contact pcanywhere@symantec.com for additional assistance."
Symantec released a patch on 23 January eliminating known vulnerabilities affecting customers using pcAnywhere 12.5. On 27 January, Symantec released a patch doing the same for customers using pcAnywhere 12.0 and pcAnywhere 12.1.
The source code leak stems back to a successful hack on Symantec's network. At the time, Symantec was unsure about exactly what was taken.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Capita tells pension provider to 'assume' nearly 500,000 customers' data stolen
Capita told the pension provider to “work on the assumption” that data had been stolen
By Ross Kelly
-
Gumtree site code made personal data of users and sellers publicly accessible
News Anyone could scan the website's HTML code to reveal personal information belonging to users of the popular second-hand classified adverts website
By Connor Jones
-
Pizza chain exposed 100,000 employees' Social Security numbers
News Former and current staff at California Pizza Kitchen potentially burned by hackers
By Danny Bradbury
-
83% of critical infrastructure companies have experienced breaches in the last three years
News Survey finds security practices are weak if not non-existent in critical firms
By Rene Millman
-
Identity Automation launches credential breach monitoring service
News New monitoring solution adds to the firm’s flagship RapidIdentity platform
By Praharsha Anand
-
Neiman Marcus data breach hits 4.6 million customers
News The breach took place last year, but details have only now come to light
By Rene Millman
-
Indiana notifies 750,000 after COVID-19 tracing data accessed
News The state is following up to ensure no information was transferred to bad actors
By Rene Millman
-
Pearson fined $1 million for downplaying severity of 2018 breach
News The SEC found the London-based firm made “misleading statements and omissions” about the intrusion
By Rene Millman