Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Symantec Users, Start Your Keyloggers 313

An anonymous reader writes "Script kiddies have been taking advantage of intrusion prevention features of Symantec's Norton Firewall and Norton Internet Security Suites to knock users offline in IRC channels, according to an amusing post at Washingtonpost.com. From the article: 'Turns out that if someone types "startkeylogger" or "stopkeylogger" in an IRC channel, anyone on the channel using the affected Norton products will be immediately kicked off without warning. These are commands typically issued by the Spybot worm, which spreads over IRC and peer-to-peer file-swapping networks, installing a program that records and transmits everything the victim types (known as a keylogger).' Makes you wonder what other magic keywords produce unexpected results with Symantec's software."
This discussion has been archived. No new comments can be posted.

Symantec Users, Start Your Keyloggers

Comments Filter:
  • No surprise here... (Score:4, Informative)

    by Radi-0-head ( 261712 ) on Thursday March 02, 2006 @09:07PM (#14839583)
    Anyone who uses Symantec software with the expectation that it will actually protect them from anything deserves whatever they get.

    I deal with hundredes of machines monthly, and it's always the NIS/Norton Antivirus machines that have been completely compromised without Norton making a peep.

    US companies suck at malware detection. I've found the eastern European companies to be among the best.
  • by macklin01 ( 760841 ) on Thursday March 02, 2006 @09:11PM (#14839600) Homepage

    thats a really scary concept, that the very programs we rely on to protect our computers are so incredibly insecure that a couple keystrokes can completely disable our protection. you would think that if we are expected to pay a company to protect us, that they would do their best. this day in age, that is NOT the best they can do. Not a chance.

    From what I understood, the keystrokes weren't disabling the protection, but rather activating it, i.e., shutting down the chat session to prevent it from triggering malware. - Paul

  • by The MAZZTer ( 911996 ) <.moc.liamg. .ta. .tzzagem.> on Thursday March 02, 2006 @09:15PM (#14839633) Homepage
    It doesn't have to be spoken text. If an incoming packet is caught by norton firewall with a keyword in it, the connection is closed reguardless of where it is.

    Which means you can change your nick to one of the words.

    Or even more devlishly, put it in your ident where noone will notice it. Your speech will be so powerful it will knock people off the internet. Or is it your breath...

    PS: Another keyword that works is "stopspy", which is more useful for idents. I don't normally take advantage of stuff like this but it's too good to pass up.

    To redeem myself, I will mention that you can work around this by turning off some filter called "Spybot keylogger" or something under advanced options.
  • Re:Bash.org (Score:3, Informative)

    by Junta ( 36770 ) on Thursday March 02, 2006 @09:21PM (#14839657)
    http://www.bash.org/?13213 [bash.org]

    Fun keyword filtering.
  • by Suddenly_Dead ( 656421 ) on Thursday March 02, 2006 @09:27PM (#14839692)
    Not any program. The software only monitors IRC communication because that's where the commands to the zombies are sent. mIRC works through IRC, hence it causes the thing to be tripped.
  • by NitsujTPU ( 19263 ) on Thursday March 02, 2006 @09:29PM (#14839703)
    Dude... what are you talking about? Script kiddies are called script kiddies because they steal other people's ideas. They aren't actually coming up with anything.

    It wasn't a script kiddie who figured out that this works, it was a "hacker" (or a "cracker").

    It's not like some kid spent hours figuring this out. These kids were told by someone who figured it out, who would not be referred to as a script kiddie.
  • Yep, that's that (Score:2, Informative)

    by WWWWolf ( 2428 ) <wwwwolf@iki.fi> on Thursday March 02, 2006 @09:32PM (#14839724) Homepage

    I saw this happening on #wikipedia a day or three ago. Someone with user/hostname like startkeylogger@....gnauk.co.uk showed up, and bang, a Norton user dropped off line.

    I really couldn't believe any people would implement this sort of silliness in firewall/antivirus in this day and age. This was a "feature" of some censorware packages a few years back, I really hoped the folks would have wisened up. It's silly if you try to censor stuff, it's twice as silly if it goes under the guise of computer security.

  • by cojsl ( 694820 ) on Thursday March 02, 2006 @09:36PM (#14839744) Homepage
    I get "Message blocked: Exploiting Norton bug" on my favorite channel if I type in either command
  • Re:Impressive (Score:3, Informative)

    by clymere ( 605769 ) on Thursday March 02, 2006 @10:04PM (#14839881) Homepage
    irc.freenode.net irc.oftc.net

    thats just for starters

  • by Monkeys!!! ( 831558 ) on Thursday March 02, 2006 @10:05PM (#14839885) Homepage
    *** (G) Banned from AustNet: This address has been used for deliberately try to disconnect others. (CET0603030304).

    Frak.

    In summary, be careful with this.
  • by Blymie ( 231220 ) * on Thursday March 02, 2006 @11:09PM (#14840214)

    Why?

    Because you have to run Norton as the administrator, if you want updates. You *used* to be able to get around this, by installing Norton as an admin, then setting up a cron (scheduled tasks :P ) to do the updates. However, Norton actually *disabled* the ability to do this in its latest versions. For the last year or so, you MUST run Norton as the administrator to get updates. Put another way, you have to log in once a day as administrator, or you never receive virus updates.

    Lame? Yes, it is. Their techincal support staff find nothing odd about this, and their sales staff try to sell you an inordinately expensive "professional" product which does allow you to run as a normal user, and have updates occur without logging in as admin every 5 minutes. This is just sad. Every XP user should be running as a non-admin. Norton should be *encouraging* that.

    I thought these people were trying to *help* security? The last thing I want anyone to do, is run as administrator on an XP box. Sure, you don't get the same level of security that you do under Linux, when one runs as a normal user, but it's still *very preferable* to run as a non-admin user for your day to day tasks, under XP.

    There are so many "business" class products that don't understand such a simple concept. I've seen income tax software that must be run as the admin user under XP. Anti-virus software though??! That's just absurd.
  • Re:+++ATH (Score:5, Informative)

    by Ungrounded Lightning ( 62228 ) on Thursday March 02, 2006 @11:58PM (#14840411) Journal
    There was also the "ANSI Standard Back Door".

    Some of the early not-too-smart (pre-computer-running-the-show) terminals - notably the "Ann Arbor Terminals" terminal, the DEC VT105, and anything following the ANSI standard for terminal operation which was based on them - had several "soft keys".
      - These could be configured to send any desired sequence of up to maybe 128 or so characters when hit.
      - They were configured by an escape sequence.
      - The escape sequence could be delivered from the far end of the link. (Typically was, by a program setting up the softkey.)
      - The escape sequence setting the key would not produce any visual indication on the screen that this was being done (so as not to corrupt the screen).
      - The key could also be "struck" by another escape sequence, also deliverable from the remote end.
      - Some talk/chat features (think "stone-age instant messaging") did NOT filter out escape sequences in inter-user messages.

    What this meant was that a user (especially one running an early terminal emulator on an early home computer - like an Apple ][) could compose a message to another user that would reprogram one of his softkeys to send anything the malicious user wanted and "hit" it remotely. The time-sharing machine in the middle would interpret the command as if it came from the victim. (This was especially handy if the victim happened to be logged in as the equivalent of a superuser at the time.)

    If the message was a multiple command to disable keysroke echoing at the start and reenable it at the end it might not show up at all. (Or screen control stuff could be included to blank out the echoed command before it could be noticed.)

    There were revs to the terminals to disable this. But installing them made the terminal no longer standards compliant. B-)
  • Re:+++ATH (Score:4, Informative)

    by Ungrounded Lightning ( 62228 ) on Friday March 03, 2006 @12:00AM (#14840423) Journal
    (An even more viscous hack was to reprogram the terminal's scrolling window to 1x1 character, change the escape sequence for programming it, and store it as the startup configuration. This killed the terminal - permanently. B-b )
  • by Mistshadow2k4 ( 748958 ) on Friday March 03, 2006 @02:09AM (#14840902) Journal

    "Exepct that Unix like operating systems aren't immune to many virus attacks too. They just haven't been the focus of attack in any significant way, so the true virus potential isn't know."

    You seem to think *nix OSes are a lot less popular then they are. You do know that Unix was the most popular server OS until this year, right? You do know that when combined with Linux and BSD, the *nix OSes still outnumber Windows servers, don't you? And surely you've heard that Unix has been around about 35 years, haven't you? So.... where are all the Unix viruses? There should be a million of them at least but there aren't. There have been only 13 Unix viruses in computing history. Maybe it has something to do with the fact that it has always been desinged to be secure from the start.

  • by Anonymous Coward on Friday March 03, 2006 @02:38AM (#14841019)
    So, you say that you don't trust binaries from closed source companies?

    Turns out you can't even believe in binaries you have built yourself.

    Read this: http://www.acm.org/classics/sep95/ [acm.org]

    (Not for the paranoid!!!)

"No matter where you go, there you are..." -- Buckaroo Banzai

Working...