Symantec has backed away from earlier statements regarding the theft of source code of some of its flagship security products, now admitting that its own network was compromised.
In a statement provided to the Reuters news service, the security software giant acknowledged that hackers had broken into its network when they stole source code of some of the company's software.
Previously, Symantec had denied that its own network had been breached, and instead pointed fingers at an unnamed "third party entity" as the attack's victim. Evidence posted by a hacker nicknamed "Yama Tough" -- a self-proclaimed member of a gang calling itself "Lords of Dharmaraja" -- indicated that the information was obtained from a server operated by the Indian government.
Two weeks ago, Symantec spokesman Cris Paden said that the hacker made off with source code of Symantec Endpoint Protection 11.0 and Symantec Antivirus 10.2, enterprise products between five and six years old.
At the time, Paden downplayed the seriousness of the theft.
Today, however, Paden said that source code of Norton Antivirus Corporate Edition, Norton Internet Security, Norton Utilities, Norton GoBack and pcAnywhere, had been stolen.
Some of those - Norton Internet Security and Norton Utilities - are among Symantec's most prominent consumer-grade products.
Symantec missed one bullet, however.
Last Saturday, Yama Tough promised to release more than a gigabyte of the source code for Norton Antivirus - the hacker did not specify which version - but he said the group has since reconsidered.
"We've decided not to release code to the public until we get full of it," Yama Tough wrote on Twitter Monday . "1st we'll own evrthn we can by 0din' the sym code & pour mayhem."
In the message, "0din'" likely stands for "zero-daying", meaning attacks launched against unpatched vulnerabilities.
Also on Monday, Yama Tough claimed that he had some or all of the source code for pcAnywhere, a multi-platform remote access suite that Symantec sells.
"PCAnywhere code is being released to blackhat community for 0d expltin!," said Yama Tough, again on Twitter .
Paden confirmed Yama Tough's claim when he told Reuters that pcAnywhere users face "a slightly increased security risk" because of the hacker's activities.
"Symantec is currently in the process of reaching out to our pcAnywhere customers to make them aware of the situation and to provide remediation steps to maintain the protection of their devices and information," Paden said.
Paden did not reply to Computerworld's requests for comment on Symantec's revised statement.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer , on Google+ or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org .
Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.