Norton Internet Security ‘Keylogger’ IRC Bug

Keep on Guard!

It seems like script kiddies have been taking full advantage of the bug we talked about in the Symantec software. Do companies never learn?

Script kiddies have been taking advantage of intrusion prevention features of Symantec’s Norton Firewall and Norton Internet Security Suites to knock users offline in IRC channels, according to an amusing post at From the article: ‘Turns out that if someone types “startkeylogger” or “stopkeylogger” in an IRC channel, anyone on the channel using the affected Norton products will be immediately kicked off without warning.

These are commands typically issued by the Spybot worm, which spreads over IRC and peer-to-peer file-swapping networks, installing a program that records and transmits everything the victim types (known as a keylogger).’ Makes you wonder what other magic keywords produce unexpected results with Symantec’s software.

Reminds me somewhat of the whole ++ATH0 thing.

phonex has quit (Read error: Connection reset by peer)
TomA has quit (Read error: Connection reset by peer)
something3280 has quit (Read error: Connection reset by peer

It’s kind of ironic, using the software that’s supposed to be protecting disrupt their Internet experience ;)

Now if only the script kiddies could put their group brain together and come up with something useful.

Posted in: Security Software

, , , , , ,

Recent in Security Software:
- maltrail – Malicious Traffic Detection System
- Massive Acunetix Online Update Brings New Features & UI
- yarAnalyzer – Yara Rule Analyzer and Statistics Generator

Related Posts:

Most Read in Security Software:
- Top 15 Security/Hacking Tools & Utilities - 2,024,498 views
- 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) - 1,178,816 views
- Password Hasher Firefox Extension - 118,205 views

2 Responses to Norton Internet Security ‘Keylogger’ IRC Bug

  1. Navaho Gunleg March 3, 2006 at 10:52 am #

    Reminds me somewhat of the whole ++ATH0 thing.

    IIRC, the ATH0 thing could be put in anything though (from a webpage to an email), basically affecting any vulnerable modem that received that block of data over that modem-line.

    This seems limited to port 6667

    Or any other non-privileged ports? I’m wondering — is there a possible way to evade detection by connecting to an IRC port on port 80? I mean, obviously the word ‘startkeylogger’ should be nicely received if it seems to come from a webpage.

    Or does the firewall do deep-inspection on those packets to guess the used protocol?


  1. Two Slashes » Blog Archive » Hackers Change Playing Field - March 3, 2007

    […] Case in point, #1:  Symantec’s Norton Internet security products have been a target for a while, even if it’s only by script kiddies with a knack for being stupid yet believing their superiority.  It’s not the first time someone’s found flaws either.  I know of several ways in which Symantec’s security software can be disabled in a few clicks. […]