Internet Leak - Source Code Leaks

Source code leaks are usually caused by misconfiguration of software like CVS or FTP which allow people to get source files by exploiting this, by software bugs, or by employees that have access to the sources of part of them revealing the code in order to harm the company.

There were many cases of source code leaks in the history of software development. For example, in 2003 a hacker exploited a security hole in Microsoft's Outlook to get the complete source of Half-Life 2, which was under development at the time. The complete source was soon available in various file sharing networks. This leak was rumored to be the cause of the game's delay, but later was stated not to be.

Also in 2003, source code to Diebold Election Systems Inc. voting machines was leaked. Researchers at Johns Hopkins University and Rice University published a damning critique of Diebold's products, based on an analysis of the software. They found, for example, that it would be easy to program a counterfeit voting card to work with the machines and then use it to cast multiple votes inside the voting booth.

Another case involved a partial leak of the source code to Microsoft Windows 2000. Two files containing Microsoft source code were circulating on the Internet. One contains a majority of the NT4 source code and the other contains a fraction of the Windows 2000 source code, reportedly about 15% of the total. This includes some networking code including Winsock and inet; as well as some shell code. It was feared that because of the leak, the number of security exploits would increase due to wider scrutinization of the source code.

In 2004 partial (800MB) proprietary source code that drives Cisco Systems' networking hardware was made available in the internet. The site posted two files of source code written in the C programming language, which apparently enables some next-generation IPv6 functionality. News of the latest source code leak appeared on a Russian security site.

In late 2007, the source codes of Norton Ghost 12 and a Norton Anti-Spyware version were available via BitTorrent.

In December 2007 and January 8, a Pirate Bay user published the sources five Idera SQL products via BitTorrent.

In January 2011 the "stolen source codes" of Kaspersky Anti-Virus 2008 were published on the Pirate Bay.

In December 2011, the source code of the Oracle Solaris 11 was available via BitTorrent.

In January 2012, it was confirmed that Anonymous hackers stole source code (about 1 GiB) for Symantec's pcAnywhere from the company's network in 2006. How the hackers accessed the network is still unclear.

Read more about this topic:  Internet Leak

Famous quotes containing the words source, code and/or leaks:

    The practice of S/M is the creation of pleasure.... And that’s why S/M is really a subculture. It’s a process of invention. S/M is the use of a strategic relationship as a source of pleasure.
    Michel Foucault (1926–1984)

    Acknowledge your will and speak to us all, “This alone is what I will to be!” Hang your own penal code up above you: we want to be its enforcers!
    Friedrich Nietzsche (1844–1900)

    Loving feels lonely in a violent world,
    irrelevant to people burning like last year’s weed
    with bellies distended, with fish throats agape
    and flesh melting down to glue.
    We can no longer shut out the screaming
    That leaks through the ventilation system ...
    Marge Piercy (b. 1936)