Guest User

Hackbraten Whitelist

a guest
Oct 24th, 2014
177
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.48 KB | None | 0 0
  1. Thank you for your request.
  2.  
  3. We have received your recent request to Symantec's Software White-list Request program. Complete requests with all necessary information will be processed immediately. Once a determination has been made regarding your request you will be notified via e-mail as to the decision made and the next steps, if any. For a Software White-list request, Symantec will target a response of advising you of our final determination within 3 weeks. This timeframe is subject to Symantec being supplied with all the necessary information to allow for a proper determination. Requests of incomplete information may result in a delay of the final determination. Any request for additional information regarding your submission will be sent to the contact email address you provided at the time of submission.
  4.  
  5. Sincerely,
  6.  
  7. Security Response Operations - QA Engineering
  8. http://securityresponse.symantec.com
  9.  
  10.  
  11.  
  12. This is an automated message. Please, do not reply to this email.
  13.  
  14. We would like to inform you that your submission has been received successfully by Symantec Security Response and a tracking number has been created for it.
  15.  
  16. The incident number for your submission is: 3645482
  17.  
  18. --------------------------------------------------------
  19.  
  20.  
  21. Company name: hackbraten.tk
  22.  
  23. Software name: hackbraten.tk and whois.exe
  24.  
  25. Software Version: 2.1
  26.  
  27. Customer name: Birk (hackbraten@fake-box.com)
  28.  
  29. SHA256 from the customer:
  30.  
  31. File uploaded:
  32.  
  33. Customer's notes:
  34. These two are hack tools that the author can use to discover IPs
  35. otherwise hidden by game servers. Also users can use it to steal
  36. administrator keys belonging to server ops/ administrators. The author
  37. has yet to add a malicious portion of code to steal passwords and
  38. other files in the users game folders. Unsuspecting users who do not
  39. check the compiled binary with possible fake source code will not
  40. notice if malware is embedded. The author Birk (hackbraten.tk) insists
  41. he has the right to cheat and hack using this software and dares you
  42. to blacklist his software as he may write versions which can evade
  43. positive future detection.
  44.  
  45.  
  46. --------------------------------------------------------
  47.  
  48. Sincerely,
  49.  
  50. Symantec Security Response
  51. http://securityresponse.symantec.com
  52.  
  53.  
  54.  
  55. Hello,
  56.  
  57. We are writing in relation to your application through Symantec's on-line Software White-listing Request form for your software hackbraten.tk and whois.exe.
  58. Symantec has decided to add this software to its white-list.
  59. The white-list is used in internal quality assurance processes and also by the cloud for some products.
  60. This inclusion should reduce the possibility of false positive detections by Symantec products, but Symantec cannot guarantee that false positives will not occur.
  61. In the event of continued reports of false positives, please notify us through Symantec's on-line Security Risk/False Positive Dispute Submission form available at: https://submit.symantec.com/false_positive/.
  62. Symantec's decision is not a certification or endorsement of your software in any way, and you are expressly advised by this message that Symantec does not consent to you disclosing that Symantec has added your software to its white-list, or that Symantec has evaluated, endorsed or certified your software in any manner, directly or indirectly.
  63. Please note also that decisions made by Symantec are subject to change depending on a variety of factors that include but are not limited to alterations in the software, distribution of the software, or vulnerabilities in the software to misuse by the publisher or others.
  64.  
  65. Symantec may also change its classification criteria and policies over time to address the constantly evolving security landscape.
  66.  
  67. Sincerely,
  68. Security Response Operations QA Engineering
  69. Security Technology and Response (STAR)
  70. http://securityresponse.symantec.com
  71.  
  72.  
  73. This message (including any attachments) is intended only for the use of the individual or entity to which it is addressed and may contain information that is non-public, proprietary, privileged, confidential, and exempt from disclosure under applicable law or may constitute as attorney work product. If you are not the intended recipient, you are hereby notified that any use, dissemination, distribution, or copying of this communication is strictly prohibited. If you have received this communication in error, notify us immediately by telephone and (i) destroy this message if a facsimile or (ii) delete this message immediately if this is an electronic communication. Thank you.
Add Comment
Please, Sign In to add comment