Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Software Security

Symantec Support Gone Rogue? 268

DigitalDame2 writes "PCMag Security Analyst Neil Rubenking has always praised Symantec's tech support. Lately, though, a number of readers have reported problems with chat support, so he investigated. Rubenking was trying to install Norton 360 version 3.0 on a malware-infested system when the computer crashed with a blue screen error. He connected with Symantec tech support and was told that they could fix the problem, but for a fee of $100! (Here is the transcript and screen-captures of the chat.) Even more, Symantec support suggested that he use a malware-removal tool that wasn't even made by Symantec."
This discussion has been archived. No new comments can be posted.

Symantec Support Gone Rogue?

Comments Filter:
  • It could be worse (Score:5, Insightful)

    by Urd.Yggdrasil ( 1127899 ) on Friday March 06, 2009 @11:19PM (#27101727)
    At least they had him use a decent anti-malware program [malwarebytes.org]. I generally find symantec products to be more of a virus than most viruses, that crap is hard to get rid of once it's installed and doesn't detect much of anything.
  • by Xoron101 ( 860506 ) on Friday March 06, 2009 @11:20PM (#27101729)
    Maybe the malware infected machine had a hacked hosts file and he was connecting to some site in Russia? Or some other way of redirecting the supposed chat session with "Symantec Support"
  • by Anonymous Coward on Friday March 06, 2009 @11:25PM (#27101763)

    As a real-time scanner, it is pretty good, and the corporate editions are pretty light weight, but has symantec ever been useful as a repair tool?

    The support tech sounds like he did right, despite the non-corporate policy of eating symantec's own dog food.

    Anyone cleaning an already infected machine would start with malwarebytes or combofix before wasting their time with symantec's stuff.

    Sounds like the tech who was helping him knew this.

  • by Anonymous Coward on Friday March 06, 2009 @11:28PM (#27101785)

    One would assume that he wasn't daft enough to connect to Symantec through the infected machine...but then again you never know!

  • by mysidia ( 191772 ) on Friday March 06, 2009 @11:36PM (#27101825)

    I'm not surprised. Norton makes an anti-virus/anti-worm/anti-spyware product. Not a general anti-malware/anti-adware product.

    Their tool does one thing (sort of) well, scans for viruses, and pretends to do a few other things well.

    Unfortunately nowadays, there's software that's more insidious than viruses, and it's beyond Norton's skill to detect.

    Also, I doubt intrusion by malware not relevant to the AV is covered by software support agreements; troubleshooting an infected PC is up to the user, or the PC repair shop they'll hire to fix it.

    AV support is for when your PC is working correctly and you are having problems running your AV, having trouble scanning a file, or not detecting a virus in an infected file.

    If you actually got already got your system infected, before even trying to install the AV, that's 100% your issue.

    Of course, the AV software won't install, the various malware programs prevent it from happening, and it's your problem to solve.

    Not the A/V maker's. The only solution they can really offer you without a liability risk is to format, or hand the PC over to a qualified service person.

  • by Anonymous Coward on Saturday March 07, 2009 @12:13AM (#27101991)

    There is a major difference between offering defect support for software and offering services surrounding the software. Let's review the order of events here:

    1) Customer is unable to install product on test environment. Receives BSOD.
    2) Customer contacts Symantec requesting defect support. Per customer the product is not functioning as described on a test system.
    3) Symantec's front-line support team misinterprets the customer's request for defect support. Instead, they believe the customer wants the system cleaned, regardless of whether a Symantec product is used or not. As a result, Symantec services are offered for an additional fee of $100.
    4) End-result is one unhappy customer, and a heavily biased article criticizing Symantec support.

    What should have happened is anybody's interpretation. But, during #3, at a minimum, the issue should have been escalated to the next level where an actual support engineer discusses a bit further with the customer to try to understand if they a defect with the product, something unique to customer environment, etc.

    Conclusion: Front-line reps at Symantec need more training. Customer needs to work on communication skills to be clear when contacting defect support. Failure to communicate.

  • by Slumdog ( 1460213 ) on Saturday March 07, 2009 @12:19AM (#27102027)

    Moreover, Symantec's management acknowledged that they were in the wrong, and indicated they would be addressing this

    Acknowledgment is valuable when faced with bad press.

  • by j741 ( 788258 ) on Saturday March 07, 2009 @12:40AM (#27102163) Journal

    this is just more evidence that anti-virus/malware products need to be on bootable read-only CDs that can connect to the internet, obtain current definition files, and scan and clean a computer before actually installing any realtime protection software.

  • Re:Uhm...? (Score:5, Insightful)

    by DesertBlade ( 741219 ) on Saturday March 07, 2009 @01:21AM (#27102367)
    or Linux
  • by Darkk ( 1296127 ) on Saturday March 07, 2009 @01:24AM (#27102395)

    A hardware firewall will not stop outbound traffic if you don't have some kind of a IDS installed.

    A really decent hardware firewall can do anti-virus, IDS and content filtering before it even reaches the PCs on your internal network. Problem is not everybody can properly configure the firewall or even understand exactly how it works. Which is why alot of security companies are making a killing on "security appliance" which for a yearly fee they will manage the device for you. They will push the updates to your hardware firewall and basically baby sit it for you. Only thing they will not help you with is ISP problems.

  • by alienw ( 585907 ) <alienw.slashdotNO@SPAMgmail.com> on Saturday March 07, 2009 @01:27AM (#27102419)

    I'm curious. Did you actually read the article? The product he was trying to install was a desktop antivirus. It doesn't come on a boot disk, and it's not intended for cleaning heavily infected systems.

    Obviously, most products that are actually intended for cleaning heavily-infected systems are self-booting. I'm sure Symantec can license some sort of command-line version of Windows in a way that's cost effective, or use a different NTFS implementation. It's just not what this product is intended for.

  • by aliquis ( 678370 ) on Saturday March 07, 2009 @01:31AM (#27102439)

    Yeah, and the typical Windows user which installs plenty of malware would have such an easy time fixing their Linux installation from said boot disk ..

  • Re:Uhm...? (Score:4, Insightful)

    by NeverVotedBush ( 1041088 ) on Saturday March 07, 2009 @02:19AM (#27102625)
    Actually, that is a very good suggestion - boot from a Linux CD, mount the Windows drive, and clean up what you can before you even try to boot back into Windows.

    I am really glad there are so many Windows machines out there to take the heat and draw the attention of the hackers and organized crime.
  • by w0mprat ( 1317953 ) on Saturday March 07, 2009 @07:33AM (#27103603)
    I have an example which is in fact a common experience for me and others. I often get asked for advice on what is the best anti-virus security protection for a PC. e.g. a friend or family member with computer problems.

    I give my usual spiel that the best protection is not to pay money for anything, it's hard to say it's worth it (Slowing down your system, possibly causing more crashes and program compatibility issues, and then only catching perhaps 90% of threats). Open-source or freeware tools will do just fine to actually scan and heal threats. Largely it's the users actions that are the initial problem. I then offer my time, for free, to teach some safe practices.

    You can't just punch in your credit card number and expect adequate protection.

    Mark my words, there are lots of botnet'd windows boxes that have full-paid anti-virus software on them running just fine. My parents had one of them. (problem was identified in the logs of their linux firewall). The solution was to wipe it, given them firefox with some add-ons and clam-av. Zero issues since.

    If your machine is properly patched your very unlikely to be taken over by a worm attack. Following that, with the right software, your unlikely to be hijacked in your browser and then infected. With the right ISP you won't have spam and e-mail threats. It's down to how the user operates, and discouraging them from skipping virus scanning that keygen.exe when downloading warez. Largely it's browsing that's the problem. Firefox plus some add-ons, and a little bit of user coaching.

    I really wonder in who's interests it is to keep users dumbed down on security matters. Which in todays world has become as important as locks and alarms on houses cars and businesses. It's protection of critical infrastructure.

    Why pay a exorbitant monthly subscription for a security guard to stand outside your house, because your house is equipped with vulnerable locks and the occupants are poorly trained at keeping the doors closed when they go out?

    In hindsight I should have modded as redundant the mandatory:

    Install Linux

    which is inexplicably modded +5 something.

    If 90% of the world ran one Linux distribution we would still have a thriving ecosystem viruses, trojans (albeit on a lesser scale). Good design, transparency and rapid patching in OSS only goes so far, it's not magic immunity. There is also a fairly constant amount of problems between the keyboard and chair - now that will not go away. Windows is the most common, therefore the most attacked... is the statement that raises hackles for some. However it is the truth. In much the same way having millions of genetically identical crops/livestock in unnatural concentrations provides for massive outbreaks of everything from blight to foot and mouth disease. Likewise millions of humans living in close proximity results in plagues - the human immune system was not built for this. And so our information technology infrastructure suffers the same fundamental laws of nature, you have one monoculture of identical entities you invite pandemic infection.

    So how do we live in 20-30 million person cities, and don't all get wiped out in two weeks by ebola? We have sanitation: we all get taught how to cover our mouths when we cough, cook food properly and wash our hands after visiting the lavatory etc etc and we have some sanitary measures to back it up, ie chemicals that can clense pathogens.

    User education is the key. The first thing we can teach is to stay the hell away from clearly rogue companies. We can also stop beating redundant very tired drums.

  • by Anonymous Coward on Saturday March 07, 2009 @07:55AM (#27103665)

    How did you verify that your netstat hadn't been trojaned to report only what the virus writer wanted it to?

    Maybe you ran an md5sum against it, compared it with known-good signatures. Great, except how do you know your md5sum too wasn' equally compromised?

    Only way to be sure (apart from nuking it from orbit) is to boot from known-safe media, and manually verify *all* your files, binaries and data file alike. But at that point, it's easier to reinstall. Just don't trust your old config files - who knows what's lurking at the end of your .bashrc?

  • Re:Uhm...? (Score:5, Insightful)

    by Killall -9 Bash ( 622952 ) on Saturday March 07, 2009 @04:14PM (#27106629)
    This article is complete BS.

    Customers are ill-informed if they think that AFTER getting infected is the time to buy security software, and Its not the fault of the guy you're on the phone with that purchasing 360 does not include hours of over the phone support.

    It is perfectly fucking normal to not be able to install software when your computer is infected with malware.

    The writer of the article is a fucking douche, has unrealistic expectations for technical support for a retail product, and apparently (based on his purchase) does not understand that Symantec's business model is formed around IT execs having someone else to blame when (not if) their corporate network gets virus'd up.

    The writer of this article, and the retard consumers he thinks he's protecting, made a fucking mistake. The mistake was this: they walked into Best Buy with their 'broken' computer. Geek Squad wants $170 to fix their computer. Norton costs $39.99. A few minutes of lowIQ number crunching later, they arrive at a decision, which is the fucking wrong one. Then they get mad at Symantec for not wanting to talk to you all day.

    Much like Microsoft, I hate Symantec the same as you, but you hate them for the wrong reasons.

If you think the system is working, ask someone who's waiting for a prompt.

Working...