element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Internet of Things
  • Technologies
  • More
Internet of Things
Blog Hacking the Hacker: “Hacking Team” was schooled
  • Blog
  • Forum
  • Documents
  • Quiz
  • Events
  • Polls
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Internet of Things to participate - click to join for free!
  • Share
  • More
  • Cancel
Group Actions
  • Group RSS
  • More
  • Cancel
Engagement
  • Author Author: Catwell
  • Date Created: 8 Jul 2015 6:05 PM Date Created
  • Views 653 views
  • Likes 1 like
  • Comments 2 comments
  • security
  • hack
  • cabeatwell
  • iot
  • hacking
  • hacking_team
Related
Recommended

Hacking the Hacker: “Hacking Team” was schooled

Catwell
Catwell
8 Jul 2015

image

Italian cybersecurity company Hacking Team was hacked on Sunday, resulting in the public leak of over 400GB of sensitive information. The Twitter and data takeover included the publishing of client emails, sensitive employee information, source codes and more, revealing the company’s shady dealings with blacklisted governments.


Perhaps the name was just asking for it. “Hacking Team” is an Italy-based company that provides offensive cybersecurity solutions to governments and intelligence agencies across the globe. It appears someone had a serious bone to pick with the security firm, as the organization was hacked on Sunday. The leak resulted in more than 400 GB of data being made public, including two of the most effective malware bugs that can gain access to almost every major operating system and browser through Adobe.

 

The incident began with a questionable Twitter post that read, “Since we have nothing to hide, we’re publishing all our e-mails, files and source code.” The post also conveniently provided a link to the files, where anyone in the world could download the private information for free.

 

The leak included client emails, source codes, invoices, company documents and sensitive employee information. The hackers revealed themselves on Monday and claim to be the same ‘vigilante’ team that hacked Gamma International last year. It was initially unclear as to why anyone would go through all of the trouble to embarrass Hacking Team – a company that claims it always plays by the rules – until now.

 

The leak aired out Hacking Team’s dirty laundry, so to speak, regarding the company’s secret dealings with countries that execute human rights violations and other international crimes. The security firm claimed it never initiated dealings with countries that were blacklisted by the US, EU or NATO, but the leaked files prove otherwise.

 

An Excel spreadsheet with information about client management went public through the hack, revealing Hacking Team service agreements with Morocco, The United Arab Emirates, Kazakhstan, Azerbaijan, Sudan and even invoices from groups within Egypt. It is unclear exactly which services were provided to the shady governments, but the dealings alone indicate that Hacking Team hasn’t exactly been honest in its business ventures. Regardless, the hack was successful in embarrassing the Italian company, but is unlikely to result in a serious decline in business. One leak, however, may come back to bite us.

 

Hidden in Hacking Team’s source code was a list of two significant Adobe vulnerabilities, which have allowed the company to gain access to almost any company running Adobe products on Windows, OS X and Linux. The vulnerabilities also target browsers running Adobe solutions, including Firefox, Chrome, Internet Explorer and Safari, allowing hackers to gain access as Administrator. The leak essentially handed hackers a new tool belt, on a silver platter, enabling anyone to take over any computer running Adobe worldwide. Adobe commented, stating it would fix the vulnerability immediately, but unfortunately for them, this isn’t the first security breach targeting the company’s software solutions.

 

Hacking Team has yet to comment on the hacking ordeal. It’s website is back up and running as of the posting of this article, and it’s unclear as to whether or not the organization will make a public statement. Reporters Without Borders calls Hacking Team an “enemy of the Internet,” because of its shady dealings with human rights violators. On the other side of the coin, however, as a business owner in any industry, it is difficult to refuse business with a high-paying client, even if their money is colored red.

 

C

See more news at:

http://twitter.com/Cabe_Atwell

  • Sign in to reply
  • Catwell
    Catwell over 9 years ago in reply to michaelwylie

    Indeed... this "event" for them can't be good for business either.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • michaelwylie
    michaelwylie over 9 years ago

    This is from Hacking Team Website.


    Revised July 8, 2015

    It is now apparent that a major threat exists because of the posting by cyber criminals of HackingTeam proprietary software on the Internet the night of July 6. HackingTeam's investigation has determined that sufficient code was released to permit anyone to deploy the software against any target of their choice.

     

    Before the attack, HackingTeam could control who had access to the technology which was sold exclusively to governments and government agencies. Now, because of the work of criminals, that ability to control who uses the technology has been lost. Terrorists, extortionists and others can deploy this technology at will if they have the technical ability to do so.

    We believe this is an extremely dangerous situation.

     

    HackingTeam is evaluating if it is possibile to mitigate the danger. We expect too that anti-virus companies are upgrading their programs to detect the compromised RCS.

     

    # # #

    HackingTeam engineers are working around the clock to provide an update to the Remote Control System that will allow clients to resume criminal and intelligence investigations.

    In response to HackingTeam's request, virtually all clients have suspended use of the system that was compromised in the attack.

     

    This is an important step to protect on-going police and intelligence investigations.

     

    There have been reports that HackingTeam has 'backdoors' in its systems that would allow us to control the systems remotely. This is simply not true. Clients operate our technology on their own computer systems, and so it is clients who must take action to suspend operations.

    # # #

     

    For further information:

    Eric Rabe, Chief Marketing and Communications Officer, +39 337 1143876

      info@hackingteam.com

    This e-mail address is being protected from spambots. You need JavaScript enabled to view it

     

    Pretty liberal use of the word criminal considering the business they are in?

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2025 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube