- If you have doubts about HBO’s ‘Watchmen,’ give it more time Sunday 9:00 PM
- Video shows moment coach disarmed student of shotgun, then hugged him Sunday 7:38 PM
- Jared Leto reportedly tried to stop ‘Joker’ from happening Sunday 4:12 PM
- People are grossed out by cow insemination-themed pregnancy announcement Sunday 3:13 PM
- Major protests in Lebanon triggered by plan to tax WhatsApp calls Sunday 1:38 PM
- Frank Ocean’s $60 HIV prevention drug-themed shirts called tone-deaf Sunday 12:49 PM
- ‘Joker’ stairs latest Instagram spot; locals joke about potential robberies Sunday 10:30 AM
- PewDiePie banned in China after reacting to Winnie the Pooh memes Sunday 8:46 AM
- How to stream Cowboys vs. Eagles on Sunday Night Football Sunday 7:00 AM
- How to stream Chargers vs. Titans in Week 7 Sunday 6:00 AM
- 13 spooky romance games for adults Sunday 6:00 AM
- How to stream ‘Power’ season 6, episode 9 Sunday 5:00 AM
- How to stream Impact Wrestling’s Bound For Glory Sunday 5:00 AM
- How to stream Bills vs. Dolphins in Week 7 Sunday 4:30 AM
- How to stream Jaguars vs. Bengals in Week 7 Sunday 4:00 AM
Hackers hack Hacking Team, a notorious government-surveillance software firm
A massive trove of internal emails and files was apparently dumped online.
A leading provider of surveillance and intrusion software for governments worldwide has apparently fallen victim to a devastating security breach.
The Twitter account of Hacking Team, an Italy-based company notorious in certain circles for providing offensive security services to law enforcement and intelligence agencies, was hijacked late Sunday evening. The hackers, who have not been identified, used the account to post emails and invoices implicating the firm in the sale of software to repressive governments—an allegation previously dismissed by the company.
A link to a torrent file containing roughly 400GB of purportedly stolen internal company documents and emails was also tweeted from Hacking Team’s account. Due to the massive size of the file dump, the veracity of the full cache of files has not been independently verified at this time. The company had regained control of the account by Monday morning and deleted the tweets posted by the alleged hackers.
In 2013, Reporters Without Borders labeled Hacking Team as one of five “Corporate Enemies of the Internet”— a “digital mercenary” whose products are liable to be used by repressive regimes “to violate human rights and freedom of information.” Hacking Team responded by denying the accusation. In a statement, the company said it “goes to great lengths to assure that our software is not sold to governments that are blacklisted by the E.U., the USA, Nato and similar international organizations or any ‘repressive’ regime.”
According to the documents, however, Hacking Team’s clients include numerous governments often criticized for violently suppressing human rights, including Saudi Arabia, Bahrain, Russia, Sudan, Kazakhstan, and the United Arab Emirates.
Hacking Team’s flagship product, the DaVinci Remote Control System, is software that allows its clients to monitor the transfer of encrypted files and emails and eavesdrop on Skype and other voice-over-IP (VoIP) applications. The company claims that DaVinci can monitor hundreds of thousands of computers simultaneously and surreptitiously activate a computer’s microphone and camera by remote.
Christian Pozzi, a Hacking Team employee tweeted several times following the attack, urging his followers to “stop spreading false lies” about the company’s services. “A lot of what the attackers are claiming regarding our company is not true,” he said. “We are currently in the process of notifying all our customers about the recent breach. We haven’t broken any laws. We simply provide custom software solutions tailored to our customer’s needs.”
Pozzi, who said his team was currently working with police, also told a security researcher posting screenshots of documents on Twitter: “Keep posting what you are posting, I am taking all the evidence. You will go to jail.”
Dell Cameron was a reporter at the Daily Dot who covered security and politics. In 2015, he revealed the existence of an American hacker on the U.S. government's terrorist watchlist. He is a co-author of the Sabu Files, an award-nominated investigation into the FBI's use of cyber-informants. He became a staff writer at Gizmodo in 2017.