- Facebook refused to take down this blackface page for four months 4 Years Ago
- Tom Holland rescues fan getting squashed by autograph hounds Tuesday 7:14 PM
- What is incel ‘Chadfishing’? Tuesday 6:36 PM
- Facebook to give France data on users suspected of hate speech Tuesday 5:29 PM
- This 89-year-old man is stunned by all the technology around him—in 1930 Tuesday 5:21 PM
- Wayfair refuses to stop furnishing migrant detention centers Tuesday 4:48 PM
- Woah! How did Keanu Reeves get so small? Tuesday 4:37 PM
- The centrist argument against Sanders’ student loan plan is getting ripped apart Tuesday 4:08 PM
- Jonathan Frakes confirms that you’re right in yet another meme Tuesday 3:56 PM
- Meryl Streep, Ariana Grande set to star in Netflix’s ‘The Prom’ Tuesday 3:35 PM
- ‘Stranger Things’ Season 3 goodies are here just in time Tuesday 3:01 PM
- Kim Kardashian’s shapewear line Kimono is already getting called out Tuesday 2:11 PM
- ‘Aggretsuko’ tones down the rage in season 2 Tuesday 1:13 PM
- TikTok is being used to call out predators Tuesday 12:41 PM
- Republican congressman wants to defund PBS over the gay rat wedding Tuesday 12:39 PM
Hackers hack Hacking Team, a notorious government-surveillance software firm
A massive trove of internal emails and files was apparently dumped online.
A leading provider of surveillance and intrusion software for governments worldwide has apparently fallen victim to a devastating security breach.
The Twitter account of Hacking Team, an Italy-based company notorious in certain circles for providing offensive security services to law enforcement and intelligence agencies, was hijacked late Sunday evening. The hackers, who have not been identified, used the account to post emails and invoices implicating the firm in the sale of software to repressive governments—an allegation previously dismissed by the company.
A link to a torrent file containing roughly 400GB of purportedly stolen internal company documents and emails was also tweeted from Hacking Team’s account. Due to the massive size of the file dump, the veracity of the full cache of files has not been independently verified at this time. The company had regained control of the account by Monday morning and deleted the tweets posted by the alleged hackers.
In 2013, Reporters Without Borders labeled Hacking Team as one of five “Corporate Enemies of the Internet”— a “digital mercenary” whose products are liable to be used by repressive regimes “to violate human rights and freedom of information.” Hacking Team responded by denying the accusation. In a statement, the company said it “goes to great lengths to assure that our software is not sold to governments that are blacklisted by the E.U., the USA, Nato and similar international organizations or any ‘repressive’ regime.”
According to the documents, however, Hacking Team’s clients include numerous governments often criticized for violently suppressing human rights, including Saudi Arabia, Bahrain, Russia, Sudan, Kazakhstan, and the United Arab Emirates.
Hacking Team’s flagship product, the DaVinci Remote Control System, is software that allows its clients to monitor the transfer of encrypted files and emails and eavesdrop on Skype and other voice-over-IP (VoIP) applications. The company claims that DaVinci can monitor hundreds of thousands of computers simultaneously and surreptitiously activate a computer’s microphone and camera by remote.
Christian Pozzi, a Hacking Team employee tweeted several times following the attack, urging his followers to “stop spreading false lies” about the company’s services. “A lot of what the attackers are claiming regarding our company is not true,” he said. “We are currently in the process of notifying all our customers about the recent breach. We haven’t broken any laws. We simply provide custom software solutions tailored to our customer’s needs.”
Pozzi, who said his team was currently working with police, also told a security researcher posting screenshots of documents on Twitter: “Keep posting what you are posting, I am taking all the evidence. You will go to jail.”
Dell Cameron was a reporter at the Daily Dot who covered security and politics. In 2015, he revealed the existence of an American hacker on the U.S. government's terrorist watchlist. He is a co-author of the Sabu Files, an award-nominated investigation into the FBI's use of cyber-informants. He became a staff writer at Gizmodo in 2017.