- A police union is urging its officers to post ‘The Punisher’ logo Monday 7:33 PM
- Redditors call for a Nestlé boycott through memes Monday 6:16 PM
- How a 10-second Disney jingle became a meme in Thailand Monday 4:48 PM
- Instagram users share photos showing gruesome killing of 17-year-old Bianca Devins Monday 4:33 PM
- The horror game banned for mocking China’s president probably isn’t coming back Monday 3:31 PM
- Cheap vibrators, condoms, and lube: The most satisfying Amazon Prime Day deals Monday 3:07 PM
- George R.R. Martin says fan backlash won’t affect his ‘Game of Thrones’ ending Monday 3:03 PM
- The very finest Area 51 memes Monday 2:52 PM
- Tweet map ranks states where people are boycotting Amazon Prime Day Monday 1:54 PM
- Lil Nas X says he will perform at Area 51 for free Monday 12:56 PM
- The best Prime Day deals for gamers Monday 12:53 PM
- How Republicans are dancing around Trump’s racist tweets Monday 12:42 PM
- Not even anti-immigrant groups are defending Trump’s ‘go back’ tweets Monday 12:37 PM
- Netflix’s latest chase thriller ‘Point Blank’ lacks electricity Monday 12:27 PM
- Jay Inslee floats Megan Rapinoe as his secretary of state pick Monday 11:33 AM
Hackers hack Hacking Team, a notorious government-surveillance software firm
A massive trove of internal emails and files was apparently dumped online.
A leading provider of surveillance and intrusion software for governments worldwide has apparently fallen victim to a devastating security breach.
The Twitter account of Hacking Team, an Italy-based company notorious in certain circles for providing offensive security services to law enforcement and intelligence agencies, was hijacked late Sunday evening. The hackers, who have not been identified, used the account to post emails and invoices implicating the firm in the sale of software to repressive governments—an allegation previously dismissed by the company.
A link to a torrent file containing roughly 400GB of purportedly stolen internal company documents and emails was also tweeted from Hacking Team’s account. Due to the massive size of the file dump, the veracity of the full cache of files has not been independently verified at this time. The company had regained control of the account by Monday morning and deleted the tweets posted by the alleged hackers.
In 2013, Reporters Without Borders labeled Hacking Team as one of five “Corporate Enemies of the Internet”— a “digital mercenary” whose products are liable to be used by repressive regimes “to violate human rights and freedom of information.” Hacking Team responded by denying the accusation. In a statement, the company said it “goes to great lengths to assure that our software is not sold to governments that are blacklisted by the E.U., the USA, Nato and similar international organizations or any ‘repressive’ regime.”
According to the documents, however, Hacking Team’s clients include numerous governments often criticized for violently suppressing human rights, including Saudi Arabia, Bahrain, Russia, Sudan, Kazakhstan, and the United Arab Emirates.
Hacking Team’s flagship product, the DaVinci Remote Control System, is software that allows its clients to monitor the transfer of encrypted files and emails and eavesdrop on Skype and other voice-over-IP (VoIP) applications. The company claims that DaVinci can monitor hundreds of thousands of computers simultaneously and surreptitiously activate a computer’s microphone and camera by remote.
Christian Pozzi, a Hacking Team employee tweeted several times following the attack, urging his followers to “stop spreading false lies” about the company’s services. “A lot of what the attackers are claiming regarding our company is not true,” he said. “We are currently in the process of notifying all our customers about the recent breach. We haven’t broken any laws. We simply provide custom software solutions tailored to our customer’s needs.”
Pozzi, who said his team was currently working with police, also told a security researcher posting screenshots of documents on Twitter: “Keep posting what you are posting, I am taking all the evidence. You will go to jail.”
Dell Cameron was a reporter at the Daily Dot who covered security and politics. In 2015, he revealed the existence of an American hacker on the U.S. government's terrorist watchlist. He is a co-author of the Sabu Files, an award-nominated investigation into the FBI's use of cyber-informants. He became a staff writer at Gizmodo in 2017.