- UPS facing backlash for thanking police after employee killed in shootout Saturday 5:02 PM
- Sanders campaign fires staffer after anti-Semitic, homophobic tweets surface Saturday 3:13 PM
- Brother Nature was attacked, says everyone just watched with phones out Saturday 2:45 PM
- Ryan Reynolds’ gin company hires Peloton wife for ad Saturday 1:24 PM
- Ex-vegan YouTuber accused of fraud after following meat-only diet Saturday 1:11 PM
- The 15 best Disney+ hidden gems and deep cuts Saturday 12:23 PM
- Everyone in GoFundMe scam involving homeless veteran has now pleaded guilty Saturday 12:06 PM
- Boy invites kindergarten class to his adoption–and people are emotional Saturday 11:56 AM
- Reddit links leaked trade deal documents to Russian campaign Saturday 10:44 AM
- How to stream Alistair Overeem vs. Jairzinho Rozenstruik Saturday 8:30 AM
- Amazon sends customers condoms and soap instead of Nintendo Switch Saturday 8:28 AM
- How to live stream Jermall Charlo vs. Dennis Hogan Saturday 8:00 AM
- Apple TV’s ‘Truth Be Told’ is a criminally dull drama Saturday 6:00 AM
- Thousands of Uber users have reported sexual assaults, company says Friday 5:40 PM
- ‘Astronomy Club’ reformats the sketch show Friday 4:58 PM
Hacking Team says data breach put its cyberweapons in the hands of terrorists
Only 40 some odd governments could use the program to spy on people before.
Days after the source code of its flagship surveillance software was compromised, cyberweapons manufacturer Hacking Team says “terrorists” and “extortionists” are able make use of its technology.
“It is now apparent that a major threat exists because of the posting by cyber criminals of Hacking Team proprietary software on the Internet the night of July 6,” the company said in a statement.
“Hacking Team’s investigation has determined that sufficient code was released to permit anyone to deploy the software against any target of their choice.”
“Terrorists, extortionists and others can deploy this technology at will if they have the technical ability to do so.”
Remote Control Systems (RCS), Hacking Team’s surveillance and intrusion tool, was reportedly sold to over three dozen of the world’s governments before being leaked online. The spyware-based system allows intelligence and law-enforcement agencies to attack, infect, and monitor computers and smartphones. According to the company, RCS provides “full intelligence” on targets, including their encrypted communications, and can be used as a remote audio and camera spy tool.
According to a leaked document, Hacking Team’s top customers include (in order of revenue per country) Mexico, Italy, Morocco, Saudi Arabia and Chili, among many others. Despite previously claiming that the company went to “great lengths” to keep its software out of the hands of “repressive regimes,” Hacking Team records show RCS was also sold to nations such as Sudan, whose president currently faces international criminal charges for genocide and mass-rape.
In response to the disclosure, Hacking Team spokesman Eric Rabe told Gizmodo:
“This issue may appear to be simple. In reality it is a complicated one for several reasons. For one thing, some have labeled certain long-time allies of the West ‘repressive.’ Furthermore, it happens that governments change, and, therefore they become more or less criticized over time.”
“Before the attack, Hacking Team could control who had access to the technology that was sold exclusively to governments and government agencies,” the company said in a statement released on Wednesday. “Now, because of the work of criminals, the ability to control who uses the technology has been lost. Terrorists, extortionists and others can deploy this technology at will if they have the technical ability to do so.”
Earlier this week, Hacking Team sent out an email to clients requesting they discontinue use of its spyware. The company said on Wednesday that it suspects antivirus companies are implementing patches to exploits revealed by the leak, which may will help targets detect its so-called “undetectable” software.
In fact, a previously undisclosed vulnerability in Flash, discovered by researchers combing through Hacking Team’s files, was patched this week by Adobe Systems.
Photo by Alexandre Dulaunoy/Flickr (BY SA 2.0)
Dell Cameron was a reporter at the Daily Dot who covered security and politics. In 2015, he revealed the existence of an American hacker on the U.S. government's terrorist watchlist. He is a co-author of the Sabu Files, an award-nominated investigation into the FBI's use of cyber-informants. He became a staff writer at Gizmodo in 2017.