Industry | Information technology |
---|---|
Founded | 2003 |
Founders | David Vincenzetti, Valeriano Bedeschi |
Defunct | 2020 |
Fate | Dissolved |
Headquarters | , Italy |
Products | Software (IT-Security) |
Brands | HackingTeam |
Website | HackingTeam.it (offline) |
Hacking Team was a Milan-based information technology company that sold offensive intrusion and surveillance capabilities to governments, law enforcement agencies and corporations. [1] Its "Remote Control Systems" enable governments and corporations to monitor the communications of internet users, decipher their encrypted files and emails, record Skype and other Voice over IP communications, and remotely activate microphones and camera on target computers. [2] The company has been criticized for providing these capabilities to governments with poor human rights records, [3] though HackingTeam states that they have the ability to disable their software if it is used unethically. [4] [5] The Italian government has restricted their licence to do business with countries outside Europe. [6]
HackingTeam employs around 40 people in its Italian office, and has subsidiary branches in Annapolis, Washington, D.C., and Singapore. [7] Its products are in use in dozens of countries across six continents. [8]
HackingTeam was founded in 2003 by Italian entrepreneurs Vincenzetti and Valeriano Bedeschi. In 2007 the company was invested by two Italian VC: Fondo Next and Innogest. [9]
The Milan police department learned of the company. Hoping to use its tool to spy on Italian citizens and listen to their Skype calls, the police contacted Vincenzetti and asked him to help. [10] HackingTeam became "the first sellers of commercial hacking software to the police”.
According to former employee Byamukama Robinhood, the company began as security services provider, offering penetration testing, auditing and other defensive capabilities to clients. [11] Byamukama states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Byamukama claims fellow employees working on aspects of the same platform – for example, Android exploits and payloads – would not communicate with one another, possibly leading to tensions and strife within the organization. [11]
In February 2014, a report from Citizen Lab identified the organisation to be using hosting services from Linode, Telecom Italia, Rackspace, NOC4Hosts and bullet proof hosting company Santrex. [12]
On 5 July 2015 the company suffered a major data breach of customer data, software code, internal documents and e-mails. (See: § 2015 data breach )
On 2 April 2019 HackingTeam was acquired by InTheCyber Group to create Memento Labs. [13]
Hacking Team enables clients to perform remote monitoring functions against citizens via their RCS (remote control systems), including their Da Vinci and Galileo platforms: [1]
HackingTeam uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection. [18] [19]
The malware has payloads for Android, [16] BlackBerry, Apple iOS, Linux, Mac OS X, Symbian, as well as Microsoft Windows, Windows Mobile and Windows Phone class of operating systems. [20]
RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.
HackingTeam has been criticized for selling its products and services to governments with poor human rights records, including Sudan, Bahrain, Venezuela, and Saudi Arabia. [21]
In June 2014, a United Nations panel monitoring the implementation of sanctions on Sudan requested information from HackingTeam about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of HackingTeam revealed the organization sold Sudanese National Intelligence and Security Service access to their "Remote Control System" software in 2012 for 960,000 Euros. [21]
In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, HackingTeam asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information. [21]
The U.N. disagreed. "The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of 'military ... equipment' or 'assistance' related to prohibited items," the secretary wrote in March. "Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel." [21] [22]
In the fall of 2014, the Italian government abruptly froze all of HackingTeam's exports, citing human rights concerns. After lobbying Italian officials, the company temporarily won back the right to sell its products abroad. [21]
On July 5, 2015, the Twitter account of the company was compromised by an unknown individual who published an announcement of a data breach against HackingTeam's computer systems. The initial message read, "Since we have nothing to hide, we're publishing all our e-mails, files, and source code ..." and provided links to over 400 gigabytes of data, including alleged internal e-mails, invoices, and source code; which were leaked via BitTorrent and Mega. [23] An announcement of the data breach, including a link to the bittorrent seed, was retweeted by WikiLeaks and by many others through social media. [24] [25]
The material was voluminous and early analysis appeared to reveal that HackingTeam had invoiced the Lebanese Army [26] and Sudan and that spy tools were also sold to Bahrain and Kazakhstan. [25] HackingTeam had previously claimed they had never done business with Sudan. [27]
The leaked data revealed a zero-day cross-platform Flash exploit (CVE number: CVE - 2015-5119. [28] The dump included a demo of this exploit by opening Calculator from a test webpage. [29] [30] [31] Adobe patched the hole on July 8, 2015. [32] Another vulnerability involving Adobe was revealed in the dumps, which took advantage of a buffer overflow attack on an Adobe Open Type Manager DLL included with Microsoft Windows. The DLL is run in kernel mode, so the attack could perform privilege escalation to bypass the sandbox. [33]
Also revealed in leaked data was HackingTeam employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'. [34]
After a few hours without response from HackingTeam, member Christian Pozzi tweeted the company was working closely with police and "what the attackers are claiming regarding our company is not true." [35] [36] He also claimed the leaked archive "contains a virus" and that it constituted "false info". [37] Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised. [38]
Responsibility for this attack was claimed by the hacker known as "Phineas Fisher" (or Phisher) on Twitter. [39] Phineas has previously attacked spyware firm Gamma International, who produce malware, such as FinFisher, for governments and corporations. [40] In 2016, Phineas published details of the attack, in Spanish and English, as a "how-to" for others, and explained the motivations behind the attack. [41] [42]
The internal documents revealed details of HackingTeam's contracts with repressive governments. [43] In 2016, the Italian government again revoked the company's license to sell spyware outside of Europe without special permission. [6] [44]
Corrupt Mexican officials have helped drug cartels obtain state-of-the-art spyware (including Hacking Team spyware). The software has been used to target and intimidate Mexican journalists by drug cartels and cartel-entwined government actors. [45]
HackingTeam's clientele include not just governments, but also corporate clients such as Barclays and British Telecom (BT) of the United Kingdom, as well as Deutsche Bank of Germany. [1]
A full list of HackingTeam's customers were leaked in the 2015 breach. Disclosed documents show HackingTeam had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million Euros. [46] [47] [48] [49] [50] [51]
On Sep 8, 2021, SentinelLABS released a research report about a Turkish threat actor EGoManiac, that used Remote Control System (RCS), software from the Italian infosec firm Hacking Team, which was operated between 2010 and 2016 and campaign run by Turkish TV journalists at OdaTV for spying Turkish police. [52]
Customer | Country | Area | Agency | Year of first sale | Annual maintenance fees | Total client revenues |
---|---|---|---|---|---|---|
Polizia Postale e delle Comunicazioni [53] | Italy | Europe | LEA | 2004 | €100,000 | €808,833 |
Centro Nacional de Inteligencia [54] | Spain | Europe | Intelligence | 2006 | €52,000 | €538,000 |
Infocomm Development Authority of Singapore | Singapore | APAC | Intelligence | 2008 | €89,000 | €1,209,967 |
Information Office | Hungary | Europe | Intelligence | 2008 | €41,000 | €885,000 |
CSDN | Morocco | MEA | Intelligence | 2009 | €140,000 | €1,936,050 |
UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the President | Uganda | Africa | Intelligence | 2015 | €731,000 | €920,197 |
Italy - DA - Rental | Italy | Europe | Other | 2009 | €50,000 | €628,250 |
Malaysian Anti-Corruption Commission | Malaysia | APAC | Intelligence | 2009 | €77,000 | €789,123 |
PCM | Italy | Europe | Intelligence | 2009 | €90,000 | €764,297 |
SSNS - Ungheria | Hungary | Europe | Intelligence | 2009 | €64,000 | €1,011,000 |
CC - Italy | Italy | Europe | LEA | 2010 | €50,000 | €497,349 |
Al Mukhabarat Al A'amah | Saudi Arabia | MEA | Intelligence | 2010 | €45,000 | €600,000 |
IR Authorities (Condor) | Luxembourg | Europe | Other | 2010 | €45,000 | €446,000 |
La Dependencia y/o CISEN [55] | Mexico | LATAM | Intelligence | 2010 | €130,000 | €1,390,000 |
UZC [56] | Czech Republic | Europe | LEA | 2010 | €55,000 | €689,779 |
Egypt - MOD [56] | Egypt | MEA | Other | 2011 | €70,000 | €598,000 |
Federal Bureau of Investigation [57] | USA | North America | LEA | 2011 | €100,000 | €697,710 |
Oman - Intelligence | Oman | MEA | Intelligence | 2011 | €30,000 | €500,000 |
President Security [58] [59] | Panama | LATAM | Intelligence | 2011 | €110,000 | €750,000 |
Turkish National Police | Turkey | Europe | LEA | 2011 | €45,000 | €440,000 |
UAE - MOI | UAE | MEA | LEA | 2011 | €90,000 | €634,500 |
National Security Service [56] | Uzbekistan | Asia | Intelligence | 2011 | €50,000 | €917,038 |
Department of Defense [57] | USA | North America | LEA | 2011 | €190,000 | |
Bayelsa State Government | Nigeria | MEA | Intelligence | 2012 | €75,000 | €450,000 |
Estado de Mexico | Mexico | LATAM | LEA | 2012 | €120,000 | €783,000 |
Information Network Security Agency | Ethiopia | MEA | Intelligence | 2012 | €80,000 | €750,000 |
State security (Falcon) | Luxemburg | Europe | Other | 2012 | €38,000 | €316,000 |
Italy - DA - Rental | Italy | Europe | Other | 2012 | €60,000 | €496,000 |
MAL - MI | Malaysia | APAC | Intelligence | 2012 | €77,000 | €552,000 |
Direction générale de la surveillance du territoire | Morocco | MEA | Intelligence | 2012 | €160,000 | €1,237,500 |
National Intelligence and Security Service [56] | Sudan | MEA | Intelligence | 2012 | €76,000 | €960,000 |
Russia - KVANT [60] | Russia | Europe | Intelligence | 2012 | €72,000 | €451,017 |
Saudi - GID | Saudi | MEA | LEA | 2012 | €114,000 | €1,201,000 |
SIS of National Security Committee of Kazakhstan [56] | Kazakhstan | Europe | Intelligence | 2012 | €140,000 | €1,012,500 |
The 5163 Army Division (Alias of South Korean National Intelligence Service) [56] [61] [62] | S. Korea | APAC | Other | 2012 | €67,000 | €686,400 |
UAE - Intelligence | UAE | MEA | Other | 2012 | €150,000 | €1,200,000 |
Central Intelligence Agency | USA | North America | Intelligence | 2011 | ||
Drug Enforcement Administration [57] [63] | USA | North America | Other | 2012 | €70,000 | €567,984 |
Central Anticorruption Bureau | Poland | Europe | LEA | 2012 | €35,000 | €249,200 |
MOD Saudi | Saudi | MEA | Other | 2013 | €220,000 | €1,108,687 |
PMO | Malaysia | APAC | Intelligence | 2013 | €64,500 | €520,000 |
Estado de Querétaro | Mexico | LATAM | LEA | 2013 | €48,000 | €234,500 |
National Security Agency [56] | Azerbaijan | Europe | Intelligence | 2013 | €32,000 | €349,000 |
Gobierno de Puebla | Mexico | LATAM | Other | 2013 | €64,000 | €428,835 |
Gobierno de Campeche | Mexico | LATAM | Other | 2013 | €78,000 | €386,296 |
AC Mongolia | Mongolia | APAC | Intelligence | 2013 | €100,000 | €799,000 |
Dept. of Correction Thai Police | Thailand | APAC | LEA | 2013 | €52,000 | €286,482 |
National Intelligence Secretariat [64] | Ecuador | LATAM | LEA | 2013 | €75,000 | €535,000 |
Police Intelligence Directorate[ citation needed ] | Colombia | LATAM | LEA | 2013 | €35,000 | €335,000 |
Guardia di Finanza | Italy | Europe | LEA | 2013 | €80,000 | €400,000 |
Intelligence [65] | Cyprus | Europe | LEA | 2013 | €40,000 | €375,625 |
MidWorld [66] | Bahrain | MEA | Intelligence | 2013 | €210,000 | |
Mexico - PEMEX | Mexico | LATAM | LEA | 2013 | €321,120 | |
Malaysia K | Malaysia | APAC | LEA | 2013 | €0 | |
Honduras | Honduras | LATAM | LEA | 2014 | €355,000 | |
Mex Taumalipas | Mexico | LATAM | 2014 | €322,900 | ||
Secretaría de Planeación y Finanzas | Mexico | LATAM | LEA | 2014 | €91,000 | €371,035 |
AREA | Italia | Europe | 2014 | €430,000 | ||
Mexico Yucatán | Mexico | LATAM | LEA | 2014 | €401,788 | |
Mexico Durango | Mexico | LATAM | LEA | 2014 | €421,397 | |
Investigations Police of Chile | Chile | LATAM | LEA | 2014 | €2,289,155 | |
Jalisco Mexico | Mexico | LATAM | LEA | 2014 | €748,003 | |
Royal Thai Army | Thailand | APAC | LEA | 2014 | €360,000 | |
Vietnam GD5 | Vietnam | APAC | 2014 | €281,170 | ||
Kantonspolizei Zürich | Switzerland | Europe | LEA | 2014 | €486,500 | |
Vietnam GD1 | Vietnam | APAC | LEA | 2015 | €543,810 | |
Egypt TRD GNSE | Egypt | MEA | LEA | 2015 | €137,500 | |
Lebanese Army | Lebanon | MEA | LEA | 2015 | ||
Federal Police Department | Brazil | LATAM | LEA | 2015 | ||
National Anticorruption Directorate | Romania | DNA | Intelligence | 2015 | ||
State Informative Service [67] | Albania | Europe | SHIK | 2015 | ||
Danish National Police [68] | Denmark | Europe | 2015 | €570,000 |
Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types.
Spyware is any malware that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's security, or other means. This behavior may be present in other malware and in legitimate software. Websites may engage in spyware behaviors like web tracking. Hardware devices may also be affected.
Trellix is a privately held cybersecurity company that was founded in 2022. It has been involved in the detection and prevention of major cybersecurity attacks. It provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and analyze IT security risks.
Kaspersky Lab is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky and Alexey De-Monderik. Kaspersky Lab develops and sells antivirus, internet security, password management, endpoint security, and other cybersecurity products and services.
Cyber spying, cyber espionage, or cyber-collection is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information using methods on the Internet, networks or individual computers through the use of proxy servers, cracking techniques and malicious software including Trojan horses and spyware. Cyber espionage can be used to target various actors- individuals, competitors, rivals, groups, governments, and others- in order to obtain personal, economic, political or military advantages. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.
Cyberwarfare by China is the aggregate of cyberattacks attributed to the organs of the People's Republic of China and various related advanced persistent threat (APT) groups.
HBGary is a subsidiary company of ManTech International, focused on technology security. In the past, two distinct but affiliated firms had carried the HBGary name: HBGary Federal, which sold its products to the US Government, and HBGary, Inc. Its other clients included information assurance companies, computer emergency response teams, and computer forensic investigators. On 29 February 2012, HBGary, Inc. announced it had been acquired by IT services firm ManTech International. At the same time, HBGary Federal was reported to be closed.
FinFisher, also known as FinSpy, is surveillance software marketed by Lench IT Solutions plc, which markets the spyware through law enforcement channels.
Cyberweapons are commonly defined as malware agents employed for military, paramilitary, or intelligence objectives as part of a cyberattack. This includes computer viruses, trojans, spyware, and worms that can introduce malicious code into existing software, causing a computer to perform actions or processes unintended by its operator.
Morgan Marquis-Boire is a New Zealand-born hacker, journalist, and security researcher. Marquis-Boire previously served as an advisor to the Freedom of the Press Foundation. He was a Special Advisor to the Electronic Frontier Foundation (EFF) and advisor to the United Nations Interregional Crime and Justice Research Institute. He was the Director of Security at First Look Media and a contributing writer at The Intercept. He has been profiled by Wired, CNN, Süddeutsche Zeitung, and Tages Anzeiger. He was one of Wired Italy 's Top 50 people of 2014. In March 2015 he was named a Young Global Leader.
On November 24, 2014, the hacker group "Guardians of Peace" leaked confidential data from the film studio Sony Pictures Entertainment (SPE). The data included employee emails, personal and family information, executive salaries, then-unreleased films, future film plans, screenplays, and other information. The perpetrators then employed a variant of the Shamoon wiper malware to erase Sony's computer infrastructure.
Cozy Bear is a Russian advanced persistent threat hacker group believed to be associated with Russian foreign intelligence by United States intelligence agencies and those of allied countries. Dutch signals intelligence (AIVD) and American intelligence had been monitoring the group since 2014 and was able to link the hacker group to the Russian foreign intelligence agency (SVR) after compromising security cameras in their office. CrowdStrike and Estonian intelligence reported a tentative link to the Russian domestic/foreign intelligence agency (FSB). Various groups designate it CozyCar, CozyDuke, Dark Halo, The Dukes, Midnight Blizzard, NOBELIUM, Office Monkeys, StellarParticle, UNC2452 with a tentative connection to Russian hacker group YTTRIUM. Symantec reported that Cozy Bear had been compromising diplomatic organizations and national governments since at least 2010. Der Spiegel published documents in 2023 purporting to link Russian IT firm NTC Vulkan to Cozy Bear operations.
Fancy Bear is a Russian cyber espionage group. Cybersecurity firm CrowdStrike has said with a medium level of confidence that it is associated with the Russian military intelligence agency GRU. The UK's Foreign and Commonwealth Office as well as security firms SecureWorks, ThreatConnect, and Mandiant, have also said the group is sponsored by the Russian government. In 2018, an indictment by the United States Special Counsel identified Fancy Bear as GRU Unit 26165. This refers to its unified Military Unit Number of the Russian army regiments. The headquarters of Fancy Bear and the entire military unit, which reportedly specializes in state-sponsored cyberattacks and decryption of hacked data, were targeted by Ukrainian drones on July 24, 2023, the rooftop on an adjacent building collapsed as a result of the explosion.
Gamma Group is an Anglo-German technology company that sells surveillance software to governments and police forces around the world. The company has been strongly criticised by human rights organisations for selling its FinFisher software to undemocratic regimes such as Egypt and Bahrain.
Phineas Fisher is an unidentified hacktivist and self-proclaimed anarchist revolutionary. Notable hacks include the surveillance company Gamma International, Hacking Team, the Sindicat De Mossos d'Esquadra and the ruling Turkish Justice and Development Party, three of which were later made searchable by WikiLeaks.
NSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click surveillance of smartphones. It employed almost 500 people as of 2017.
Pegasus is a spyware developed by the Israeli cyber-arms company NSO Group that is designed to be covertly and remotely installed on mobile phones running iOS and Android. While NSO Group markets Pegasus as a product for fighting crime and terrorism, governments around the world have routinely used the spyware to surveil journalists, lawyers, political dissidents, and human rights activists. The sale of Pegasus licenses to foreign governments must be approved by the Israeli Ministry of Defense.
Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare. The files, dating from 2013 to 2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs, web browsers including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera, the operating systems of most smartphones including Apple's iOS and Google's Android, and computer operating systems including Microsoft Windows, macOS, and Linux. A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release. The tools were developed by the Operations Support Branch of the CIA.
Hack Forums is an Internet forum dedicated to discussions related to hacker culture and computer security. The website ranks as the number one website in the "Hacking" category in terms of web-traffic by the analysis company Alexa Internet. The website has been widely reported as facilitating online criminal activity, such as the case of Zachary Shames, who was arrested for selling keylogging software on Hack Forums in 2013 which was used to steal personal information.
The Pegasus Project is an international investigative journalism initiative that revealed governments' espionage on journalists, opposition politicians, activists, business people and others using the private Pegasus spyware developed by the Israeli technology and cyber-arms company NSO Group. Pegasus is ostensibly marketed for surveillance of "serious crimes and terrorism". In 2020, a target list of 50,000 phone numbers leaked to Forbidden Stories, and an analysis revealed the list contained the numbers of leading opposition politicians, human rights activists, journalists, lawyers and other political dissidents.
{{cite web}}
: CS1 maint: bot: original URL status unknown (link){{cite web}}
: Cite uses generic title (help){{cite web}}
: Cite uses generic title (help){{cite web}}
: Cite uses generic title (help){{cite book}}
: |website=
ignored (help)