Hacking Team Hacked: Documents Show Company Sold Exploits And Spyware To UN-Blacklisted Governments
from the I-would-imagine-there-are-plenty-of-new-openings-on-its-appointment-calendar dept
Hacking Team — purveyor of exploits and spyware to a variety of government agencies all over the world — has been hacked. Late Sunday night, its Twitter account name was changed to “Hacked Team” and its bio to read:
Developing ineffective, easy-to-pwn offensive technology to compromise the operations of the worldwide law enforcement and intelligence communities.
Whoever’s behind this (no group has claimed responsibility yet) has repurposed the official Hacking Team Twitter feed to send out screenshots of incriminating information it/they have uncovered. For those who want to take a look themselves, the liberated documents can be torrented. Here are two places the torrent file can be picked up. (CAUTION: Actual file is 400 GB, so use a robust client and check your drive[s] for free space…) [And, if those go down, I’ve also stashed the torrent file here.]
What has been exposed so far shows Hacking Team has been lying about its business partners. It claims to only sell to NATO partners and blacklists oppressive governments. But its “Customer” Wiki appears to show that it counts such countries as Kazakhstan, Sudan, Russia, Saudi Arabia, Egypt and Malaysia as partners.
Screenshots of emails accessed by Hacking Team’s hackers show the company circumventing local regulations and restrictions on the export of exploits and spyware by using third-party resellers.
If you can’t see/read the screenshot, here’s the pertinent information. The email subject is “Remote Control Davinci System Into Nigeria.” Underneath that is the proposed third-party process for sneaking Hacking Team’s “Davinci” past import/export restrictions:
Commissions and meeting:
Being an Italian company, we are following the guidelines of our exterior ministry.
Understanding that this is an uncommon circumstance, this is what we are proposing:
HackingTeam will sell directly to your company and then TunsmosPetroleum will add its own mark up. The price you will purchase from us will include a discount on the list price as a compensation for the 1st meeting/demo in Milan and the training (in Milan as well) after the sale.
Other screenshots further confirm Hacking Team’s efforts in forbidden markets. One shows the company dealing with a “Sudan Citizen Lab request,” suggesting its end user(s) are uncomfortable with the investigative activities CL is performing.
ACLU technologist Chris Soghoian has taken a look at the files and uncovered even more incriminating information, including Hacking Team’s stonewalling of a UN investigation into its sales in Sudan. This investigation is the direct result of Citizen Lab’s investigative work. According to the files viewed by Soghoian, Hacking Team has denied any “current sales relationship” with Sudan, at least in terms of selling the sort of weaponized software forbidden by multiple treaties and UN resolutions. It claimed the software isn’t weaponized tech. The UN disagreed.
Your letter 1029 of 13 March 2015 also stated that the company did not consider the Remote Control Software to be a weapon, and therefore fell outside the parameters of the sanctions regime. The view of the Panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of “military… equipment” or “assistance” related to prohibited items…
There’s still plenty more to be uncovered in the document dump. Soghoian has already uncovered a spreadsheet listing every government customer, along with revenue to date.
Whatever happens from here on out should prove very interesting. Hacking Team is in for the longest Monday ever.
Filed Under: citizen lab, governments, hacking team, hacking tools, sudan, un
Companies: hacking team
Comments on “Hacking Team Hacked: Documents Show Company Sold Exploits And Spyware To UN-Blacklisted Governments”
Oh sweet schadenfreude...
A company that makes(well, made…) it’s money selling programs and exploits to compromise the security and privacy of others, has it’s own security broken, allowing the world to pour through their personal communications and files, just like they helped others to do. Now that is some world class turn-about there.
Can’t wait for them to start screaming about how ‘unfair’ it is for their privacy to be violated like this, and how it’s completely unacceptable, though I imagine given what’s been revealed a little ‘violation of privacy’ is going to be the least of their worries soon.
Re: Oh sweet schadenfreude...
Re: Re: Oh sweet schadenfreude...
well one of them did long enough to claim there was malware in the torrent dump, the police would get them, then the account went dark… then the account started talking and it was fairly clear it wasn’t him in control anymore.
Re: Oh sweet schadenfreude...
Yep. Couldn’t have happened to a nicer bunch.
More problems for them
“…This page (http://www.hackingteam.it/) is currently offline. However, because the site uses CloudFlare’s Always Online™ technology you can continue to surf a snapshot of the site. We will keep checking…”
There’s a moral here; no matter how smart you think you are, there’s always someone smarter. Or maybe just more devious.
I was more impressed that the Italian UN rep said they didn’t work for some nations, and now they are showing the bills these idiots sent to those nations.
Its just like how the US doesn’t engage in economic espionage
Re: Re:
Even better, take a look at the client list, there’s a screenshot here: http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html Clients are divided into three types, active, inactive and not officially supported. Guess who is the third type
Depending how entrenched in the power chain of NATO and its countries the company is we can safely assume the powers will deploy the full power of the Justice Hammer™ while gleefully ignoring they were doing business with shady Governments. Definition of which Governments are shady pending.
Re: Re:
No, they won’t. Why?
Because those agencies have bought the same software from the same shady company.
Re: Re:
I’m giving odds the Justice Hammer™ used in this case will be made of foam rubber. This reeks of company-collaborating-with-government to sell a little spy-spy ware to a target foreign government.
Re: Re: Re:
Oh sorry for my mistake, I forgot to insert after Justice Hammer™ “against the ones that hacked the company”
My bad
Corrupted Torrent Files
Those torrent files don’t work, at least on utorrent.
Re: Corrupted Torrent Files
Me too, can’t get them to open
Re: Re: Corrupted Torrent Files
The .torrent file contents is to large.
If one was motivated one could find a magnet link which will work.
There are reports that the Transmission client can handle the .torrent file.
Re: Re: Re: Corrupted Torrent Files
I’m sure if you scroll through YourAnonNews’ twitter feed, you might come across a magnet link…
…if I remember correctly.
Re: Corrupted Torrent Files
Use Tixati client 🙂
Yeah, same – getting cannot allocate memory error.
Re: Re:
What version are you using? Older versions can’t handle large torrents.
Am I the only one who thinks it’s immoral to sell security flaws to the highest bidder rather than fixing them?
Governments who respect their citizens’ rights should outright refuse to buy them and demand that such information be released to the public to have the flaws fixed.
Re: Re:
Makes sense. But where will you find a government that respects their citizens’ rights these days?
Re: Re: Re:
How about ‘EVER’?
Even though the US is a sure example of being better than most it never respected the citizens rights.
Liberty requires ETERNAL VIGILANCE! We have lost so many of them because those warning of the loss of liberty as freaks and tin foil hatters.
The slippery slope is not only very real, it is a zero day exploit!
And the moral is...
Selling exploits should be outright illegal. Even when there is a list of so called “good” countries, like this organization showed, there are always ways to reach a prohibited potential client as the email shows:
Obviously...
those documents are planted fakes since they were hacked. Or so they will claim.
Arresto!
Via Ars Technica…
There’s no realistic chance “Hacking Team” will find themselves arrested, is there?
Re: Arresto!
Arrested as in Stopped. No.
Arrested as in Incarcerated. No.
Remember who these people work for.
Almost every government on earth.
That some serious friends in high places.
—
http://securityzap.com/how-to-download-hacking-team-torrent-database/
magnet:?xt=urn:btih:51603bff88e0a1b3bad3962614978929c9d26955&dn=Hacked%20Team&tr=udp%3A%2F%2Fcoppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2710%2Fannounce&tr=http%3A%2F%2Fmgtracker.org%3A2710%2Fannounce&tr=http%3A%2F%2Fbt.careland.com.cn%3A6969%2Fannounce&tr=udp%3A%2F%2Fopen.demonii.com%3A1337&tr=udp%3A%2F%2Fexodus.desync.com%3A6969&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969&tr=udp%3A%2F%2Ftracker.pomf.se&tr=udp%3A%2F%2Ftracker.blackunicorn.xyz%3A6969
You know the maxim
Live by the sword, die by the sword.
Re: You know the maxim
The pen is mightier than the sword, and since we’re dealing with information warfare here, everybody would seem to be using pens.
I don’t have a good “pen only” maxim, but I do know that there’s a kindly anonymous hacker out there whose pen is much bigger than Hacking Team’s pen is.
Re: Re: You know the maxim
The pen is mightier than the sword but the Shwartz is mightier than the pen. “May the Shwartz be with you!”
Working torrent file
This is a spam-link. Do not follow. Will push .exe on you.
People have been mirroring it as well as uploading their internal projects to github:
https://github.com/hackedteam
Yes they contain working 0days, this one came with a nice readme!
https://twitter.com/w3bd3vil/status/618168863708962816
https://github.com/hackedteam/vector-exploit/blob/master/src/flash-0day-vitaly2/read%20me.txt
So, that’s where Sony’s PSN team went to.
I see several countries on that list that the US gov’t considers “partners” as well.
Predictions are fun
Hmmm…. lets see now.
Hacking Team has friends in almost every government on earth, since they’ve been assisting almost every government on earth in the process of spying on almost everyone else on earth.
They have just been exposed (by an unknown party), of working for everyone, while pretending to work only for the “designated good guys” on both sides of the line at once.
How does a company deal with such a dilemma?
Answer: Name Change!
“Hacking Team” becomes – oh I dunno – “Sunfallow Excursions” and carries on as usual from its shiny new offices in the Bahamas, without missing a beat.
After all, what government wants to charge such a group with a punishable crime and become the only government on earth not being serviced by that company and its wonderful surveillance toys?
Answer: None of them.
Thus, Hacking Team will be given a large sum of money by a large number of governments, to relocate and change their name and carry on with business as usual, with an even bigger budget and a better location.
Just a guess. 🙂
—