Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

HackingTeam

From Wikipedia, the free encyclopedia
(Redirected fromHacking Team)
Italian information technology company

HackingTeam
Hacking Team logo: ]Hacking Team[
IndustryInformation technology
Founded2003
FoundersDavid Vincenzetti, Valeriano Bedeschi
Defunct2020
FateDissolved
Headquarters,
Italy
ProductsSoftware (IT-Security)
BrandsHackingTeam
WebsiteHackingTeam.it(offline)

Hacking Team was aMilan-basedinformation technology company that sold offensive intrusion andsurveillance capabilities to governments, law enforcement agencies and corporations.[1] Its "Remote Control Systems" enable governments and corporations to monitor the communications of internet users, decipher theirencrypted files and emails, recordSkype and otherVoice over IP communications, and remotely activate microphones and camera on target computers.[2] The company has been criticized for providing these capabilities to governments with poorhuman rights records,[3] though HackingTeam states that they have the ability to disable their software if it is used unethically.[4][5] The Italian government has restricted their licence to do business with countries outside Europe.[6]

HackingTeam employs around 40 people in its Italian office, and has subsidiary branches inAnnapolis,Washington, D.C., andSingapore.[7] Its products are in use in dozens of countries across six continents.[8]

Company foundation

[edit]

HackingTeam was founded in 2003 by Italian entrepreneurs Vincenzetti and Valeriano Bedeschi. In 2007 the company was invested by two Italian VC: Fondo Next and Innogest.[9]

The Milan police department learned of the company. Hoping to use its tool to spy on Italian citizens and listen to their Skype calls, the police contacted Vincenzetti and asked him to help.[10] HackingTeam became "the first sellers of commercial hacking software to the police”.

According to former employee Byamukama Robinhood, the company began as security services provider, offeringpenetration testing, auditing and other defensive capabilities to clients.[11] Byamukama states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Byamukama claims fellow employees working on aspects of the same platform – for example, Android exploits and payloads – would not communicate with one another, possibly leading to tensions and strife within the organization.[11]

In February 2014, a report fromCitizen Lab identified the organisation to be using hosting services fromLinode,Telecom Italia,Rackspace, NOC4Hosts andbullet proof hosting companySantrex.[12]

On 5 July 2015 the company suffered a major data breach of customer data, software code, internal documents and e-mails. (See:§ 2015 data breach)

On 2 April 2019 HackingTeam was acquired by InTheCyber Group to create Memento Labs.[13]

Products and capabilities

[edit]

Hacking Team enables clients to perform remote monitoring functions against citizens via theirRCS (remote control systems), including their Da Vinci and Galileo platforms:[1]

  • Covert collection of emails, text message, phone call history and address books
  • Keystroke logging
  • Uncover search history data and take screenshots
  • Record audio from phone calls
  • Capture audio and video stream from device memory to bypasscryptography ofSkype sessions[14]
  • Use microphones on device to collect ambient background noise and conversations

HackingTeam uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.[18][19]

The malware has payloads forAndroid,[16]BlackBerry, AppleiOS,Linux,Mac OS X,Symbian, as well asMicrosoft Windows,Windows Mobile andWindows Phone class ofoperating systems.[20]

RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.

Controversies

[edit]

Use by repressive governments

[edit]

HackingTeam has been criticized for selling its products and services to governments with poor human rights records, includingSudan,Bahrain,Venezuela, andSaudi Arabia.[21]

In June 2014, aUnited Nations panel monitoring the implementation of sanctions on Sudan requested information from HackingTeam about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of HackingTeam revealed the organization sold Sudanese National Intelligence and Security Service access to their "Remote Control System" software in 2012 for 960,000 Euros.[21]

In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, HackingTeam asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.[21]

The U.N. disagreed. "The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of 'military ... equipment' or 'assistance' related to prohibited items," the secretary wrote in March. "Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel."[21][22]

In the fall of 2014, the Italian government abruptly froze all of HackingTeam's exports, citing human rights concerns. After lobbying Italian officials, the company temporarily won back the right to sell its products abroad.[21]

2015 data breach

[edit]

On July 5, 2015, theTwitter account of the company was compromised by an unknown individual who published an announcement of adata breach against HackingTeam's computer systems. The initial message read, "Sincewe have nothing to hide, we're publishing all our e-mails, files, and source code ..." and provided links to over 400gigabytes of data, including alleged internal e-mails, invoices, andsource code; which were leaked viaBitTorrent andMega.[23] An announcement of the data breach, including a link to the bittorrent seed, was retweeted byWikiLeaks and by many others through social media.[24][25]

The material was voluminous and early analysis appeared to reveal that HackingTeam had invoiced theLebanese Army[26] andSudan and that spy tools were also sold toBahrain andKazakhstan.[25] HackingTeam had previously claimed they had never done business with Sudan.[27]

The leaked data revealed azero-day cross-platform Flash exploit (CVE number:CVE-2015-5119.[28] The dump included a demo of this exploit by openingCalculator from a test webpage.[29][30][31] Adobepatched the hole on July 8, 2015.[32] Another vulnerability involving Adobe was revealed in the dumps, which took advantage of abuffer overflow attack on an Adobe Open Type ManagerDLL included withMicrosoft Windows. The DLL is run inkernel mode, so the attack could performprivilege escalation to bypass thesandbox.[33]

Also revealed in leaked data was HackingTeam employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'.[34]

After a few hours without response from HackingTeam, member Christian Pozzi tweeted the company was working closely with police and "what the attackers are claiming regarding our company is not true."[35][36] He also claimed the leaked archive "contains a virus" and that it constituted "false info".[37] Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised.[38]

Responsibility for this attack was claimed by the hacker known as "Phineas Fisher" (or Phisher) on Twitter.[39] Phineas has previously attacked spyware firmGamma International, who produce malware, such asFinFisher, for governments and corporations.[40] In 2016, Phineas published details of the attack, in Spanish and English, as a "how-to" for others, and explained the motivations behind the attack.[41][42]

The internal documents revealed details of HackingTeam's contracts with repressive governments.[43] In 2016, the Italian government again revoked the company's license to sell spyware outside of Europe without special permission.[6][44]

Use by Mexican drug cartels

[edit]

Corrupt Mexican officials have helped drug cartels obtain state-of-the-art spyware (including Hacking Team spyware). The software has been used to target and intimidate Mexican journalists by drug cartels and cartel-entwined government actors.[45]

Customer list

[edit]

HackingTeam's clientele include not just governments, but also corporate clients such asBarclays andBritish Telecom (BT) of theUnited Kingdom, as well asDeutsche Bank ofGermany.[1]

A full list of HackingTeam's customers were leaked in the 2015 breach. Disclosed documents show HackingTeam had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 millionEuros.[46][47][48][49][50][51]

On Sep 8, 2021, SentinelLABS released a research report about a Turkish threat actor EGoManiac, that used Remote Control System (RCS), software from the Italian infosec firm Hacking Team, which was operated between 2010 and 2016 and campaign run by Turkish TV journalists at OdaTV for spying Turkish police.[52]

Overview of Hacking Team customers
CustomerCountryAreaAgencyYear of first saleAnnual maintenance feesTotal client revenues
Polizia Postale e delle Comunicazioni[53]ItalyEuropeLEA2004€100,000€808,833
Centro Nacional de Inteligencia[54]SpainEuropeIntelligence2006€52,000€538,000
Infocomm Development Authority of SingaporeSingaporeAPACIntelligence2008€89,000€1,209,967
Information OfficeHungaryEuropeIntelligence2008€41,000€885,000
CSDNMoroccoMEAIntelligence2009€140,000€1,936,050
UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the PresidentUgandaAfricaIntelligence2015€731,000€920,197
Italy - DA - RentalItalyEuropeOther2009€50,000€628,250
Malaysian Anti-Corruption CommissionMalaysiaAPACIntelligence2009€77,000€789,123
PCMItalyEuropeIntelligence2009€90,000€764,297
SSNS - UngheriaHungaryEuropeIntelligence2009€64,000€1,011,000
CC - ItalyItalyEuropeLEA2010€50,000€497,349
Al Mukhabarat Al A'amahSaudi ArabiaMEAIntelligence2010€45,000€600,000
IR Authorities (Condor)LuxembourgEuropeOther2010€45,000€446,000
La Dependencia y/o CISEN[55]MexicoLATAMIntelligence2010€130,000€1,390,000
UZC[56]Czech RepublicEuropeLEA2010€55,000€689,779
Egypt - MOD[56]EgyptMEAOther2011€70,000€598,000
Federal Bureau of Investigation[57]USANorth AmericaLEA2011€100,000€697,710
Oman - IntelligenceOmanMEAIntelligence2011€30,000€500,000
President Security[58][59]PanamaLATAMIntelligence2011€110,000€750,000
Turkish National PoliceTurkeyEuropeLEA2011€45,000€440,000
UAE - MOIUAEMEALEA2011€90,000€634,500
National Security Service[56]UzbekistanAsiaIntelligence2011€50,000€917,038
Department of Defense[57]USANorth AmericaLEA2011€190,000
Bayelsa State GovernmentNigeriaMEAIntelligence2012€75,000€450,000
Estado de MexicoMexicoLATAMLEA2012€120,000€783,000
Information Network Security AgencyEthiopiaMEAIntelligence2012€80,000€750,000
State security (Falcon)LuxemburgEuropeOther2012€38,000€316,000
Italy - DA - RentalItalyEuropeOther2012€60,000€496,000
MAL - MIMalaysiaAPACIntelligence2012€77,000€552,000
Direction générale de la surveillance du territoireMoroccoMEAIntelligence2012€160,000€1,237,500
National Intelligence and Security Service[56]SudanMEAIntelligence2012€76,000€960,000
Russia - KVANT[60]RussiaEuropeIntelligence2012€72,000€451,017
Saudi - GIDSaudiMEALEA2012€114,000€1,201,000
SIS ofNational Security Committee of Kazakhstan[56]KazakhstanEuropeIntelligence2012€140,000€1,012,500
The 5163 Army Division (Alias of South Korean National Intelligence Service)[56][61][62]S. KoreaAPACOther2012€67,000€686,400
UAE - IntelligenceUAEMEAOther2012€150,000€1,200,000
Central Intelligence AgencyUSANorth AmericaIntelligence2011
Drug Enforcement Administration[57][63]USANorth AmericaOther2012€70,000€567,984
Central Anticorruption BureauPolandEuropeLEA2012€35,000€249,200
MOD SaudiSaudiMEAOther2013€220,000€1,108,687
PMOMalaysiaAPACIntelligence2013€64,500€520,000
Estado de QuerétaroMexicoLATAMLEA2013€48,000€234,500
National Security Agency[56]AzerbaijanEuropeIntelligence2013€32,000€349,000
Gobierno de PueblaMexicoLATAMOther2013€64,000€428,835
Gobierno de CampecheMexicoLATAMOther2013€78,000€386,296
AC MongoliaMongoliaAPACIntelligence2013€100,000€799,000
Dept. of Correction Thai PoliceThailandAPACLEA2013€52,000€286,482
National Intelligence Secretariat[64]EcuadorLATAMLEA2013€75,000€535,000
Police Intelligence Directorate[citation needed]ColombiaLATAMLEA2013€35,000€335,000
Guardia di FinanzaItalyEuropeLEA2013€80,000€400,000
Intelligence[65]CyprusEuropeLEA2013€40,000€375,625
MidWorld[66]BahrainMEAIntelligence2013€210,000
Mexico - PEMEXMexicoLATAMLEA2013€321,120
Malaysia KMalaysiaAPACLEA2013€0
HondurasHondurasLATAMLEA2014€355,000
Mex TaumalipasMexicoLATAM2014€322,900
Secretaría de Planeación y FinanzasMexicoLATAMLEA2014€91,000€371,035
AREAItaliaEurope2014€430,000
Mexico YucatánMexicoLATAMLEA2014€401,788
Mexico DurangoMexicoLATAMLEA2014€421,397
Investigations Police of ChileChileLATAMLEA2014€2,289,155
Jalisco MexicoMexicoLATAMLEA2014€748,003
Royal Thai ArmyThailandAPACLEA2014€360,000
Vietnam GD5VietnamAPAC2014€281,170
Kantonspolizei ZürichSwitzerlandEuropeLEA2014€486,500
Vietnam GD1VietnamAPACLEA2015€543,810
Egypt TRD GNSEEgyptMEALEA2015€137,500
Lebanese ArmyLebanonMEALEA2015
Federal Police DepartmentBrazilLATAMLEA2015
National Anticorruption DirectorateRomaniaDNAIntelligence2015
State Informative Service[67]AlbaniaEuropeSHIK2015
Danish National Police[68]DenmarkEurope2015€570,000

See also

[edit]

References

[edit]
  1. ^abcBatey, Angus (24 November 2011)."The spies behind your screen".The Telegraph.Archived from the original on 6 October 2022. Retrieved26 July 2015.
  2. ^"Enemies of the Internet: HackingTeam".Reporters Without Borders. Archived fromthe original on 29 April 2014. Retrieved24 April 2014.
  3. ^Marczak, Bill; Gaurnieri, Claudio; Marquis-Boire, Morgan; Scott-Railton, John (17 February 2014)."Mapping HackingTeam's "Untraceable" Spyware".Citizen Lab. Archived fromthe original on 20 February 2014.
  4. ^Kopfstein, Janus (10 March 2014)."Hackers Without Borders".The New Yorker.Archived from the original on 6 November 2018. Retrieved24 April 2014.
  5. ^Marquis-Boire, Morgan; Gaurnieri, Claudio; Scott-Railton, John; Kleemola, Katie (24 June 2014)."Police Story: HackingTeam's Government Surveillance Malware".Citizen Lab. University of Toronto. Archived fromthe original on 25 June 2014. Retrieved3 August 2014.
  6. ^abZorabedian, John (8 April 2016)."HackingTeam loses global license to sell spyware".Naked Security.Archived from the original on 6 June 2023. Retrieved15 May 2016.
  7. ^Human Rights Watch (25 March 2014)."They Know Everything We Do"Archived 3 May 2023 at theWayback Machine. Retrieved 1 August 2015.
  8. ^Jeffries, Adrianne (13 September 2013)."Meet HackingTeam, the company that helps the police hack you".The Verge.Archived from the original on 24 March 2016. Retrieved21 April 2014.
  9. ^"Noi, i padri del cyber-007". 2 December 2011.Archived from the original on 19 April 2019. Retrieved19 April 2019.
  10. ^Jeffries, Adrianne (13 September 2013)."Meet Hacking Team, the company that helps the police hack you".The Verge.Archived from the original on 24 March 2016. Retrieved20 August 2021.
  11. ^abFarivar, Cyrus (20 July 2015)."Hacking Team goes to war against former employees, suspects some helped hackers".Ars Technica.Archived from the original on 13 April 2019. Retrieved11 April 2024.
  12. ^"HackingTeam's US Nexus". 28 February 2014.Archived from the original on 12 July 2015. Retrieved2 August 2015.
  13. ^"Nasce Memento Labs". 2 April 2019.Archived from the original on 19 April 2019. Retrieved19 April 2019.
  14. ^Stecklow, Steve; Sonne, Paul; Bradley, Matt (1 June 2011)."Mideast Uses Western Tools to Battle the Skype Rebellion".The Wall Street Journal. Retrieved26 July 2015.
  15. ^Lin, Philippe (13 July 2015)."HackingTeam Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems".TrendLabs Security Intelligence Blog.Trend Micro.Archived from the original on 6 May 2019. Retrieved26 July 2015.
  16. ^ab"Advanced spyware for Android now available to script kiddies everywhere"Archived 18 April 2019 at theWayback Machine.Ars Technica. Retrieved 2 August 2015.
  17. ^Farivar, Cyrus (14 July 2015). "HackingTeam broke Bitcoin secrecy by targeting crucial wallet fileArchived 17 April 2019 at theWayback Machine".Ars Technica. Retrieved 26 July 2015.
  18. ^Schneier, Bruce."More on HackingTeam's Government Spying Software".Archived from the original on 31 October 2014. Retrieved28 June 2014.
  19. ^"HackingTeam Tools Allow Governments To Take Full Control of Your Smartphone".International Business Times UK. 24 June 2014.Archived from the original on 28 February 2019. Retrieved15 May 2016.
  20. ^Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014)."To Protect And Infect: The militarization of the Internet"Archived 23 June 2019 at theWayback Machine. At the 30thChaos Communications Congress – "30C3". (Video or Audio).Chaos Computer Club. Retrieved 15 August 2015.
  21. ^abcdeHay Newman, Lily (7 July 2015)."A Detailed Look at HackingTeam's Emails About Its Repressive Clients".The Intercept.Archived from the original on 7 March 2019. Retrieved15 May 2016.
  22. ^Knibbs, Kate (8 July 2015)."HackingTeam's Lame Excuse for Selling Digital Weapons to Sudan".Gizmodo.Archived from the original on 25 December 2017. Retrieved15 May 2016.
  23. ^"Hacked Team (@hackingteam)". Archived from the original on 6 July 2015. Retrieved6 July 2015.{{cite web}}: CS1 maint: bot: original URL status unknown (link)
  24. ^WikiLeaks [@wikileaks] (6 July 2015)."Inside malware makers "HackingTeam": hundreds of gigabytes of e-mails, files, and source code" (Tweet). Retrieved6 July 2015 – viaTwitter.
  25. ^ab"HackingTeam hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan".International Business Times. 6 June 2015.Archived from the original on 19 April 2019. Retrieved6 July 2015.
  26. ^HackingTeam onTwitter
  27. ^Ragan, Steve (5 July 2015)."HackingTeam hacked, attackers claim 400GB in dumped data". Retrieved6 July 2015.
  28. ^"Security Advisory for Adobe Flash Player".helpx.adobe.com.Adobe Systems. 8 July 2015.Archived from the original on 9 July 2015. Retrieved30 August 2016.
  29. ^Khandelwal, Swati."Zero-Day Flash Player Exploit Disclosed In 'HackingTeam' Data Dump".Archived from the original on 22 June 2019. Retrieved6 July 2015.
  30. ^Pi, Peter."Unpatched Flash Player Flaw, More POCs Found in HackingTeam Leak".Archived from the original on 22 June 2019. Retrieved8 July 2015.
  31. ^"WICAR test malware".Archived from the original on 31 August 2019. Retrieved16 May 2017.
  32. ^"Adobe Security Bulletin".Archived from the original on 10 July 2015. Retrieved11 July 2015.
  33. ^Tang, Jack (7 July 2015)."A Look at the Open Type Font Manager Vulnerability from the HackingTeam Leak".Archived from the original on 14 April 2019. Retrieved8 July 2015.
  34. ^Whittaker, Zack."HackingTeam used shockingly bad passwords".ZDNet.Archived from the original on 12 February 2019. Retrieved6 July 2015.
  35. ^Christian Pozzi."unknown". Archived fromthe original on 7 March 2021. Retrieved6 July 2015 – via Twitter.{{cite web}}:Cite uses generic title (help)
  36. ^Christian Pozzi."unknown". Archived fromthe original on 7 March 2021. Retrieved6 July 2015 – via Twitter.{{cite web}}:Cite uses generic title (help)
  37. ^Christian Pozzi."unknown". Archived fromthe original on 23 December 2020. Retrieved6 July 2015 – via Twitter.{{cite web}}:Cite uses generic title (help)
  38. ^"Christian Pozzi on Twitter: "Uh Oh - my twitter account was also hacked."". 6 July 2015. Archived fromthe original on 6 July 2015. Retrieved6 July 2015.
  39. ^Phineas Fisher [@gammagrouppr] (6 July 2015)."gamma and HT down, a few more to go :)" (Tweet) – viaTwitter.
  40. ^Osbourne, Charlie."HackingTeam: We won't 'shrivel up and go away' after cyberattack".ZDNet.Archived from the original on 5 July 2018. Retrieved6 July 2015.
  41. ^Hack Back — A DIY Guide (Hacking Team). 26 April 2017.Archived from the original on 8 January 2024. Retrieved8 January 2024.{{cite book}}:|website= ignored (help)
  42. ^"How HackingTeam got hacked".Ars Technica. 19 April 2016.Archived from the original on 18 June 2017. Retrieved15 May 2016.
  43. ^"A Detailed Look at HackingTeam's Emails About Its Repressive Clients".The Intercept. 7 July 2015.Archived from the original on 7 March 2019. Retrieved15 May 2016.
  44. ^"Hacking Team's Global License Revoked by Italian Export Authorities".Privacy International. 8 April 2016. Archived fromthe original on 5 May 2019. Retrieved15 May 2016.
  45. ^"'It's a free-for-all': how hi-tech spyware ends up in the hands of Mexico's cartels".TheGuardian.com. 7 December 2020.Archived from the original on 24 February 2022. Retrieved7 December 2020.
  46. ^Kopstein, Justin (6 July 2015)."Here Are All the Sketchy Government Agencies Buying HackingTeam's Spy Tech". Vice Magazine.Archived from the original on 31 March 2019. Retrieved5 May 2019.
  47. ^Weissman, Cale Guthrie (6 July 2015)."Hacked security company's documents show a laundry list of questionable clients".Business Insider.Archived from the original on 6 October 2019. Retrieved5 May 2019.
  48. ^Ragan, Steve."In Pictures: HackingTeam's hack curated". CSO Online (Australia).Archived from the original on 9 April 2019. Retrieved5 May 2019.
  49. ^Hern, Alex (6 July 2015)."HackingTeam hacked: firm sold spying tools to repressive regimes, documents claim".The Guardian. Retrieved22 July 2015.
  50. ^Ragan, Steve (6 July 2015)."HackingTeam responds to data breach, issues public threats and denials". CSO Online.Archived from the original on 1 March 2019. Retrieved22 July 2015.
  51. ^Stevenson, Alastair (14 July 2015)."A whole bunch of downed government surveillance programs are about to go back online". Business Insider.Archived from the original on 23 July 2015. Retrieved22 July 2015.
  52. ^Stevenson, Alastair (8 September 2021)."Hacking Team Customer in Turkey Was Arrested for Spying on Police Colleagues [or: The Spy Story That Spun a Tangled Web]". Zetter.Archived from the original on 4 April 2022. Retrieved8 September 2021.
  53. ^Jone Pierantonio."Ecco chi ha bucato HackingTeam"Archived 6 August 2015 at theWayback Machine.International Business Times. Retrieved 2 August 2015.
  54. ^Ediciones El País (8 July 2015)."HackingTeam: “Ofrecemos tecnología ofensiva para la Policía”"Archived 18 December 2019 at theWayback Machine.El País. Retrieved 2 August 2015.
  55. ^"The HackingTeam leak shows Mexico was its top client, but why?"Archived 10 October 2019 at theWayback Machine.Fusion. Retrieved 2 August 2015.
  56. ^abcdefg"Leaked emails from security firm HackingTeam show government use - Fortune"Archived 20 July 2015 at theWayback Machine.Fortune. Retrieved 2 August 2015.
  57. ^abc"Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware".The Intercept. Retrieved 2 August 2015.
  58. ^"HackingTeam's Equipment Got Stolen in Panama".Motherboard. Retrieved 2 August 2015.
  59. ^Molina, Thabata (13 August 2015)."Panama to Investigate Martinelli in HackingTeam Spying Scandal"Archived 27 June 2019 at theWayback Machine.Panama Post. Retrieved 15 August 2015.
  60. ^"HackingTeam apparently violated EU rules in sale of spyware to Russian agency"Archived 2 December 2017 at theWayback Machine.Ars Technica. Retrieved 2 August 2015.
  61. ^"How HackingTeam Created Spyware that Allowed the FBI To Monitor Tor Browser"Archived 12 June 2019 at theWayback Machine.The Intercept. Retrieved 2 August 2015.
  62. ^McGrath, Ben (25 July 2015). "Further revelations in South Korean hacking scandalArchived 7 August 2015 at theWayback Machine".World Socialist Web Site. Retrieved 26 July 2015.
  63. ^"The DEA Just Cancelled Its Contract With HackingTeam"Archived 7 October 2017 at theWayback Machine.Motherboard. Retrieved 2 August 2015.
  64. ^*Ecuadorian Websites Report on Hacking Team, Get Taken Down, archived fromthe original on 20 July 2019, retrieved5 May 2019
  65. ^In Cyprus (11 July 2015).Intelligence Service chief steps downArchived 2015-08-15 at theWayback Machine. Retrieved 26 July 2015.
  66. ^Bahrain Center for Human Rights (15 July 2015). "HackingTeam's troubling connections to BahrainArchived 21 July 2015 at theWayback Machine" IFEX. Retrieved 26 July 2015.
  67. ^Lexime (14 July 2015). "Burime të sigurta, SHISH përdor programet përgjuese që prej 2015. HackingTeams: Nuk e kemi nën kontroll sistemin!Archived 9 January 2020 at theWayback Machine" (video). BalkanWeb. Retrieved 27 July 2015.
  68. ^"Dansk politi køber overvågningssystem fra kontroversielt firma".Information.dk.Dagbladet Information.Archived from the original on 20 September 2021. Retrieved10 October 2021.
  69. ^HackingTeam: a zero-day market case studyArchived 24 July 2015 at theWayback Machine, Vlad Tsyrklevich's blog
  70. ^Perlroth, Nicole (10 October 2012).Ahead of Spyware Conference, More Evidence of AbuseArchived 26 December 2017 at theWayback Machine.The New York Times (Bits).

External links

[edit]
Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Advanced
persistent threats
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Retrieved from "https://en.wikipedia.org/w/index.php?title=HackingTeam&oldid=1280828244"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp