-
Tips for becoming a good boxer - November 6, 2020
-
7 expert tips for making your hens night a memorable one - November 6, 2020
-
5 reasons to host your Christmas party on a cruise boat - November 6, 2020
-
What to do when you’re charged with a crime - November 6, 2020
-
Should you get one or multiple dogs? Here’s all you need to know - November 3, 2020
-
A Guide: How to Build Your Very Own Magic Mirror - February 14, 2019
-
Our Top Inspirational Baseball Stars - November 24, 2018
-
Five Tech Tools That Will Help You Turn Your Blog into a Business - November 24, 2018
-
How to Indulge on Vacation without Expanding Your Waist - November 9, 2018
-
5 Strategies for Businesses to Appeal to Today’s Increasingly Mobile-Crazed Customers - November 9, 2018
Italian surveillance company apparently hacked
Hacking Team, the cybersecurity firm which saw 400GB of private data published on Sunday night in a humiliating hack, has been forced to advise customers to stop using its software while it assesses the damage caused by the leak.
Advertisement
The Italian company, which sells surveillance tools to government and law enforcement agencies, was hacked over the weekend.
One tweet by the hackers that is written as if it were posted by Hacking Team reads: “Since we have nothing to hide, we’re publishing all our e-mails, files, and source code, followed by a link”.
Confirmation of the breach came via the Twitter account of Hacking Team engineer Christian Pozzi. Hacking Team refuses to publicly confirm the identity of its clients, citing confidentiality; however, leaked documents list its clients as including government security agencies in several African and Middle Eastern countries with poor human rights records. Hacking Team had denied ever working with Sudan after a report in 2014 accused it of doing so.
As yet those who cracked Hacking Team are unknown, and the company itself hasn’t produced any statement.
Phineas Fisher had previously hacked Gamma global, a British-German surveillance company that’s behind the spyware software FinFisher. Hacking Team’s previous and current clients include the United States Federal Bureau of Investigation, Lebanon Army Forces and the Egyptian Ministry of Defense.
According to Citizen Lab, a Canadian think tank, Hacking Team’s software has been used to target the Shia minority in Saudi Arabia and journalists critical of the government in Ethiopia, from where dozens of journalists have fled in the past decade due to “threats and intimidation”.
Hacking Team produces software which is used by governments around the world as part of their surveillance programs.
Based on a service maintenance list shared by Twitter user @SynAckPwn, it indicated that contracts with Sudan’s National Intelligence Security Service and Russia’s Intelligence Kvant Research were in place, but this was not officially supported. That lines up with previous reporting by Motherboard that appeared to show the company using shell companies to sell its products to the the Drug Enforcement Administration.
Advertisement
However, a second document, an invoice for 480,000 euros to the same security service, calls into question repeated denials by the Hacking Team that it has ever done business with Sudan, which is subject to heavy trade restrictions.