Hacking Team

Hacking Team
Industry Information technology
Founded 2003
Founders David Vincenzetti, Valeriano Bedeschi
Headquarters Milan, Italy
Key people
Alberto Ornaghi, Marco Valleri
Products
  • Software
Website www.hackingteam.it

Hacking Team is a Milan-based information technology company that sells offensive intrusion and surveillance capabilities to governments, law enforcement agencies and corporations.[1] Its "Remote Control Systems" enable governments and corporations to monitor the communications of internet users, decipher their encrypted files and emails, record Skype and other Voice over IP communications, and remotely activate microphones and camera on target computers.[2] The company has been criticized for providing these capabilities to governments with poor human rights records.[3] Hacking Team states that they have the ability to disable their software if it is used unethically.[4][5]

Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in Annapolis, Washington, D.C. and Singapore.[6] Its products are in use in dozens of countries across six continents.[7]

History

Hacking Team was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called Ettercap, was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.

The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their Skype calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. Hacking Team was born, and became "the first sellers of commercial hacking software to the police."[7]

According to former employee Alberto Pelliccione, the company began as security services provider, offering penetration testing, auditing and other defensive capabilities to clients.[8] Pelliccione states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Pelliccione claims fellow employees working on aspects of the same platform - for example, Android exploits and payloads - would not communicate with one another, possibly leading to tensions and strife within the organization.[8]

In February 2014, a report from Citizen Lab identified the organisation to be using hosting services from Linode, Telecom Italia, Rackspace, NOC4Hosts and notorious bullet proof hosting company Santrex.[9]

On July 5, 2015 the company suffered a major data breach of customer data, software code, internal documents and emails. - See: § 2015 data breach

Products and Capabilities

Hacking Team enables clients to perform remote monitoring functions against citizens via their RCS (Remote Control Systems), including their Da Vinci and Galileo platforms:[1]

  • Capture audio and video stream from device memory to bypass cryptography of Skype sessions[10]
  • Use microphones on device to collect ambient background noise and conversations

Hacking Team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.[14][15]

The malware has payloads for Android,[12] BlackBerry, Apple iOS, Linux, Mac OS X, Symbian, as well as Microsoft Windows, Windows Mobile and Windows Phone class of operating systems.[16]

RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.

Controversies

Use by repressive goverments

Hacking Team has been criticized for selling its products and services to governments with poor human rights records, including Sudan, Bahrain, and Saudi Arabia.[17]

In June 2014, a United Nations panel monitoring the implementation of sanctions on Sudan requested information from Hacking Team about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of Hacking Team revealed the organization sold Sudanese National Intelligence and Security Service access to their "Remote Control System" software in 2012 for 960,000 Euros.[17][18]

In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, Hacking Team asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.[17][19]

The U.N. disagreed. “The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of ‘military … equipment’ or ‘assistance’ related to prohibited items,” the secretary wrote in March. “Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel.”[17][20]

In the fall of 2014, the Italian government abruptly froze all of Hacking Team’s exports, citing human rights concerns. After lobbying Italian officials, the company eventually won back the right to sell its products abroad.[17]

2015 data breach

On July 5, 2015, the Twitter account of the company was compromised by an unknown individual who published an announcement of a data breach against Hacking Team's computer systems. The initial message read, "Since we have nothing to hide, we're publishing all our e-mails, files, and source code …" and provided links to over 400 gigabytes of data, including alleged internal e-mails, invoices, and source code; which were leaked via BitTorrent and Mega.[21] An announcement of the data breach, including a link to the bittorrent seed, was retweeted by WikiLeaks and by many others through social media.[22][23]

The material was voluminous and early analysis appeared to reveal that Hacking Team had invoiced the Lebanese Army[24] and Sudan and that spy tools were also sold to Bahrain and Kazakhstan.[23] Hacking Team had previously claimed they had never done business with Sudan.[25]

The leaked data revealed a zero-day cross-platform Flash exploit (CVE number: CVE-2015-5119).[26] The dump included a demo of this exploit by opening Calculator from a test webpage.[27][28] Adobe patched the hole on July 8, 2015.[29] Another vulnerability involving Adobe was revealed in the dumps, which took advantage of a buffer overflow attack on an Adobe Open Type Manager DLL included with Microsoft Windows. The DLL is run in kernel mode, so the attack could perform privilege escalation to bypass the sandbox.[30]

Also revealed in leaked data was Hacking Team employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'.[31]

After a few hours without response from Hacking Team, member Christian Pozzi tweeted the company was working closely with police and "what the attackers are claiming regarding our company is not true."[32][33] He also claimed the leaked archive "contains a virus" and that it constituted "false info".[34] Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised.[35]

Responsibility for this attack was claimed by the hacker known as Phineas Fisher on Twitter.[36] Phineas has previously attacked spyware firm Gamma International, who produce malware, such as FinFisher, for governments and corporations.[37]

Customer List

Hacking Team's clientele include not just governments, but also corporate clients such as Barclay's Bank and British Telecom (BT) of the United Kingdom, as well as Deutsche Bank of Germany.[1]

A full list of Hacking Team's customers were leaked in the 2015 breach. Disclosed documents show Hacking Team had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million Euros.[38][39][40][41][42][43]

Customer Country Area Agency Year First Sale Annual Maintenance Fees Total Client Revenues
Polizia Postale e delle Comunicazioni[44]ItalyEuropeLEA2004€100,000€808,833
Centro Nacional de Inteligencia[45]SpainEuropeIntelligence2006€52,000€538,000
Infocomm Development Authority of SingaporeSingaporeAPACIntelligence2008€89,000€1,209,967
Information OfficeHungaryEuropeIntelligence2008€41,000€885,000
CSDNMoroccoMEAIntelligence2009€140,000€1,936,050
UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the PresidentUgandaAfricaIntelligence2015€831,000€52,197,100
Italy - DA - RentalItalyEuropeOther2009€50,000€628,250
Malaysian Anti-Corruption CommissionMalaysiaAPACIntelligence2009€77,000€789,123
PCMItalyEuropeIntelligence2009€90,000€764,297
SSNS - UngheriaHungaryEuropeIntelligence2009€64,000€1,011,000
CC - ItalyItalyEuropeLEA2010€50,000€497,349
Al Mukhabarat Al A'amahSaudi ArabiaMEAIntelligence2010€45,000€600,000
IR Authorities (Condor)LuxembourgEuropeOther2010€45,000€446,000
La Dependencia y/o CISEN[46]MexicoLATAMIntelligence2010€130,000€1,390,000
UZC[47] Czech Republic EuropeLEA2010€55,000€689,779
Egypt - MOD[47]EgyptMEAOther2011€70,000€598,000
Federal Bureau of Investigation[48]USANorth AmericaLEA2011€100,000€697,710
Oman - IntelligenceOmanMEAIntelligence2011€30,000€500,000
President Security[49][50] PanamaLATAMIntelligence2011€110,000€750,000
Turkish National PoliceTurkeyEuropeLEA2011€45,000€440,000
UAE - MOIUAEMEALEA2011€90,000€634,500
National Security Service[47]UzbekistanEuropeIntelligence2011€50,000€917,038
Department of Defense[48]USANorth AmericaLEA2011€190,000
Bayelsa State GovernmentNigeriaMEAIntelligence2012€75,000€450,000
Estado del MexicoMexicoLATAMLEA2012€120,000€783,000
Information Network Security AgencyEthiopiaMEAIntelligence2012€80,000€750,000
State security (Falcon)LuxemburgEuropeOther2012€38,000€316,000
Italy - DA - RentalItalyEuropeOther2012€60,000€496,000
MAL - MIMalaysiaAPACIntelligence2012€77,000€552,000
Direction générale de la surveillance du territoireMoroccoMEAIntelligence2012€160,000€1,237,500
National Intelligence and Security Service[47]SudanMEAIntelligence2012€76,000€960,000
Russia - KVANT[51]RussiaEuropeIntelligence2012€72,000€451,017
Saudi - GIDSaudiMEALEA2012€114,000€1,201,000
SIS of National Security Committee of the Republic of Kazakhstan[47]KazakhstanEuropeIntelligence2012€140,000€1,012,500
The 5163 Army Division (Alias of South Korean National Intelligence Service)[47][52][53]S. KoreaAPACOther2012€67,000€686,400
UAE - IntelligenceUAEMEAOther2012€150,000€1,200,000
Drug Enforcement Administration[48][54]USANorth AmericaOther2012€70,000€567,984
Central Anticorruption BureauPolandEuropeLEA2012€35,000€249,200
MOD SaudiSaudiMEAOther2013€220,000€1,108,687
PMOMalaysiaAPACIntelligence2013€64,500€520,000
Estado de QeretaroMexicoLATAMLEA2013€48,000€234,500
Azerbaijan NS[47]AzerbaijanEuropeIntelligence2013€32,000€349,000
Gobierno de PueblaMexicoLATAMOther2013€64,000€428,835
Gobierno de CampecheMexicoLATAMOther2013€78,000€386,296
AC MongoliaMongoliaAPACIntelligence2013€100,000€799,000
Dept. of Correction Thai Police ThailandAPACLEA2013€52,000€286,482
National Intelligence Secretariat[55] EcuadorLATAMLEA2013€75,000€535,000
Police Intelligence Directorate[56]ColombiaLATAMLEA2013€35,000€335,000
Guardia di FinanzaItalyEuropeLEA2013€80,000€400,000
Intelligence[57]CyprusEuropeLEA2013€40,000€375,625
MidWorld[58]BahrainMEAIntelligence2013€210,000
Mexico - PEMEXMexico LATAMLEA 2013€321,120
Malysia KMalaysiaAPACLEA2013€0
HondurasHondurasLATAMLEA2014€355,000
Mex TaumalipasMexicoLATAM2014€322,900
Secretaría de Planeación y FinanzasMexicoLATAMLEA2014€91,000€371,035
AREAItaliaEurope2014€430,000
Mexico YucatánMexicoLATAMLEA2014€401,788
Mexico DurangoMexicoLATAMLEA2014€421,397
Investigations Police of ChileChileLATAMLEA2014€2,289,155
Jalisco MexicoMexicoLATAMLEA2014€748,003
Royal Thai ArmyThailandAPACLEA2014€360,000
Vietnam GD5VietnamAPAC2014€281,170
Kantonspolizei ZürichSwitzerlandEuropeLEA2014€486,500
Vietnam GD1VietnamAPACLEA2015€543,810
Egypt TRD GNSEEgyptMEALEA2015€137,500
Lebanon Army ForcesLebanonMEALEA2015
Federal Police DepartmentBrazilLATAMLEA2015
State Informative Service[59]AlbaniaEuropeSHIK2015

See also

References

  1. 1 2 3 Batey, Angus (24 November 2011). "The spies behind your screen". The Telegraph. Retrieved 26 July 2015.
  2. "Enemies of the Internet: Hacking Team". Reporters Without Borders. Retrieved 24 April 2014.
  3. Marczak, Bill; Gaurnieri, Claudio; Marquis-Boire, Morgan; Scott-Railton, John (February 17, 2014). "Mapping Hacking Team's "Untraceable" Spyware".
  4. Kopstein, Joshua (10 March 2014). "Hackers Without Borders". The New Yorker. Retrieved 24 April 2014.
  5. Marquis-Boire, Morgan; Gaurnieri, Claudio; Scott-Railton, John; Kleemola, Katie (June 24, 2014). "Police Story: Hacking Team’s Government Surveillance Malware". Citizen Lab. University of Toronto. Retrieved August 3, 2014.
  6. Human Rights Watch (25 March 2014). "They Know Everything We Do". Retrieved 1 August 2015.
  7. 1 2 Jeffries, Adrianne (13 September 2013). "Meet Hacking Team, the company that helps the police hack you". The Verge. Retrieved 21 April 2014.
  8. 1 2 Farivar, Cyrus (20 July 2015) "Hacking Team goes to war against former employees, suspects some helped hackers". Ars Technica. Retrieved 26 July 2015.
  9. "Hacking Team’s US Nexus". 28 February 2014. Retrieved 2 August 2015.
  10. Stecklow, Steve; Sonne, Paul; Bradley, Matt (1 June 2011). "Mideast Uses Western Tools to Battle the Skype Rebellion". Wall Street Journal. Retrieved 26 July 2015.
  11. Lin, Philippe (July 13, 2015). "Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems". TrendLabs Security Intelligence Blog. Trend Micro. Retrieved July 26, 2015.
  12. 1 2 "Advanced spyware for Android now available to script kiddies everywhere". Ars Technica. Retrieved on 2 August 2015.
  13. Farivar, Cyrus (14 July 2015). "Hacking Team broke Bitcoin secrecy by targeting crucial wallet file". Ars Technica. Retrieved 26 July 2015.
  14. Schneier, Bruce. "More on Hacking Team's Government Spying Software".
  15. "Hacking Team Tools Allow Governments To Take Full Control of Your Smartphone". Retrieved 2015-07-06.
  16. Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014). "To Protect And Infect: The militarization of the Internet". At the 30th Chaos Communications Congress – "30C3". (Video or Audio). Chaos Computer Club. Retrieved on 15 August 2015.
  17. 1 2 3 4 5 Currier, Cora; Marquis-Boire, Morgan. "A Detailed Look at Hacking Team’s Emails About Its Repressive Clients". Retrieved 7 July 2015.
  18. Hay Newman, Lily. "A Company That Sells Surveillance Software to Authoritarian Regimes Got Hacked Itself". Retrieved 2015-07-06.
  19. Myers West, Sarah. "Hacking Team Leaks Reveal Spyware Industry's Growth, Negligence of Human Rights". Retrieved 8 July 2015.
  20. Knibbs, Kate. "Hacking Team's Lame Excuse for Selling Digital Weapons to Sudan". Retrieved 2015-07-08.
  21. Hacked Team (@hackingteam) at the Wayback Machine (archived July 6, 2015)
  22. Inside malware makers "Hacking Team": hundreds of gigabytes of e-mails, files, and source code WikiLeaks on Twitter. July 6, 2015. Retrieved July 6, 2015.
  23. 1 2 "Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan". Retrieved 2015-07-06.
  24. Hacking Team on Twitter
  25. Ragan, Steve. "Hacking Team hacked, attackers claim 400GB in dumped data". Retrieved 2015-07-06.
  26. "https://helpx.adobe.com/security/products/flash-player/apsa15-03.html". External link in |title= (help)
  27. Khandelwal, Swati. "Zero-Day Flash Player Exploit Disclosed In 'Hacking Team' Data Dump". Retrieved 2015-07-06.
  28. Pi, Peter. "Unpatched Flash Player Flaw, More POCs Found in Hacking Team Leak". Retrieved 2015-07-08.
  29. Adobe Systems (corporate author). "Adobe Security Bulletin". Retrieved 2015-07-11.
  30. Tang, Jack. "A Look at the Open Type Font Manager Vulnerability from the Hacking Team Leak". Retrieved 2015-07-08.
  31. Whittaker, Zack. "Hacking Team used shockingly bad passwords". Retrieved 2015-07-06.
  32. "Christian Pozzi on Twitter". Retrieved 2015-07-06.
  33. "Christian Pozzi on Twitter". Retrieved 2015-07-06.
  34. "Christian Pozzi on Twitter". Retrieved 2015-07-06.
  35. "Christian Pozzi on Twitter: "Uh Oh - my twitter account was also hacked."". 2015-07-06. Retrieved 2015-07-06.
  36. Phineas Fisher [gammagrouppr] (6 July 2015). "gamma and HT down, a few more to go :)" (Tweet).
  37. Osbourne, Charlie. "Hacking Team: We won't 'shrivel up and go away' after cyberattack". Retrieved 2015-07-06.
  38. Kopstein, Justin (6 July 2015). "Here Are All the Sketchy Government Agencies Buying Hacking Team's Spy Tech". Vice Magazine.
  39. Weissman, Cale Guthrie (6 July 2015). "Hacked security company's documents show a laundry list of questionable clients".
  40. Ragan, Steve. "In Pictures: Hacking Team's hack curated". CSO Online (Australia).
  41. Hern, Alex (6 July 2015). "Hacking Team hacked: firm sold spying tools to repressive regimes, documents claim". The Guardian. Retrieved 22 July 2015.
  42. Ragan, Steve (6 July 2015). "Hacking Team responds to data breach, issues public threats and denials". CSO Online. Retrieved 22 July 2015.
  43. Stevenson, Alastair (14 July 2015). "A whole bunch of downed government surveillance programs are about to go back online". Business Insider. Retrieved 22 July 2015.
  44. Jone Pierantonio. "Ecco chi ha bucato Hacking Team". International Business Times. Retrieved on 2 August 2015.
  45. Ediciones El País (8 July 2015). "Hacking Team: “Ofrecemos tecnología ofensiva para la Policía”". EL PAÍS. Retrieved on 2 August 2015.
  46. "The Hacking Team leak shows Mexico was its top client, but why?". Fusion. Retrieved on 2 August 2015.
  47. 1 2 3 4 5 6 7 "Leaked emails from security firm Hacking Team show government use - Fortune". Fortune. Retrieved on 2 August 2015.
  48. 1 2 3 "Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware". The Intercept. Retrieved on 2 August 2015.
  49. "Hacking Team's Equipment Got Stolen in Panama". Motherboard. Retrieved on 2 August 2015.
  50. Molina, Thabata (13 August 2015). "Panama to Investigate Martinelli in Hacking Team Spying Scandal". Panama Post. Retrieved 15 August 2015.
  51. "Hacking Team apparently violated EU rules in sale of spyware to Russian agency". Ars Technica. Retrieved on 2 August 2015.
  52. "How Hacking Team Created Spyware that Allowed the FBI To Monitor Tor Browser". The Intercept. Retrieved on 2 August 2015.
  53. McGrath, Ben (25 July 2015). "Further revelations in South Korean hacking scandal". World Socialist Web Site. Retrieved 26 July 2015.
  54. "The DEA Just Cancelled Its Contract With Hacking Team". Motherboard. Retrieved on 2 August 2015.
  55. http://panampost.com/rebeca-morla/2015/07/13/ecuadorian-websites-report-on-hacking-team-get-taken-down/
    http://panampost.com/panam-staff/2015/08/10/hacking-team-helped-ecuador-spy-on-opposition-activist/
    http://bigstory.ap.org/article/6f41d49888174b45857d34511fda1caf/apnewsbreak-email-leak-suggests-ecuador-spied-opposition
  56. Podour, Justin (23 July 2015). "#HackedTeam y Colombia: Cómo la vigilancia ayuda a un Estado violento". Telesur. Retrieved 26 July 2015.
  57. In Cyprus (11 July 2015)."Intelligence Service chief steps down". Retrieved 26 July 2015.
  58. Bahrain Center for Human Rights (15 July 2015). "Hacking Team's troubling connections to Bahrain" IFEX. Retrieved 26 July 2015.
  59. Lexime (14 July 2015). "Burime të sigurta, SHISH përdor programet përgjuese që prej 2015. Hacking Teams: Nuk e kemi nën kontroll sistemin!" (video). BalkanWeb. Retrieved 27 July 2015.
  60. Hacking Team: a zero-day market case study, Vlad Tsyrklevich's blog
  61. Perlroth, Nicole (10 October 2012). Ahead of Spyware Conference, More Evidence of Abuse. New York Times (Bits).

External links

This article is issued from Wikipedia - version of the Sunday, January 24, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.