Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Monday July 06 2015, @05:21PM   Printer-friendly
from the not-the-best-advertising dept.

Inquisitr has this story.

It is just now being reported on Twitter and by CSO Online that Italian security firm Hacking Team has been compromised by parties unknown.

The attack, which took place during the Women's World Cup, resulted in a Torrent file with over 400GB of of internal documents, source code, and email communications being made available to the public. Meanwhile, the attackers have also seized control of Hacking Team's Twitter, defacing it and posting images of the stolen data.

Christopher Soghoian, principal technologist of the ACLU, says that a preliminary analyst of the Torrent's contents suggests that Hacking Team included among their customers nations such as South Korea, Kazakhstan, Saudi Arabia, Oman, Lebanon, and Mongolia. Hacking Team, which specializes in intrusion and surveillance, has always maintained that they do not do business with oppressive governments.

The tools developed by Hacking Team have been linked to several cases of privacy invasion in the past, by researches and the media.

n1 writes:

As reported by Threatpost:

Among the more potentially damaging documents made public are invoices showing that Hacking Team has sold its intrusion software to government agencies in countries known to have oppressive regimes, including Sudan, Ethiopia, and Egypt.

[...] Hacking Team officials have not released any official public statements about the attack yet.

As researchers and others have begun to look through the documents, they have found a number of significant things, aside from the invoices. Among the discoveries is the fact that Hacking Team has a legitimate Apple iOS developer certificate that expires next year. Another researcher found a handful of files that listed the VPS (virtual private server) servers used by Hacking Team, and published a list of the IP addresses for the servers.


Original Submission 1
Original Submission 2

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Touché) by Runaway1956 on Monday July 06 2015, @06:02PM

    by Runaway1956 (2926) Subscriber Badge on Monday July 06 2015, @06:02PM (#205764) Journal

    They need something more to their name, like Federal.

    http://krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/ [krebsonsecurity.com]

    Starting Score:    1  point
    Moderation   +1  
       Touché=1, Total=1
    Extra 'Touché' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 4, Funny) by MrGuy on Monday July 06 2015, @06:15PM

    by MrGuy (1007) on Monday July 06 2015, @06:15PM (#205771)

    Or maybe something about Equations. [wikipedia.org]

    • (Score: 0) by Anonymous Coward on Monday July 06 2015, @11:54PM

      by Anonymous Coward on Monday July 06 2015, @11:54PM (#205905)

      How about Karma?

      • (Score: 3, Funny) by Runaway1956 on Tuesday July 07 2015, @01:28AM

        by Runaway1956 (2926) Subscriber Badge on Tuesday July 07 2015, @01:28AM (#205944) Journal

        Karma? That's when a script kiddie is reincarnated as a Game Boy, and a real hacker gets reincarnated as a data center.

        • (Score: 0) by Anonymous Coward on Tuesday July 07 2015, @02:15AM

          by Anonymous Coward on Tuesday July 07 2015, @02:15AM (#205962)

          I prefer to reincarnate into a Gameboy