Pwned Hacking Team tells cops, govts to shut down software

Probes whether leaks compromised cop shop ops


Flayed surveillance outfit Hacking Team is telling customers to suspend running instances of its software after 400GB of its source code and internal data was stolen and posted online.

The Milan company sells spy software to law enforcement agencies, and has been accused by activist groups of happily signing up oppressive governments as clients.

Documents revealed in the huge cache made public yesterday after the company was savagely hacked appear to confirm it had dealings with police and security agencies in countries with patchy human rights records including Egypt, Ethiopia, Saudi Arabia, and Sudan.

Western government agencies including the Australian Federal Police, the Federal Bureau of Investigations, and the United States Drug Enforcement Administration are also listed.

The company has now asked customers to temporarily suspend use of its software while it investigates if their spying operations have been exposed among the huge cache of released emails and source code.

Hacking Team spokesman Eric Rabe told Reuters that it is recommending clients suspend use of its programs until it can confirm whether law enforcement operations have been compromised.

"We would expect this to be a relatively short suspension of service," Rabe says.

It is the first official comment from the company after employees suggested on Twitter that the torrent file being shared contained "viruses", a statement that triggered ripples of mirth within the infosec community.

Much of the fallout of the hack has yet to arise as leaked emails and source code are studied.

The identity behind the hack of rival surveillance firm Gamma Group claimed responsibility on Twitter for the Hacking Team crack. ®


Keep Reading

NSO Group: Facebook tried to license our spyware to snoop on its own addicts – the same spyware it's suing us over

Antisocial network sought surveillance tech to boost its creepy Onavo Protect app, it is claimed

Now-patched Ubuntu desktop vulnerability allows privilege escalation

'Unusual for a vulnerability on a modern operating system to be this easy to exploit,' says bughunter

We are shocked to learn oppressive authoritarian surveillance state China injects spyware into foreigners' smartphones

Border cops accused of loading tourists' mobiles up with snoop app in Muslim area

Snap-crappy: 183 Brit local authorities operate 80,000 CCTV cams between them, says surveillance watchdog

Please make sure you're obeying the law, outgoing commissioner pleads

Windows kernel vulnerability disclosed by Google's Project Zero after bug exploited in the wild by hackers

Chocolate Factory spills beans early on privilege-escalation flaw

Israeli spyware maker NSO channels Hollywood spy thrillers in appeal for legal immunity in WhatsApp battle

In latest court bout, snooper biz seems to ask: Are you sure you want to open this can of worms?

Multi-part Android spyware lurked on Google Play Store for 4 years, posing as a bunch of legit-looking apps

Mandrake handlers could snoop on whatever victim did with their phone

Shared memory vulnerability in IBM's Db2 database could let nefarious insiders wreak havoc – so get patching

Lack of protections around trace facility gives local users read and write access

Biting the hand that feeds IT © 1998–2020