Hacking Team Getting Hacked - In Whom We “Trust”?
The hack on the Italian-based firm Hacking Team revealed that exploiting is not just done by black hats and hackers, but this immoral act can be committed by a legitimate company.
After the revelation of the information, via a dump of 400 gigabits email, revealed that the company was involved in zero-day exploits. The company bought zero-days exploits to install its spyware in different systems.
Zero-day is a hole in the software that is exploited by the hackers before the vendor knows about it. The hacking team sold such exploits to many companies and through these vulnerable holes in the system installed their spy software RCS into targeted systems. These exploits provide information to many intelligence and law firms around the world.
Not only did they sell it to government agencies but they also sold these exploits to exploitive organizations from Saudi Arabia, Sudan, Ethiopia to name a few and potentially linked to an organization known as the Death Squad. This organization acquired these tools over a period from many companies and individuals, which were prized by criminals and government officials equally.
This company has acquired exploits that could break out of sandboxes shows the type and strength of the exploits they had. Sandbox is a security feature that keeps the malware, keep it from breaking into your computer and affecting the computer system. These vulnerabilities are highly prized because finding them is hard and if found the attacker can control the system. The company holds assets that breach privacy and has sold them to government and criminal hackers.
Hacking Team’s commercial video can give you a highlight of their business.
This news makes one question whether there is any organization that you can trust? Nowadays, intelligence and government agencies are breaching our privacy with software provided by legitimate companies like Hacking Team. The government and intelligence agencies may have a reason (which is debatable) to do this but the same company is also selling the same software to criminal hackers and organizations that mean no good. The companies and organization listed in their client list are criminal organizations. The company is responsible for assisting criminal organizations and intelligence organizations in breaching privacy of many computers and organizations. This is an unsettling to realize that legitimate business that is supposed to keep us safe from hackers and criminals is responsible for empowering them in doing so.
Taken from the video are some of the targeted medium.
Hacking Team since then responded to the hack and the media coverage surrounding the event.
This begs the question that is the cyber world really safe? What is this illusion of privacy that we are living in? And if companies and government are doing the same things as criminal hackers then whom do we trust?
It is high time that these questions are taken seriously. Debates must be held on such issues. These companies either have to come clean and remove the illusion of privacy from the minds of the public or have to define the rules and regulations of their operations. Under any circumstances, this implies that as of now we indeed are living in an era that mocks in the face of privacy.
TeskaLabs are helping organizations to embrace mobile and Internet of Things without worrying about security risks to their corporate data. To learn about our security solution, please send us an email at info@teskalabs.com or tweet to us @TeskaLabs.
Most Recent Articles
- A beginner-friendly intro to the Correlator for effective cybersecurity detection
- Inotify in ASAB Library
- From State Machine to Stateless Microservice
- Entangled ways of product development in the area of cybersecurity #3 - LogMan.io
- Entangled ways of product development in the area of cybersecurity #2 - BitSwan
You Might Be Interested in Reading These Articles
Future of the Automotive Mobility and Data Security
Mobility has always been at the cutting edge of human innovation and technological advancement. This is unlikely to change in the foreseeable future. Already, mobility as we know it is seeing significant disruption thanks to the entry of nontraditional players who are leveraging the power of computing devices and the Internet. But few things are likely to have a bigger impact on mobility than the enormous volumes of data that will be generated as a result.
Published on February 10, 2019
Snap to It: Mobile Secure Gateway Is In Your Future
The enterprise world is changing. In the past, enterprises built their IT infrastructure as isolated data fortresses and did everything they could to prevent outsiders from accessing their data. But now they need to open that fortress to allow communication via mobile technologies. And this hole is where hackers strike.
Published on July 07, 2015
A Warning about Zero-Day Vulnerability
A zero-day, also called zero-hour, vulnerability is a security flaw in the code that cyber criminal can use to access your network. Zero-day attacks call for new technologies built from the ground up for today’s advanced threat landscape. There is no known fix, and by the time hackers attack, the damage is already done
Published on May 12, 2015