Hacking Team Getting Hacked - In Whom We “Trust”?
The hack on the Italian-based firm Hacking Team revealed that exploiting is not just done by black hats and hackers, but this immoral act can be committed by a legitimate company.
After the revelation of the information, via a dump of 400 gigabits email, revealed that the company was involved in zero-day exploits. The company bought zero-days exploits to install its spyware in different systems.
Zero-day is a hole in the software that is exploited by the hackers before the vendor knows about it. The hacking team sold such exploits to many companies and through these vulnerable holes in the system installed their spy software RCS into targeted systems. These exploits provide information to many intelligence and law firms around the world.
Not only did they sell it to government agencies but they also sold these exploits to exploitive organizations from Saudi Arabia, Sudan, Ethiopia to name a few and potentially linked to an organization known as the Death Squad. This organization acquired these tools over a period from many companies and individuals, which were prized by criminals and government officials equally.
This company has acquired exploits that could break out of sandboxes shows the type and strength of the exploits they had. Sandbox is a security feature that keeps the malware, keep it from breaking into your computer and affecting the computer system. These vulnerabilities are highly prized because finding them is hard and if found the attacker can control the system. The company holds assets that breach privacy and has sold them to government and criminal hackers.
Hacking Team’s commercial video can give you a highlight of their business.
This news makes one question whether there is any organization that you can trust? Nowadays, intelligence and government agencies are breaching our privacy with software provided by legitimate companies like Hacking Team. The government and intelligence agencies may have a reason (which is debatable) to do this but the same company is also selling the same software to criminal hackers and organizations that mean no good. The companies and organization listed in their client list are criminal organizations. The company is responsible for assisting criminal organizations and intelligence organizations in breaching privacy of many computers and organizations. This is an unsettling to realize that legitimate business that is supposed to keep us safe from hackers and criminals is responsible for empowering them in doing so.
Taken from the video are some of the targeted medium.
Hacking Team since then responded to the hack and the media coverage surrounding the event.
This begs the question that is the cyber world really safe? What is this illusion of privacy that we are living in? And if companies and government are doing the same things as criminal hackers then whom do we trust?
It is high time that these questions are taken seriously. Debates must be held on such issues. These companies either have to come clean and remove the illusion of privacy from the minds of the public or have to define the rules and regulations of their operations. Under any circumstances, this implies that as of now we indeed are living in an era that mocks in the face of privacy.
TeskaLabs are helping organizations to embrace mobile and Internet of Things without worrying about security risks to their corporate data. To learn about our security solution, please send us an email at email@example.com or tweet to us @TeskaLabs.
Most Recent Articles
You Might Be Interested in Reading These Articles
How TeskaLabs Helped O2 Improve Customer Satisfaction of eKasa Point-of-Sale (POS), the Most Successful POS Product / Mobile Cash Register on the Czech Market
In 2016 the Czech government introduced a new law that required businesses to report their sales and provide Electronic Evidence of Sales (EET). This law calls for the adoption of a more modern point-of-sale system that enables businesses to meet regulatory requirements set forth under this law. During the next two years, the law will gradually impact more than three hundred thousand companies in the Czech Republic. O2, the largest integrated telecommunications provider in the Czech market, observed that many would need help complying with this law, maintaining data security and demanding excellent customer support.
Published on August 08, 2017
Mobility has always been at the cutting edge of human innovation and technological advancement. This is unlikely to change in the foreseeable future. Already, mobility as we know it is seeing significant disruption thanks to the entry of nontraditional players who are leveraging the power of computing devices and the Internet. But few things are likely to have a bigger impact on mobility than the enormous volumes of data that will be generated as a result.
Published on February 10, 2019
With the year on year rise in ecommerce, there is a corresponding rise in online fraud - in fact, according to Financial Fraud Action UK, this type of activity had increased by a quarter to £399.5 million in the first half of 2016. The most recent manifestation of this is the concept of “testing” - this is where the criminals try small purchases to check the validity of card details, before moving in for the kill.
Published on July 04, 2017