hacking team

Hacking Team Getting Hacked - In Whom We “Trust”?

The hack on the Italian-based firm Hacking Team revealed that exploiting is not just done by black hats and hackers, but this immoral act can be committed by a legitimate company.

After the revelation of the information, via a dump of 400 gigabits email, revealed that the company was involved in zero-day exploits. The company bought zero-days exploits to install its spyware in different systems.

Zero-day is a hole in the software that is exploited by the hackers before the vendor knows about it. The hacking team sold such exploits to many companies and through these vulnerable holes in the system installed their spy software RCS into targeted systems. These exploits provide information to many intelligence and law firms around the world.

Not only did they sell it to government agencies but they also sold these exploits to exploitive organizations from Saudi Arabia, Sudan, Ethiopia to name a few and potentially linked to an organization known as the Death Squad. This organization acquired these tools over a period from many companies and individuals, which were prized by criminals and government officials equally.

This company has acquired exploits that could break out of sandboxes shows the type and strength of the exploits they had. Sandbox is a security feature that keeps the malware, keep it from breaking into your computer and affecting the computer system. These vulnerabilities are highly prized because finding them is hard and if found the attacker can control the system. The company holds assets that breach privacy and has sold them to government and criminal hackers.

Hacking Team’s commercial video can give you a highlight of their business.

This news makes one question whether there is any organization that you can trust? Nowadays, intelligence and government agencies are breaching our privacy with software provided by legitimate companies like Hacking Team. The government and intelligence agencies may have a reason (which is debatable) to do this but the same company is also selling the same software to criminal hackers and organizations that mean no good. The companies and organization listed in their client list are criminal organizations. The company is responsible for assisting criminal organizations and intelligence organizations in breaching privacy of many computers and organizations. This is an unsettling to realize that legitimate business that is supposed to keep us safe from hackers and criminals is responsible for empowering them in doing so.

Taken from the video are some of the targeted medium.

hacking team

hacking team

Hacking Team since then responded to the hack and the media coverage surrounding the event.

This begs the question that is the cyber world really safe? What is this illusion of privacy that we are living in? And if companies and government are doing the same things as criminal hackers then whom do we trust?

It is high time that these questions are taken seriously. Debates must be held on such issues. These companies either have to come clean and remove the illusion of privacy from the minds of the public or have to define the rules and regulations of their operations. Under any circumstances, this implies that as of now we indeed are living in an era that mocks in the face of privacy.

TeskaLabs are helping organizations to embrace mobile and Internet of Things without worrying about security risks to their corporate data. To learn about our security solution, please send us an email at info@teskalabs.com or tweet to us @TeskaLabs.




You Might Be Interested in Reading These Articles

OpenSSL DROWN Vulnerability Affects Millions of HTTPS Websites and Software Supporting SSLv2 (CVE-2016-0800)

DROWN is caused by legacy OpenSSL SSLv2 protocol, known to have many deficiencies. Security experts have recommended to turn it off, but apparently many servers still support it because disabling SSLv2 requires non-default reconfiguration of the SSL cryptographic settings which is not easy for common IT people who have limited security knowledge and don’t know the location to disable this protocol and the way to disable it.

Continue reading ...

security bulletin blog

Published on April 12, 2016

The Most Prevalent Wordpress Security Myths

WordPress web development may not seem like a challenging task. Since this platform has been in existence, a wide range of Web developers have handled projects of this nature. However, the top web development companies are not always aware of the issues and problems that take place when it comes to security.

Continue reading ...

security

Published on April 15, 2019

Distributed-Denial-of-Service (DDoS) Disrupted Gaming Industry During the Holiday - What You Need to Know

During the Christmas holiday, the Xbox and PlayStation networks at Sony and Microsoft game websites were taken down by a group of hackers called Lizard squad. This attack put thousands of users out of game playing. What a bummer huh? Originally, the FBI blamed the North Koreans for taking down the network--that is another story, but had since revised their assessment when the Lizard squad claimed responsibility for the attack.

Continue reading ...

security

Published on January 27, 2015