Skip to main content

Hacking Team hacked by unknown hackers

The Milan, Italy-based “Hacking Team,” a company that hit headlines last year when it was discovered that the team created malware for use by law enforcement in examining texts, calls, and pictures on people’s smartphones, has admitted that it was hacked. Purportedly, at least 400GB of program source code, internal documents, and emails have been made public, and the firm’s Twitter feed and website were hijacked.

Although hackers are often portrayed as terrorists, thieves, and extortionists, the hackers in this case appear to be more of the vigilante variety, intent on giving Hacking Team a taste of its own medicine. At least on the surface.

Recommended Videos

All of the information the hackers copied off of Hacking Team computers was published online in a torrent file. They also changed the company’s Twitter handle to read “Hacked Team,”  and posted a message that read:

“Since we have nothing to hide, we’ve published all our e-mails, files and source,” followed by a link to the torrent file and a Mega download link. The tweet has since been removed and Hacking Team is now back in charge of its social networking, though its website is still down for the time being.

Related: These Hacking Team tools give the government full access to your smartphone

The fallout from this hack may be just beginning. From the file dump, it’s become clear that Hacking Team was selling its software and services to more than just European nations. It appears that it was also supplying South Korea, Kazakhstan, Saudi Arabia, Oman, Lebanon, Ecuador, Chile, Columbia, the United States, UAE, Singapore, and many other countries, including Sudan. This goes against previous claims by Hacking Team that it had never done business with Sudan.

CSO has some more of the details that are emerging as people dig through the torrent file, not least a personal thank you and a large payment from a foundation linked with the Ethiopian prime minister Meles Zenawi, appreciating Hacking Team’s help in acquiring a high profile target.

At this time, those behind the hack of Hacking Team’s systems remain unknown.

Jon Martindale
Jon Martindale is a freelance evergreen writer and occasional section coordinator, covering how to guides, best-of lists, and…
How your boss can spy on you with Slack, Zoom, and Teams
Good Morning GIF in Slack on a laptop.

Virtual workspace tools like Slack and Teams can be incredibly handy, both for those working in the office who need to send a quick message or arrange a meeting, and especially for those working remotely who need to stay in contact with their co-workers. With the rise of remote work, more and more office workers are spending a significant chunk of their day on these tools. However, if you use these then you should be aware that what you do in these systems isn't private -- most likely it can be seen by your boss. Even private conversations may not be as private as you think.
Slack

Apps like Slack, Teams, and other common business collaboration platforms are structured via admin permissions. In other words, with the right permissions, your boss can have a large amount of control over the platform and what’s happening on it. And if a manager goes to IT -- well, they can ask to see just about anything that happens on the app.

Read more
Hackers targeted 1Password after Okta breach, but your logins are safe
A dark mystery hand typing on a laptop computer at night.

Security credentials like usernames and passwords are a tempting target for hackers, and even the best password managers can come under threat from time to time. That was the case recently with the popular password manager 1Password, which recently disclosed (via Bleeping Computer) that its Okta support system was breached by malicious hackers.

Fortunately, it doesn’t appear that any customer data was stolen, so if you use 1Password, your login info should be safe for now. However, it’s always good to regularly update your passwords (or use passkeys) just in case they fall into the wrong hands.

Read more
Hackers are using this incredibly sneaky trick to hide malware
A hacker typing on an Apple MacBook laptop, which shows code on its screen.

One of the most important things you can do to protect your online security is install one of the best password managers, but a recent cyberattack proves that you have to be careful even when doing that. Thanks to some sneaky malware hidden in Google Ads, you could end up with viruses riddling your PC.

The issue affects popular password manager KeePass -- or rather, it attempts to impersonate KeePass by using misleading Google Ads. First spotted by Malwarebytes, the nefarious link appears at the top of search results, meaning you’ll likely see it before the legitimate websites that follow beneath it.

Read more