Skip to main content

Hacking Team hacked by unknown hackers

The Milan, Italy-based “Hacking Team,” a company that hit headlines last year when it was discovered that the team created malware for use by law enforcement in examining texts, calls, and pictures on people’s smartphones, has admitted that it was hacked. Purportedly, at least 400GB of program source code, internal documents, and emails have been made public, and the firm’s Twitter feed and website were hijacked.

Although hackers are often portrayed as terrorists, thieves, and extortionists, the hackers in this case appear to be more of the vigilante variety, intent on giving Hacking Team a taste of its own medicine. At least on the surface.

All of the information the hackers copied off of Hacking Team computers was published online in a torrent file. They also changed the company’s Twitter handle to read “Hacked Team,”  and posted a message that read:

“Since we have nothing to hide, we’ve published all our e-mails, files and source,” followed by a link to the torrent file and a Mega download link. The tweet has since been removed and Hacking Team is now back in charge of its social networking, though its website is still down for the time being.

Related: These Hacking Team tools give the government full access to your smartphone

The fallout from this hack may be just beginning. From the file dump, it’s become clear that Hacking Team was selling its software and services to more than just European nations. It appears that it was also supplying South Korea, Kazakhstan, Saudi Arabia, Oman, Lebanon, Ecuador, Chile, Columbia, the United States, UAE, Singapore, and many other countries, including Sudan. This goes against previous claims by Hacking Team that it had never done business with Sudan.

CSO has some more of the details that are emerging as people dig through the torrent file, not least a personal thank you and a large payment from a foundation linked with the Ethiopian prime minister Meles Zenawi, appreciating Hacking Team’s help in acquiring a high profile target.

At this time, those behind the hack of Hacking Team’s systems remain unknown.

Editors' Recommendations

Jon Martindale
Jon Martindale is the Evergreen Coordinator for Computing, overseeing a team of writers addressing all the latest how to…
Hacker sent to jail for huge 2020 Twitter breach
A Twitter logo graphic.

A British man who took part in a high-profile Twitter hack in 2020 was handed a five-year jail term by a New York federal court on Friday.

Joseph O’Connor, 24, had pled guilty in May to four counts of computer hacking, wire fraud, and cyberstalking. He was also ordered to pay $794,000, the amount that he nabbed in the crypto crime.

Read more
Microsoft Teams is getting new AI tools — and they’re free
microsoft teams communities update builds on easy collaboration

Microsoft recently announced a major update to its communities and GroupMe features on its free Teams app. In addition to more features that mirror a platform like Discord, Teams now supports AI-generated images in Communities, à la Midjourney.

The Communities feature has been a breakout hit for Microsoft Teams since its introduction in December 2022, and has been available for Microsoft 365 Personal and Family plans, along with Teams Essentials accounts. Since then, many people have found the feature beneficial for local collaboration such as sharing projects, exchanging ideas, and pooling resources. According to user feedback, the feature allows collaborators to stay connected before, during, and after gatherings, Microsoft said.

Read more
This critical exploit could let hackers bypass your Mac’s defenses
A hacker typing on an Apple MacBook laptop while holding a phone. Both devices show code on their screens.

Microsoft has discovered a critical exploit in macOS that could grant hackers easy access to your Mac’s most important data. Dubbed ‘Migraine,’ it shows why it’s vital to update your Mac as soon as possible.

Migraine is so damaging because it can bypass Apple’s System Integrity Protection, or SIP for short. SIP is enabled by default on modern Macs and works by sandboxing sensitive parts of the computer from outside meddling. Only processes that are signed by Apple (or those with special privileges, like Apple installers) are allowed to alter something guarded by SIP.

Read more