Article DEPK Hacking Team Hacked: Documents Show Company Sold Exploits And Spyware To UN-Blacklisted Governments

Hacking Team Hacked: Documents Show Company Sold Exploits And Spyware To UN-Blacklisted Governments

by
Tim Cushing
from Techdirt on (#DEPK)

Hacking Team -- purveyor of exploits and spyware to a variety of government agencies all over the world -- has been hacked. Late Sunday night, its Twitter account name was changed to "Hacked Team" and its bio to read:

WURHFHq.png
Developing ineffective, easy-to-pwn offensive technology to compromise the operations of the worldwide law enforcement and intelligence communities.
Whoever's behind this (no group has claimed responsibility yet) has repurposed the official Hacking Team Twitter feed to send out screenshots of incriminating information it/they have uncovered. For those who want to take a look themselves, the liberated documents can be torrented. Here are two places the torrent file can be picked up. (CAUTION: Actual file is 400 GB, so use a robust client and check your drive[s] for free space") [And, if those go down, I've also stashed the torrent file here.]

What has been exposed so far shows Hacking Team has been lying about its business partners. It claims to only sell to NATO partners and blacklists oppressive governments. But its "Customer" Wiki appears to show that it counts such countries as Kazakhstan, Sudan, Russia, Saudi Arabia, Egypt and Malaysia as partners.

Screenshots of emails accessed by Hacking Team's hackers show the company circumventing local regulations and restrictions on the export of exploits and spyware by using third-party resellers.
nO48yGV.png


If you can't see/read the screenshot, here's the pertinent information. The email subject is "Remote Control Davinci System Into Nigeria." Underneath that is the proposed third-party process for sneaking Hacking Team's "Davinci" past import/export restrictions:

Commissions and meeting:

Being an Italian company, we are following the guidelines of our exterior ministry.

Understanding that this is an uncommon circumstance, this is what we are proposing:

HackingTeam will sell directly to your company and then TunsmosPetroleum will add its own mark up. The price you will purchase from us will include a discount on the list price as a compensation for the 1st meeting/demo in Milan and the training (in Milan as well) after the sale.
Other screenshots further confirm Hacking Team's efforts in forbidden markets. One shows the company dealing with a "Sudan Citizen Lab request," suggesting its end user(s) are uncomfortable with the investigative activities CL is performing.

ACLU technologist Chris Soghoian has taken a look at the files and uncovered even more incriminating information, including Hacking Team's stonewalling of a UN investigation into its sales in Sudan. This investigation is the direct result of Citizen Lab's investigative work. According to the files viewed by Soghoian, Hacking Team has denied any "current sales relationship" with Sudan, at least in terms of selling the sort of weaponized software forbidden by multiple treaties and UN resolutions. It claimed the software isn't weaponized tech. The UN disagreed.
AyagFCe.png
Your letter 1029 of 13 March 2015 also stated that the company did not consider the Remote Control Software to be a weapon, and therefore fell outside the parameters of the sanctions regime. The view of the Panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of "military" equipment" or "assistance" related to prohibited items"
There's still plenty more to be uncovered in the document dump. Soghoian has already uncovered a spreadsheet listing every government customer, along with revenue to date.

Whatever happens from here on out should prove very interesting. Hacking Team is in for the longest Monday ever.

Permalink | Comments | Email This Story

rc.img

rc.img

rc.img

a2.imga2t.imgmf.giffeed?i=jj0xk0aQ0Zg:K0erKdllcgc:D7DqB2pKE feed?d=c-S6u7MTCTEjj0xk0aQ0Zg
External Content
Source RSS or Atom Feed
Feed Location https://www.techdirt.com/techdirt_rss.xml
Feed Title Techdirt
Feed Link https://www.techdirt.com/
Reply 0 comments