Hacking Team was a Milan -based information technology company that sold offensive intrusion and surveillance capabilities to governments, law enforcement agencies and corporations.1 Its â Remote Control Systems â enable governments and corporations to monitor the communications of internet users, decipher their encrypted files and emails, record Skype and other Voice over IP communications, and remotely activate microphones and camera on target computers.2 The company has been criticized for providing these capabilities to governments with poor human rights records,3 though HackingTeam states that they have the ability to disable their software if it is used unethically.4 5 The Italian government has restricted their licence to do business with countries outside Europe.6
HackingTeam employs around 40 people in its Italian office, and has subsidiary branches in Annapolis, Washington, D.C., and Singapore.7 Its products are in use in dozens of countries across six continents.8
Company foundation
HackingTeam was founded in 2003 by Italian entrepreneurs Vincenzetti and Valeriano Bedeschi. In 2007 the company was invested by two Italian VC: Fondo Next and Innogest.9
The Milan police department learned of the company. Hoping to use its tool to spy on Italian citizens and listen to their Skype calls, the police contacted Vincenzetti and asked him to help.10 HackingTeam became âthe first sellers of commercial hacking software to the policeâ.
According to former employee Byamukama Robinhood, the company began as security services provider, offering penetration testing, auditing and other defensive capabilities to clients.11 Byamukama states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Byamukama claims fellow employees working on aspects of the same platform â for example, Android exploits and payloads â would not communicate with one another, possibly leading to tensions and strife within the organization.11
In February 2014, a report from Citizen Lab identified the organisation to be using hosting services from Linode, Telecom Italia, Rackspace, NOC4Hosts and bullet proof hosting company Santrex.12
On 5 July 2015 the company suffered a major data breach of customer data, software code, internal documents and e-mails. (See: § 2015 data breach)
On 2 April 2019 HackingTeam was acquired by InTheCyber Group to create Memento Labs.13
Hacking Team enables clients to perform remote monitoring functions against citizens via their RCS (remote control systems), including their Da Vinci and Galileo platforms:1
-
Covert collection of emails, text message, phone call history and address books
-
Uncover search history data and take screenshots
-
Record audio from phone calls
-
Capture audio and video stream from device memory to bypass cryptography of Skype sessions 14
-
Use microphones on device to collect ambient background noise and conversations
-
Activate phone or computer cameras
-
Hijack telephone GPS systems to monitor targetâs location
-
Infect target computerâs UEFI BIOS firmware with a rootkit 15
-
Extract WiFi passwords 16
-
Exfiltrate Bitcoin and other cryptocurrency wallet files to collect data on local accounts, contacts and transaction histories 17
HackingTeam uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.18 19
The malware has payloads for Android,16 BlackBerry, Apple iOS, Linux, Mac OS X, Symbian, as well as Microsoft Windows, Windows Mobile and Windows Phone class of operating systems.20
RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.
Controversies
HackingTeam has been criticized for selling its products and services to governments with poor human rights records, including Sudan, Bahrain, Venezuela, and Saudi Arabia.21
In June 2014, a United Nations panel monitoring the implementation of sanctions on Sudan requested information from HackingTeam about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of HackingTeam revealed the organization sold Sudanese National Intelligence and Security Service access to their âRemote Control Systemâ software in 2012 for 960,000 Euros.21
In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, HackingTeam asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.21
The U.N. disagreed. âThe view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of âmilitary⊠equipmentâ or âassistanceâ related to prohibited items,â the secretary wrote in March. âThus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel.â 21 22
In the fall of 2014, the Italian government abruptly froze all of HackingTeamâs exports, citing human rights concerns. After lobbying Italian officials, the company temporarily won back the right to sell its products abroad.21
On July 5, 2015, the Twitter account of the company was compromised by an unknown individual who published an announcement of a data breach against HackingTeamâs computer systems. The initial message read, â Since we have nothing to hide, weâre publishing all our e-mails, files, and source codeâŠâ and provided links to over 400 gigabytes of data, including alleged internal e-mails, invoices, and source code; which were leaked via BitTorrent and Mega.23 An announcement of the data breach, including a link to the bittorrent seed, was retweeted by WikiLeaks and by many others through social media.24 25
The material was voluminous and early analysis appeared to reveal that HackingTeam had invoiced the Lebanese Army 26 and Sudan and that spy tools were also sold to Bahrain and Kazakhstan.25 HackingTeam had previously claimed they had never done business with Sudan.27
The leaked data revealed a zero-day cross-platform Flash exploit (CVE number: CVE - 2015-5119.28 The dump included a demo of this exploit by opening Calculator from a test webpage.29 30 31 Adobe patched the hole on July 8, 2015.32 Another vulnerability involving Adobe was revealed in the dumps, which took advantage of a buffer overflow attack on an Adobe Open Type Manager DLL included with Microsoft Windows. The DLL is run in kernel mode, so the attack could perform privilege escalation to bypass the sandbox.33
Also revealed in leaked data was HackingTeam employeesâ use of weak passwords, including âP4sswordâ, âwolverineâ, and âuniversoâ.34
After a few hours without response from HackingTeam, member Christian Pozzi tweeted the company was working closely with police and â what the attackers are claiming regarding our company is not true.â 35 36 He also claimed the leaked archive âcontains a virusâ and that it constituted âfalse infoâ.37 Shortly after these tweets, Pozziâs Twitter account itself was apparently compromised.38
Responsibility for this attack was claimed by the hacker known as âPhineas Fisherâ (or Phisher) on Twitter.39 Phineas has previously attacked spyware firm Gamma International, who produce malware, such as FinFisher, for governments and corporations.40 In 2016, Phineas published details of the attack, in Spanish and English, as a âhow-toâ for others, and explained the motivations behind the attack.41 42
The internal documents revealed details of HackingTeamâs contracts with repressive governments.43 In 2016, the Italian government again revoked the companyâs license to sell spyware outside of Europe without special permission.6 44
Corrupt Mexican officials have helped drug cartels obtain state-of-the-art spyware (including Hacking Team spyware). The software has been used to target and intimidate Mexican journalists by drug cartels and cartel-entwined government actors.45
Customer list
HackingTeamâs clientele include not just governments, but also corporate clients such as Barclays and British Telecom (BT) of the United Kingdom, as well as Deutsche Bank of Germany.1
A full list of HackingTeamâs customers were leaked in the 2015 breach. Disclosed documents show HackingTeam had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million Euros.46 47 48 49 50 51
On Sep 8, 2021, SentinelLABS released a research report about a Turkish threat actor EGoManiac, that used Remote Control System (RCS), software from the Italian infosec firm Hacking Team, which was operated between 2010 and 2016 and campaign run by Turkish TV journalists at OdaTV for spying Turkish police.52
Customer | Country | Area | Agency | Year of first sale | Annual maintenance fees | Total client revenues |
---|---|---|---|---|---|---|
Polizia Postale e delle Comunicazioni 53 | Italy | Europe | LEA | 2004 | âŹ100,000 | âŹ808,833 |
Centro Nacional de Inteligencia 54 | Spain | Europe | Intelligence | 2006 | âŹ52,000 | âŹ538,000 |
Infocomm Development Authority of Singapore | Singapore | APAC | Intelligence | 2008 | âŹ89,000 | âŹ1,209,967 |
Information Office | Hungary | Europe | Intelligence | 2008 | âŹ41,000 | âŹ885,000 |
CSDN | Morocco | MEA | Intelligence | 2009 | âŹ140,000 | âŹ1,936,050 |
UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the President | Uganda | Africa | Intelligence | 2015 | âŹ731,000 | âŹ920,197 |
Italy - DA - Rental | Italy | Europe | Other | 2009 | âŹ50,000 | âŹ628,250 |
Malaysian Anti-Corruption Commission | Malaysia | APAC | Intelligence | 2009 | âŹ77,000 | âŹ789,123 |
PCM | Italy | Europe | Intelligence | 2009 | âŹ90,000 | âŹ764,297 |
SSNS - Ungheria | Hungary | Europe | Intelligence | 2009 | âŹ64,000 | âŹ1,011,000 |
CC - Italy | Italy | Europe | LEA | 2010 | âŹ50,000 | âŹ497,349 |
Al Mukhabarat Al Aâamah | Saudi Arabia | MEA | Intelligence | 2010 | âŹ45,000 | âŹ600,000 |
IR Authorities (Condor) | Luxembourg | Europe | Other | 2010 | âŹ45,000 | âŹ446,000 |
La Dependencia y/o CISEN 55 | Mexico | LATAM | Intelligence | 2010 | âŹ130,000 | âŹ1,390,000 |
UZC 56 | Czech Republic | Europe | LEA | 2010 | âŹ55,000 | âŹ689,779 |
Egypt - MOD 56 | Egypt | MEA | Other | 2011 | âŹ70,000 | âŹ598,000 |
Federal Bureau of Investigation 57 | USA | North America | LEA | 2011 | âŹ100,000 | âŹ697,710 |
Oman - Intelligence | Oman | MEA | Intelligence | 2011 | âŹ30,000 | âŹ500,000 |
President Security 58 59 | Panama | LATAM | Intelligence | 2011 | âŹ110,000 | âŹ750,000 |
Turkish National Police | Turkey | Europe | LEA | 2011 | âŹ45,000 | âŹ440,000 |
UAE - MOI | UAE | MEA | LEA | 2011 | âŹ90,000 | âŹ634,500 |
National Security Service 56 | Uzbekistan | Asia | Intelligence | 2011 | âŹ50,000 | âŹ917,038 |
Department of Defense 57 | USA | North America | LEA | 2011 | âŹ190,000 | |
Bayelsa State Government | Nigeria | MEA | Intelligence | 2012 | âŹ75,000 | âŹ450,000 |
Estado de Mexico | Mexico | LATAM | LEA | 2012 | âŹ120,000 | âŹ783,000 |
Information Network Security Agency | Ethiopia | MEA | Intelligence | 2012 | âŹ80,000 | âŹ750,000 |
State security (Falcon) | Luxemburg | Europe | Other | 2012 | âŹ38,000 | âŹ316,000 |
Italy - DA - Rental | Italy | Europe | Other | 2012 | âŹ60,000 | âŹ496,000 |
MAL - MI | Malaysia | APAC | Intelligence | 2012 | âŹ77,000 | âŹ552,000 |
Direction gĂ©nĂ©rale de la surveillance du territoire | Morocco | MEA | Intelligence | 2012 | âŹ160,000 | âŹ1,237,500 |
National Intelligence and Security Service 56 | Sudan | MEA | Intelligence | 2012 | âŹ76,000 | âŹ960,000 |
Russia - KVANT 60 | Russia | Europe | Intelligence | 2012 | âŹ72,000 | âŹ451,017 |
Saudi - GID | Saudi | MEA | LEA | 2012 | âŹ114,000 | âŹ1,201,000 |
SIS of National Security Committee of Kazakhstan 56 | Kazakhstan | Europe | Intelligence | 2012 | âŹ140,000 | âŹ1,012,500 |
The 5163 Army Division (Alias of South Korean National Intelligence Service) 56 61 62 | S. Korea | APAC | Other | 2012 | âŹ67,000 | âŹ686,400 |
UAE - Intelligence | UAE | MEA | Other | 2012 | âŹ150,000 | âŹ1,200,000 |
Central Intelligence Agency | USA | North America | Intelligence | 2011 | ||
Drug Enforcement Administration 57 63 | USA | North America | Other | 2012 | âŹ70,000 | âŹ567,984 |
Central Anticorruption Bureau | Poland | Europe | LEA | 2012 | âŹ35,000 | âŹ249,200 |
MOD Saudi | Saudi | MEA | Other | 2013 | âŹ220,000 | âŹ1,108,687 |
PMO | Malaysia | APAC | Intelligence | 2013 | âŹ64,500 | âŹ520,000 |
Estado de QuerĂ©taro | Mexico | LATAM | LEA | 2013 | âŹ48,000 | âŹ234,500 |
National Security Agency 56 | Azerbaijan | Europe | Intelligence | 2013 | âŹ32,000 | âŹ349,000 |
Gobierno de Puebla | Mexico | LATAM | Other | 2013 | âŹ64,000 | âŹ428,835 |
Gobierno de Campeche | Mexico | LATAM | Other | 2013 | âŹ78,000 | âŹ386,296 |
AC Mongolia | Mongolia | APAC | Intelligence | 2013 | âŹ100,000 | âŹ799,000 |
Dept. of Correction Thai Police | Thailand | APAC | LEA | 2013 | âŹ52,000 | âŹ286,482 |
National Intelligence Secretariat 64 | Ecuador | LATAM | LEA | 2013 | âŹ75,000 | âŹ535,000 |
Police Intelligence Directorate | Colombia | LATAM | LEA | 2013 | âŹ35,000 | âŹ335,000 |
Guardia di Finanza | Italy | Europe | LEA | 2013 | âŹ80,000 | âŹ400,000 |
Intelligence 65 | Cyprus | Europe | LEA | 2013 | âŹ40,000 | âŹ375,625 |
MidWorld 66 | Bahrain | MEA | Intelligence | 2013 | âŹ210,000 | |
Mexico - PEMEX | Mexico | LATAM | LEA | 2013 | âŹ321,120 | |
Malaysia K | Malaysia | APAC | LEA | 2013 | âŹ0 | |
Honduras | Honduras | LATAM | LEA | 2014 | âŹ355,000 | |
Mex Taumalipas | Mexico | LATAM | 2014 | âŹ322,900 | ||
SecretarĂa de PlaneaciĂłn y Finanzas | Mexico | LATAM | LEA | 2014 | âŹ91,000 | âŹ371,035 |
AREA | Italia | Europe | 2014 | âŹ430,000 | ||
Mexico YucatĂĄn | Mexico | LATAM | LEA | 2014 | âŹ401,788 | |
Mexico Durango | Mexico | LATAM | LEA | 2014 | âŹ421,397 | |
Investigations Police of Chile | Chile | LATAM | LEA | 2014 | âŹ2,289,155 | |
Jalisco Mexico | Mexico | LATAM | LEA | 2014 | âŹ748,003 | |
Royal Thai Army | Thailand | APAC | LEA | 2014 | âŹ360,000 | |
Vietnam GD5 | Vietnam | APAC | 2014 | âŹ281,170 | ||
Kantonspolizei ZĂŒrich | Switzerland | Europe | LEA | 2014 | âŹ486,500 | |
Vietnam GD1 | Vietnam | APAC | LEA | 2015 | âŹ543,810 | |
Egypt TRD GNSE | Egypt | MEA | LEA | 2015 | âŹ137,500 | |
Lebanese Army | Lebanon | MEA | LEA | 2015 | ||
Federal Police Department | Brazil | LATAM | LEA | 2015 | ||
National Anticorruption Directorate | Romania | DNA | Intelligence | 2015 | ||
State Informative Service 67 | Albania | Europe | SHIK | 2015 | ||
Danish National Police 68 | Denmark | Europe | 2015 | âŹ570,000 |
See also
- FinFisher
- MiniPanzer and MegaPanzer
- Vupen â 0-day exploit provider linked to HackingTeam 69
- Mamfakinch â a citizen media organization targeted with malware allegedly developed by HackingTeam 70
References
External links
- Official website
- - investigative reports published by The Citizen Lab
- Hacking Team Helped Ecuador Spy on Opposition Activist, archived from the original on 11 November 2019, retrieved 5 May 2019
- Correction: Ecuador-Hacking The Opposition story, 7 August 2015
Footnotes
-
Batey, Angus (24 November 2011). âThe spies behind your screenâ. The Telegraph. Archived from the original on 6 October 2022. Retrieved 26 July 2015. â© â©2 â©3
-
âEnemies of the Internet: HackingTeamâ. Reporters Without Borders. Archived from the original on 29 April 2014. Retrieved 24 April 2014. â©
-
Marczak, Bill; Gaurnieri, Claudio; Marquis-Boire, Morgan; Scott-Railton, John (17 February 2014). âMapping HackingTeamâs âUntraceableâ Spywareâ. Citizen Lab. Archived from the original on 20 February 2014. â©
-
Kopfstein, Janus (10 March 2014). âHackers Without Bordersâ. The New Yorker. Archived from the original on 6 November 2018. Retrieved 24 April 2014. â©
-
Marquis-Boire, Morgan; Gaurnieri, Claudio; Scott-Railton, John; Kleemola, Katie (24 June 2014). âPolice Story: HackingTeamâs Government Surveillance Malwareâ. Citizen Lab. University of Toronto. Archived from the original on 25 June 2014. Retrieved 3 August 2014. â©
-
Zorabedian, John (8 April 2016). âHackingTeam loses global license to sell spywareâ. Naked Security. Archived from the original on 6 June 2023. Retrieved 15 May 2016. â© â©2
-
Human Rights Watch (25 March 2014). âThey Know Everything We Doâ Archived 3 May 2023 at the Wayback Machine. Retrieved 1 August 2015. â©
-
Jeffries, Adrianne (13 September 2013). âMeet HackingTeam, the company that helps the police hack youâ. The Verge. Archived from the original on 24 March 2016. Retrieved 21 April 2014. â©
-
âNoi, i padri del cyber-007â. 2 December 2011. Archived from the original on 19 April 2019. Retrieved 19 April 2019. â©
-
Jeffries, Adrianne (13 September 2013). âMeet Hacking Team, the company that helps the police hack youâ. The Verge. Archived from the original on 24 March 2016. Retrieved 20 August 2021. â©
-
Farivar, Cyrus (20 July 2015). âHacking Team goes to war against former employees, suspects some helped hackersâ. Ars Technica. Archived from the original on 13 April 2019. Retrieved 11 April 2024. â© â©2
-
âHackingTeamâs US Nexusâ. 28 February 2014. Archived from the original on 12 July 2015. Retrieved 2 August 2015. â©
-
âNasce Memento Labsâ. 2 April 2019. Archived from the original on 19 April 2019. Retrieved 19 April 2019. â©
-
Stecklow, Steve; Sonne, Paul; Bradley, Matt (1 June 2011). âMideast Uses Western Tools to Battle the Skype Rebellionâ. The Wall Street Journal. Retrieved 26 July 2015. â©
-
Lin, Philippe (13 July 2015). âHackingTeam Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systemsâ. TrendLabs Security Intelligence Blog. Trend Micro. Archived from the original on 6 May 2019. Retrieved 26 July 2015. â©
-
âAdvanced spyware for Android now available to script kiddies everywhereâ Archived 18 April 2019 at the Wayback Machine. Ars Technica. Retrieved 2 August 2015. â© â©2
-
Farivar, Cyrus (14 July 2015). â HackingTeam broke Bitcoin secrecy by targeting crucial wallet file Archived 17 April 2019 at the Wayback Machine â. Ars Technica. Retrieved 26 July 2015. â©
-
Schneier, Bruce. âMore on HackingTeamâs Government Spying Softwareâ. Archived from the original on 31 October 2014. Retrieved 28 June 2014. â©
-
âHackingTeam Tools Allow Governments To Take Full Control of Your Smartphoneâ. International Business Times UK. 24 June 2014. Archived from the original on 28 February 2019. Retrieved 15 May 2016. â©
-
Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014). âTo Protect And Infect: The militarization of the Internetâ Archived 23 June 2019 at the Wayback Machine. At the 30th Chaos Communications Congress â â30C3â. (Video or Audio). Chaos Computer Club. Retrieved 15 August 2015. â©
-
Hay Newman, Lily (7 July 2015). âA Detailed Look at HackingTeamâs Emails About Its Repressive Clientsâ. The Intercept. Archived from the original on 7 March 2019. Retrieved 15 May 2016. â© â©2 â©3 â©4 â©5
-
Knibbs, Kate (8 July 2015). âHackingTeamâs Lame Excuse for Selling Digital Weapons to Sudanâ. Gizmodo. Archived from the original on 25 December 2017. Retrieved 15 May 2016. â©
-
âHacked Team (@hackingteam)â. Archived from the original on 6 July 2015. Retrieved 6 July 2015.
{{[cite web](https://en.wikipedia.org/wiki/Template:Cite_web "Template:Cite web")}}
: CS1 maint: bot: original URL status unknown (link) â© -
WikiLeaks [@wikileaks] (6 July 2015). âInside malware makers âHackingTeamâ: hundreds of gigabytes of e-mails, files, and source codeâ (Tweet). Retrieved 6 July 2015 â via Twitter. â©
-
âHackingTeam hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstanâ. International Business Times. 6 June 2015. Archived from the original on 19 April 2019. Retrieved 6 July 2015. â© â©2
-
Ragan, Steve (5 July 2015). âHackingTeam hacked, attackers claim 400GB in dumped dataâ. Retrieved 6 July 2015. â©
-
âSecurity Advisory for Adobe Flash Playerâ. helpx.adobe.com. Adobe Systems. 8 July 2015. Archived from the original on 9 July 2015. Retrieved 30 August 2016. â©
-
Khandelwal, Swati. âZero-Day Flash Player Exploit Disclosed In âHackingTeamâ Data Dumpâ. Archived from the original on 22 June 2019. Retrieved 6 July 2015. â©
-
Pi, Peter. âUnpatched Flash Player Flaw, More POCs Found in HackingTeam Leakâ. Archived from the original on 22 June 2019. Retrieved 8 July 2015. â©
-
âWICAR test malwareâ. Archived from the original on 31 August 2019. Retrieved 16 May 2017. â©
-
âAdobe Security Bulletinâ. Archived from the original on 10 July 2015. Retrieved 11 July 2015. â©
-
Tang, Jack (7 July 2015). âA Look at the Open Type Font Manager Vulnerability from the HackingTeam Leakâ. Archived from the original on 14 April 2019. Retrieved 8 July 2015. â©
-
Whittaker, Zack. âHackingTeam used shockingly bad passwordsâ. ZDNet. Archived from the original on 12 February 2019. Retrieved 6 July 2015. â©
-
Christian Pozzi. âunknownâ. Archived from the original on 7 March 2021. Retrieved 6 July 2015 â via Twitter. â©
-
Christian Pozzi. âunknownâ. Archived from the original on 7 March 2021. Retrieved 6 July 2015 â via Twitter. â©
-
Christian Pozzi. âunknownâ. Archived from the original on 23 December 2020. Retrieved 6 July 2015 â via Twitter. â©
-
âChristian Pozzi on Twitter: âUh Oh - my twitter account was also hacked."". 6 July 2015. Archived from the original on 6 July 2015. Retrieved 6 July 2015. â©
-
Phineas Fisher [@gammagrouppr] (6 July 2015). âgamma and HT down, a few more to go:)â (Tweet) â via Twitter. â©
-
Osbourne, Charlie. âHackingTeam: We wonât âshrivel up and go awayâ after cyberattackâ. ZDNet. Archived from the original on 5 July 2018. Retrieved 6 July 2015. â©
-
Hack Back â A DIY Guide (Hacking Team). 26 April 2017. Archived from the original on 8 January 2024. Retrieved 8 January 2024. â©
-
âHow HackingTeam got hackedâ. Ars Technica. 19 April 2016. Archived from the original on 18 June 2017. Retrieved 15 May 2016. â©
-
âA Detailed Look at HackingTeamâs Emails About Its Repressive Clientsâ. The Intercept. 7 July 2015. Archived from the original on 7 March 2019. Retrieved 15 May 2016. â©
-
. Privacy International. 8 April 2016. Archived from on 5 May 2019. Retrieved 15 May 2016. â©
-
ââItâs a free-for-allâ: how hi-tech spyware ends up in the hands of Mexicoâs cartelsâ. TheGuardian.com. 7 December 2020. Archived from the original on 24 February 2022. Retrieved 7 December 2020. â©
-
Kopstein, Justin (6 July 2015). âHere Are All the Sketchy Government Agencies Buying HackingTeamâs Spy Techâ. Vice Magazine. Archived from the original on 31 March 2019. Retrieved 5 May 2019. â©
-
Weissman, Cale Guthrie (6 July 2015). âHacked security companyâs documents show a laundry list of questionable clientsâ. Business Insider. Archived from the original on 6 October 2019. Retrieved 5 May 2019. â©
-
Ragan, Steve. âIn Pictures: HackingTeamâs hack curatedâ. CSO Online (Australia). Archived from the original on 9 April 2019. Retrieved 5 May 2019. â©
-
Hern, Alex (6 July 2015). âHackingTeam hacked: firm sold spying tools to repressive regimes, documents claimâ. The Guardian. Retrieved 22 July 2015. â©
-
Ragan, Steve (6 July 2015). âHackingTeam responds to data breach, issues public threats and denialsâ. CSO Online. Archived from the original on 1 March 2019. Retrieved 22 July 2015. â©
-
Stevenson, Alastair (14 July 2015). âA whole bunch of downed government surveillance programs are about to go back onlineâ. Business Insider. Archived from the original on 23 July 2015. Retrieved 22 July 2015. â©
-
Stevenson, Alastair (8 September 2021). âHacking Team Customer in Turkey Was Arrested for Spying on Police Colleagues [or: The Spy Story That Spun a Tangled Web]â. Zetter. Archived from the original on 4 April 2022. Retrieved 8 September 2021. â©
-
Jone Pierantonio. âEcco chi ha bucato HackingTeamâ Archived 6 August 2015 at the Wayback Machine. International Business Times. Retrieved 2 August 2015. â©
-
Ediciones El PaĂs (8 July 2015). âHackingTeam: âOfrecemos tecnologĂa ofensiva para la PolicĂaââ Archived 18 December 2019 at the Wayback Machine. El PaĂs. Retrieved 2 August 2015. â©
-
âThe HackingTeam leak shows Mexico was its top client, but why?â Archived 10 October 2019 at the Wayback Machine. Fusion. Retrieved 2 August 2015. â©
-
âLeaked emails from security firm HackingTeam show government use - Fortuneâ Archived 20 July 2015 at the Wayback Machine. Fortune. Retrieved 2 August 2015. â© â©2 â©3 â©4 â©5 â©6 â©7
-
âLeaked Documents Show FBI, DEA and U.S. Army Buying Italian Spywareâ. The Intercept. Retrieved 2 August 2015. â© â©2 â©3
-
âHackingTeamâs Equipment Got Stolen in Panamaâ. Motherboard. Retrieved 2 August 2015. â©
-
Molina, Thabata (13 August 2015). âPanama to Investigate Martinelli in HackingTeam Spying Scandalâ Archived 27 June 2019 at the Wayback Machine. Panama Post. Retrieved 15 August 2015. â©
-
âHackingTeam apparently violated EU rules in sale of spyware to Russian agencyâ Archived 2 December 2017 at the Wayback Machine. Ars Technica. Retrieved 2 August 2015. â©
-
âHow HackingTeam Created Spyware that Allowed the FBI To Monitor Tor Browserâ Archived 12 June 2019 at the Wayback Machine. The Intercept. Retrieved 2 August 2015. â©
-
McGrath, Ben (25 July 2015). â Further revelations in South Korean hacking scandal Archived 7 August 2015 at the Wayback Machine â. World Socialist Web Site. Retrieved 26 July 2015. â©
-
âThe DEA Just Cancelled Its Contract With HackingTeamâ. Motherboard. Retrieved 2 August 2015. â©
-
* Ecuadorian Websites Report on Hacking Team, Get Taken Down, archived from the original on 20 July 2019, retrieved 5 May 2019 â©
-
In Cyprus (11 July 2015).Intelligence Service chief steps down Archived 2015-08-15 at the Wayback Machine. Retrieved 26 July 2015. â©
-
Bahrain Center for Human Rights (15 July 2015). â HackingTeamâs troubling connections to Bahrain Archived 21 July 2015 at the Wayback Machine â IFEX. Retrieved 26 July 2015. â©
-
Lexime (14 July 2015). â Burime tĂ« sigurta, SHISH pĂ«rdor programet pĂ«rgjuese qĂ« prej 2015. HackingTeams: Nuk e kemi nĂ«n kontroll sistemin!Archived 9 January 2020 at the Wayback Machine â (video). BalkanWeb. Retrieved 27 July 2015. â©
-
âDansk politi kĂžber overvĂ„gningssystem fra kontroversielt firmaâ. Information.dk. Dagbladet Information. Archived from the original on 20 September 2021. Retrieved 10 October 2021. â©
-
HackingTeam: a zero-day market case study Archived 24 July 2015 at the Wayback Machine, Vlad Tsyrklevichâs blog â©
-
Perlroth, Nicole (10 October 2012). Ahead of Spyware Conference, More Evidence of Abuse Archived 26 December 2017 at the Wayback Machine. The New York Times (Bits). â©