A New York Times article describing the growth of email spyware as a political weapon, titled “Cyberwar for Sale,” cited Citizen Lab research into Hacking Team, an Italian team that creates spyware for sale to governments. In particular, the article cites Citizen Lab’s work in exposing the use of Hacking Team software on the devices of Moroccan, UAE, and Ethiopian activists.
Search Results for: hacking team
Citizen Lab surveillance research on Hacking Team and FinFisher highlighted in articles on Motherboard, the Varsity, and the New York Times.
This research note outlines what we know about the use of Hacking Team’s Remote Control System (RCS) by South Korea’s National Intelligence Service (NIS). The note synthesizes information found in publicly leaked materials, as well as our own research.
Hacking Team, a Milan-based developer of “offensive security” technology that markets its products to governments and law enforcement agencies around the world, was significantly compromised when hackers leaked nearly 400 GB of its internal data, including emails, client files, and financial documents. The leak was announced via Hacking Team’s own compromised Twitter account, and the content made publicly available. Among other things, the leaked documents confirmed our findings that the company sells its software to several governments with repressive human rights records, such as Ethiopia, Sudan, Rwanda, Saudi Arabia, Kazakhstan, and more.
The research findings documented in this report suggest that Hacking Team may have continued to provide updated versions of its spyware to the same attacker who have targeted ESAT journalists based in the United States in 2014, despite reports of use of the spyware against journalists.
Citizen Lab is sending an open letter to Hacking Team, providing a copy of our latest report on the company and highlighting our reasons for concern from these latest findings.
Hacking Team CEO David Vincenzetti responded to an article co-authored by Citizen Lab Senior Security Researcher and Technical Advisor Morgan Marquis-Boire on The Intercept.
Citizen Lab Senior Researcher Morgan Marquis-Boire has co-authored an article exploring the sale of commercial spyware produced by Hacking Team to law enforcement agencies and governments across the globe.
This letter is in response to a statement issued by Hacking Team that has recently come to our attention, concerning Citizen Lab’s report titled “Police Story: Hacking Team’s Government Surveillance Malware” (June 24, 2014).
Our latest report analyzes our discovery of an Android application called Qatif Today that is bundled with a Hacking Team payload. The app provides news and information in Arabic with a special relevance to the Qatif Governorate of Saudi Arabia, which is a predominantly-Shia community.