Our 2014 report documenting the abusive use of
RCS against journalists received widespread media coverage, and both the Washington Post60 and Human Rights Watch61 corresponded with Hacking Team about our findings, and received specific responses.
Not exact matches
Notably, the attacker appears to be the same entity as that involved in a December 2013 attack — also incorporating
RCS —
against ESAT
journalists based in Belgium and the US, on which Citizen Lab previously reported.6
In spite of these indications to Hacking Team that
RCS was deployed
against ESAT
journalists in December 2013, our current research suggests that Hacking Team
RCS software utilized by the attacker remained in operation and received support — at a minimum, in the form of software updates — through November 2014.