As late as 2015,
it appears Hacking Team had ongoing interactions with the Saudi Royal Family, with H.E. Saud Al - Qahtani, an officer of the Royal Court, contacting them in late June in his capacity for «media monitoring» and more.
As late as 2015,
it appears Hacking Team had ongoing interactions with the Saudi Royal Family, with H.E. Saud Al - Qahtani, an officer of the Royal Court, contacting them in late June in his capacity for «media monitoring» and more.
Not exact matches
LoJack for Laptops, a software tool designed to rat on computer thieves,
appears to be serving a double purpose — by seemingly working with a Russian state - sponsored
hacking team.
Several e-mails in the Wikileaks
Hacking Team dump refer to a letter of intent, signed by the major principals of Safinvest, which never
appeared to materialize.
The PATN
appears to be a proxy chain system similar to
Hacking Team's anonymizers and FinFisher's relays.
This is the third time Mansoor has been targeted with «lawful intercept» spyware; Mansoor was targeted in 2011 with spyware from FinFisher (based in Germany and the UK), in 2012 with spyware from
Hacking Team (based in Italy), and now in 2016 with what
appears to be spyware from NSO Group (based in Israel and reportedly owned by a US firm).
In our previous work, 27 we showed that
Hacking Team's clients — which, according to HT, are governments or government agencies28 —
appear to use one or more fixed circuits of «proxy servers» to exfiltrate data from computers infected with RCS, through third countries, before reaching an «endpoint.»
In November and December 2014, several Washington DC - based journalists with the Ethiopian Satellite Television Service (ESAT) were targeted, unsuccessfully, with what
appear to be two new versions of
Hacking Team's RCS spyware.5 This report details these attempts to infect the journalists» computers with RCS and monitor their activity.
The infection
appeared to be
Hacking Team RCS.
In summary, the entity that attacked ESAT on December 19, 2014,
appears to be a government, since they apparently employed
Hacking Team RCS, and
Hacking Team states that it provides its «software only to governments or government agencies.»
Despite the aforementioned public reports and correspondence, this report shows that the same attacker
appeared to be receiving updated versions of the RCS spyware from
Hacking Team as recently as November 2014.
Journalists at the independent ESAT network were first targeted in 2013 by an attacker using what
appeared to be Remote Control System spyware belonging to the Italian company
Hacking Team, according to Citizen Lab, which is based at the University of Toronto's Munk School of Global Affairs.
A so - called legitimate app called Remote Control System (RCS) developed by Italian company «
Hacking Team»
appears to be spyware that can infect Android, iOS, BlackBerry, Windows Phone, Windows and Mac OS.
One particular tweet
appears to show an email from
Hacking Team CEO David Vincenzetti, mocking a competitor for being «severely
hacked.»