top of page

Hacking Team Hacked €? What You Need To Know

  • aneranmonuclai
  • Aug 18, 2023
  • 5 min read


Back in July of last year, the controversial government spying and hacking tool seller Hacking Team was hacked itself by an outside attacker. The breach made headlines worldwide, but no one knew much about the perpetrator or how he did it.




Hacking Team Hacked – What You Need To Know



Phineas Fisher argued that leaking documents to show corruption and abuse of power is real "ethical hacking," as opposed to doing consulting work for companies who are often the ones that actually deserve to be hacked.


In his guide, published on Friday, the hacker explained how he used an unknown vulnerability, or zero day, to get the first foothold into Hacking Team's internal network. Given that the bug has still not been patched, however, Phineas Fisher didn't provide any details on what the vulnerability is exactly, or where he found it. (The hacker also declined to comment for this story.)


Milan, Italy-based Hacking Team is known for the creation of surveillance solutions for government agencies. Predictably, considering the client base, Hacking Team's dealings have rarely been formerly disclosed, leaving the security industry to wonder who customers are and what spy tools are floating around cyberspace -- and for what purposes.


Microsoft also confirmed that it found signs of the malware in its systems, as the breach was affecting its customers as well. Reports indicated Microsoft's own systems were being used to further the hacking attack, but Microsoft denied this claim to news agencies. Later, the company worked with FireEye and GoDaddy to block and isolate versions of Orion known to contain the malware to cut off hackers from customers' systems.


The purpose of the hack remains largely unknown. Still, there are many reasons hackers would want to get into an organization's system, including having access to future product plans or employee and customer information held for ransom. It is also not yet clear what information, if any, hackers stole from government agencies. But the level of access appears to be deep and broad.


I highlight this hack for a number of reasons. First, it once again illustrates that there are companies and governments where hacking is a legitimate, legal, and lucrative profession. Second, it underscores the importance of hacking in international relations and the demand for good hackers (keep studying, my rookie hackers). Third, NO ONE is safe from being hacked.


All companies today face risk exposure to cyber-attack. Small companies get hit as well as large, public, and private companies. But the effects of cyber-attacks do not need to be as bad as what happened to FlexBooker; damage can be avoided, reduced, or mitigated if you plan in advance and take precautionary cybersecurity measures.


When we create cybersecurity test scenarios for client training at CREO, we intentionally give participants very little information to start with and make them talk us through the actions they might take to gather more intelligence. We present them with difficult, sometimes no-win decisions, so they get experience making a call and moving forward, and experience dealing with the fact that sometimes there are no good options. We simulate the added pressure of CEOs breathing down their necks with frustration, media outlets calling them for quotes after being tipped off about a breach. The goal is to make the team a little bit uncomfortable, which serves a twofold purpose: first it prepares them for the stress they might feel in a real event. Second, it makes them very eager to avoid getting hacked in the first place.


Trained Incident Response team members take on a new perspective toward information security risk, they gain confidence that they know how to prevent attacks from happening, and handle those that do happen. In short, they become prepared to respond quickly and decisively to reduce business disruption and reputational issues.


A decade ago, government hacking was largely the concern of cybersecurity analysts working for government agencies. In recent years, however, these attacks have become much more frequent, and much more dangerous. Whichever type of organization you work for, you need to be aware of government hacking, and how to protect your systems against it. In addition, a thorough knowledge of government hacking is now an essential skill for anyone looking to build a cybersecurity career.


SentinelOne is an XDR (eXtended Detection and Response) platform. Simply put, this platform connects to your mission-critical systems and lets you know if there are security issues. Any attacker that can obtain privileged access to this system can obfuscate their activity and prolong their attacks. XDRs can bake in "backdoors" for Incident Response (IR) teams, such as allowing IR teams to "shell into" employee machines and potentially widening the attacker's access.


From what we have seen, the attacker likely has access to many more systems and services belonging to Uber, but these are the ones we know about. Given the blast radius of this breach, we believe it will be extremely difficult and costly for Uber to sift through all their systems and access logs to ensure the attacker has not achieved persistence.


I have gone through the hacked data in sufficient detail to saythat the Hacking Team is an officially registered company (SRL/LLC)acting under the sun to deliver a proactive forensic tool togovernments. There is hardly anything controversial here, as manyother companies on the marked are up to exactly the same business.The sin of the Hacking Team, if that is what it is, is to be bothtalented and successful.


If a hacker is a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology, then a black hat hacker does so for stealing something valuable or other malicious reasons. So it's reasonable to assign any of those four motivations (theft, reputation, corporate espionage, and nation-state hacking) to the black hats.


GOOD! Do these people really think that the community won't fight back particularly after what Mr Snowden revealed.Now they & their clients know its not a one-way street. Incidentally look at those clients none of them are a byword for democracy are they!


We host virtual and in-person live hacking events (LHEs) throughout the year. From destination hacking in cities around the world to unique online hacking experiences, LHEs are a must-experience perk for top hackers. Earn bonus rewards, new scopes, bounty multipliers, and custom swag, plus collaborate and network with other top hackers, security teams, and HackerOne staff.


Sign-up for an account. You will need a name, username, and a valid email address. You can remain anonymous with a pseudonym, but if you are awarded a bounty you will need to provide your identity to HackerOne. Be sure to take a look at our Disclosure Guidelines which outline the basic expectations that both security teams and hackers agree to when joining HackerOne.


The Red Bandits, known for their data breach attacks, CyberGhost, and Sandworm groups, known for their hacking and DDoS attacks, were shared on the hacker channels that they were Russian supporters. It is known that the Raidforum Admins group, which came to the fore with cyber sanctions against Russia, is in the ranks of Ukraine.


Though the Energy Department, the Commerce Department and the Treasury Department have acknowledged the hacks, there's no official confirmation that other specific federal agencies have been hacked. However, the Cybersecurity and Infrastructure Security Agency put out an advisory urging federal agencies to mitigate the malware, noting that it's "currently being exploited by malicious actors."


You read that right, Uber has been hacked. Reportedly over 1.11 petabytes worth of data could be leaked. At the time of writing the company is still working on fixing it. So how did the Uber hack happen and what does it mean for you? 2ff7e9595c


 
 
 

Recent Posts

See All

Comments


© 2023 by Save the date. Proudly created with Wix.com

bottom of page