Tables are Turned as Hackers are Hacked

By

In an ironic turn of events, one of the world’s largest providers of surveillance technology was hacked last night. The Hacking Team is an Italian-based company that sells surveillance tools and some level of intrusion services to governments and law enforcement agencies, much to the chagrin of many advocates in favor of privacy.

The Hacking Team experienced a bit of role reversal last night, however. Hackers last night seized around 400 GB of data, including internal documents and email correspondences within the company, and dumped all of it into a torrent file online. Hackers, presumably of the same team, also compromised the Hacking Team’s Twitter page, changing the profile picture and biography and tweeting images of some of the stolen data.

Journalists have begun to sift through the 400 GB of data already, and some of the results are surprising. Chief among these are a series of invoices linking the Hacking Team to many countries like Lebanon and Sudan, which the company has previously denied having any involvement with. A commercial for the company’s main surveillance tool, called Da Vinci, was also released, featuring an ominous deep voice that promises to allow customers to “look through your target’s eyes” and “hack their target.”

Image via Shutterstock

Most damning of all of this information is likely the revelation of a Hacking Team contract with the government of Sudan, which, up until now, the company had denied any involvement with. According to the Human Rights Watch, a nonprofit organization that tracks human rights violations, the Sudanese government has violently cracked down and persecuted protestors and dissenters, even allegedly killing over 170 people in 2013. Now of course, it will come into question whether or not the Hacking Team had any involvement in that particular incident.

As of the time of this posting, no official statement has been made on the part of the Hacking Team. Needless to say, at some point sooner rather than later, they will have some explaining to do. It will be interesting to see how one of the world’s largest hacking agency will react to having its own security compromised, and the situation illustrates the dangers of dealing with sensitive information on the Internet. 




Edited by Dominick Sorrentino
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Contributing Writer

SHARE THIS ARTICLE
Related Articles

8 Underrated Features of Your Mobile Device You Probably Didn't Know About

By: Contributing Writer    11/21/2023

It is easy to get lost in all the new phone releases when multiple happen yearly. Consequently, most new functions go unnoticed because people do not …

Read More

Navigating the Launch: A Step-by-Step Guide to Bringing Your Product to Market

By: Contributing Writer    11/15/2023

Embarking on the journey to bring a new product into the marketplace is an exhilarating adventure that blends the thrill of innovation with the meticu…

Read More

Running MySQL on AWS: Step by Step

By: Contributing Writer    11/15/2023

MySQL on AWS is the deployment of the MySQL database system on Amazon Web Services (AWS) cloud platform. MySQL is one of the most popular open-source …

Read More

4 Easy Responsive Image Techniques

By: Contributing Writer    11/15/2023

Responsive images are a fundamental component in responsive web design. They adapt to the size of the user's screen, delivering the best user experien…

Read More

5 Types of Documentation Tools and How to Choose

By: Contributing Writer    11/9/2023

Documentation tools are specialized software applications designed to help you create, manage, and publish digital documents. These tools are essentia…

Read More