Tag Archives: Hacking Team

Citizen Lab research on Hacking Team in NY Times

A New York Times article describing the growth of email spyware as a political weapon, titled “Cyberwar for Sale,” cited Citizen Lab research into Hacking Team, an Italian team that creates spyware for sale to governments. In particular, the article cites Citizen Lab’s work in exposing the use of Hacking Team software on the devices of Moroccan, UAE, and Ethiopian activists.

Citizen Lab research in Alhurra and VICE

Citizen Lab’s research were featured in programs on Middle Eastern democracy by Alhurra and the world of online mercenaries offering hacking services by VICE, respectively.

Privacy International report cites Citizen Lab research

Privacy International (PI) latest report, entitled “The President’s Men?,” explores the role of Egypt’s Technical Research Department (TRD), a secret unit in the country’s intelligence infrastructure. In the report, PI cite Citizen Lab research on FinFisher and Hacking Team.

Research on Hacking Team and Finfisher highlighted in Motherboard

Citizen Lab surveillance research on Hacking Team and FinFisher highlighted in articles on Motherboard, the Varsity, and the New York Times.

What we know about the South Korea NIS’s use of Hacking Team’s RCS

This research note outlines what we know about the use of Hacking Team’s Remote Control System (RCS) by South Korea’s National Intelligence Service (NIS). The note synthesizes information found in publicly leaked materials, as well as our own research.

Hacking Team leak highlights Citizen Lab research

Hacking Team, a Milan-based developer of “offensive security” technology that markets its products to governments and law enforcement agencies around the world, was significantly compromised when hackers leaked nearly 400 GB of its internal data, including emails, client files, and financial documents. The leak was announced via Hacking Team’s own compromised Twitter account, and the content made publicly available. Among other things, the leaked documents confirmed our findings that the company sells its software to several governments with repressive human rights records, such as Ethiopia, Sudan, Rwanda, Saudi Arabia, Kazakhstan, and more.

Hacking Team Reloaded? US-Based Ethiopian Journalists Again Targeted with Spyware

The research findings documented in this report suggest that Hacking Team may have continued to provide updated versions of its spyware to the same attacker who have targeted ESAT journalists based in the United States in 2014, despite reports of use of the spyware against journalists.

Open letter to Hacking Team

Citizen Lab is sending an open letter to Hacking Team, providing a copy of our latest report on the company and highlighting our reasons for concern from these latest findings.

Detekt spyware detection tool released

Independent Researcher Claudio Guarnieri has partnered with Privacy International, Digitale Gesellschaft, Electronic Frontier Foundation and Amnesty International to publicly release the Detekt tool, which allows journalists and human rights defenders to scan their computers for traces of known surveillance spyware.

Hacking Team CEO responds to Morgan Marquis-Boire’s article

Hacking Team CEO David Vincenzetti responded to an article co-authored by Citizen Lab Senior Security Researcher and Technical Advisor Morgan Marquis-Boire on The Intercept.