Hacking Team Hacked, Attackers Grab 400GB of Internal Data 95
Several readers sent word that notorious surveillance company Hacking Team has itself been hacked. Attackers made off with 400GB worth of emails, documents, and source code. The company is known for providing interception tools to government and law enforcement agencies. According to the leaked files, Hacking Team has customers in Egypt, South Korea, Kazakhstan, Saudi Arabia, Oman, Lebanon, Mongolia, Russia, Germany, Sudan, and the United States — to name a few. It has been labeled an enemy of the internet by Reporters Without Borders. "Clients have had their passwords exposed as well, as several documents related to contracts and configurations have been circulating online." Nobody knows yet who perpetrated the hack.
Find the source code on GitHub (Score:5, Informative)
Someone started uploading all the HackingTeam source code to GitHub: https://github.com/hackedteam?... [github.com]
There are also some signing keys for kernel drivers in here.
That's a bad day for Hacking Team and a good day for everyone else.
Re: (Score:2)
>> https://github.com/hackedteam/... [github.com]
>> https://github.com/hackedteam/... [github.com]
ndisk, eh? With a couple of components to collect, report and transmit?
This thing kind of looks like the kit used in Shamoon, Sony, Icefog/Korea, etc.
Re: (Score:2)
Brilliant, people can start translating the comments in the source code from Italian [github.com] to English! Would be even funnier it people started filing issues and fix bugs in their code.
But more to the point, will this help bona fide security researchers with their work on fighting exploits on all platforms or is there not much of interest there? Any experts on the matter?
Re:Find the source code on GitHub (Score:4, Funny)
Some 0-day leaks were found too, so I think MS will be quick to patch them.
Re: (Score:2)
>> people can start translating the comments in the source code from Italian to English!
Really, you can't follow the code without English comments?
>> will this help bona fide security researchers with their work on fighting exploits on all platforms?
It gives us a couple more signatures to look for. I'm really getting sick of the "fake driver" vector though; it's 2015 and still trivial to get Windows platforms to cough up anything you'd want. As long as AV vendors ignore things like this (e.g.,
Re: (Score:1)
>> people can start translating the comments in the source code from Italian to English!
Really, you can't follow the code without English comments?
Surely if it needed comments in the first place then it implies that the code isn't easy to follow, even for the original author.
Re: (Score:1, Troll)
>> Surely if it needed comments in the first place then it implies that the code isn't easy to follow
(facepalm)
Re:Find the source code on GitHub (Score:4, Informative)
Really, you can't follow the code without English comments?
I pray you don't write any software that other people have to use. Most companies will flat out reject code if it has not been properly documented.
Re: (Score:2)
Really, you can't follow the code without English comments?
I pray you don't write any software that other people have to use. Most companies will flat out reject code if it has not been properly documented.
Maybe you should have watched all the "be professional programmer" webinars.
Re:Find the source code on GitHub (Score:5, Insightful)
Comments aren't there for following the code - even a code monkey like me can do that. They are to explain the reasoning behind the code.
Re: (Score:3)
As had been said before: if the comments and code don't match, then both are probably wrong.
Re: (Score:2)
This is a huge purpose for comments. Also, maybe I can interpret the code perfectly well without comments. How well can I depend on everyone else who is modifying the code to be able to interpret it properly.
Well-documented code helps protect it from the introduction of bugs by later contributors.
Re: (Score:2)
This is a huge purpose for comments. Also, maybe I can interpret the code perfectly well without comments. How well can I depend on everyone else who is modifying the code to be able to interpret it properly.
Well-documented code helps protect it from the introduction of bugs by later contributors.
Imagine comments like "Manager asked me to implement this to make it easier for to target " Not so interesting wrt the code, very useful though for anyone interested in the meta game.
I bet theres all kinds of incriminating stuff in there of no interest to programmers.
Re: (Score:2)
>> people can start translating the comments in the source code from Italian to English!
Really, you can't follow the code without English comments?
>> will this help bona fide security researchers with their work on fighting exploits on all platforms?
It gives us a couple more signatures to look for. I'm really getting sick of the "fake driver" vector though; it's 2015 and still trivial to get Windows platforms to cough up anything you'd want. As long as AV vendors ignore things like this (e.g., https://www.google.com/webhp?s... [google.com]) it will continue to be easy for nearly anyone to write their own "advanced persistent threat."
Comments often contain all kinds of juicy info. Its not about following the code its about getting insights into all kinds of non-code related things.
Re: (Score:2)
Brilliant, people can start translating the comments in the source code from Italian [github.com] to English!
Comments in Italian is actually a blessing for English speaking coders. Dijkstra's dictum was: "Never debug the comments. Always debug the code". (I could not find the reference, if he did not say it, someone equally great said it, because it is certainly not my original idea. ) Often comments are redundant, insanely stupid, misleading or obsolete. The only useful comments I find in my own code are along the lines of: "Yes, this function searches through the entire edge list, we tried to speed it up, but t
Also driver and closed-device rooting projects? (Score:2)
I wonder if this will also help people trying to write open software for closed devices? Signing keys, driver sources with spyware installed, ... Not only does it expose the malware bypassing the user's security, it may also expose the internal details of how the devices are driven and/or how to compromise the malware's and devices' anti-user "security".
(I have often wondered how many of the closed
Projects on github should "git fetch" NOW! (Score:2)
Someone started uploading all the HackingTeam source code to GitHub ... There are also some signing keys for kernel drivers in here.
IMHO:
Anyone with a project hosted on git hub should pull a backup copy NOW!
Hosting this leak on git hub could lead to moves by authorities to contain it - which could have the side effect of making GitHub and/or some projects on it unavailable - temporarily or permanently.
Better safe than sorry.
Re: Projects on github should "git fetch" NOW! (Score:1)
Another turn of the screw (Score:2)
*What's good for the goose...*
Schadenfreude...
SubjectsInCommentsAreStupid (Score:2)
Re:SubjectsInCommentsAreStupid (Score:5, Interesting)
Re:SubjectsInCommentsAreStupid (Score:5, Funny)
Probably thought it was one of their bit-torrent clients..
Even evil hackers require an extensive porn collection to do their job...
Re: SubjectsInCommentsAreStupid (Score:1)
Which is a pretty slow bandwith nowadays... I would get 400gb down in roughly 22 hours with my lazy connection at home... i could bet the involved parties both have a little more speed at hand
Re: (Score:2)
Re: (Score:2)
Yay! (Score:2)
Re: (Score:2)
What's your bot? (My boys and I are watching the show on ABC.)
Re: (Score:3)
What's your bot? (My boys and I are watching the show on ABC.)
What a horrible job they did of putting that show together. Battles are only 3 minutes, but with all the commentary, backgrounders, interviews and fluff, they can only fit FOUR battles into an hour-long show. Worse, they include so much commentary they actually EXCLUDE about 1/2 the battles, and just show a few highlights from some.
Imagine if a network covered the NBA playoffs like that? Producers at ABC certainly showed a lot of incompetence with that show.
Re: (Score:2)
Re:Yay! (Score:4, Funny)
Re: (Score:2)
What's your bot? (My boys and I are watching the show on ABC.)
What a horrible job they did of putting that show together. Battles are only 3 minutes, but with all the commentary, backgrounders, interviews and fluff, they can only fit FOUR battles into an hour-long show. Worse, they include so much commentary they actually EXCLUDE about 1/2 the battles, and just show a few highlights from some.
Imagine if a network covered the NBA playoffs like that? Producers at ABC certainly showed a lot of incompetence with that show.
Let me guess, they also flick the video fast never lingering on a single scene for more than a few seconds so you can't really follow anything?
Re: (Score:2)
And yet, it's still better than pretty much any reality show on TV. Not saying much, I know, but I'd rather watch Battlebots (poorly put together or not) than Survivor: Yet Another Location.
Re: (Score:2)
The battles don't need to be longer than 3 minutes. I think there was a single match so far that went to a split decision and could have benefited from an extra minute.
ABC excluded less interesting preliminary fights. Now that a viewing audience has built up all the matches get shown.
Monty Python. (Score:5, Funny)
We apologize for corporate and govt data breeches. Those responsible have been
hacked.
---
We apologise again for the data breeches. Those responsible for hacking
the people who have just been hacked,
have been hacked.
Re: (Score:2)
Came in just to make this joke. I have no mod points, but I will clap together empty halves of a coconut in approbation.
Re: (Score:2)
Why? Are you going somewhere?
Re: (Score:2)
Why, Camelot, of course!
Re: (Score:2)
It's a very silly place.
Re: (Score:2)
And a bit suspect, I think.
Re: (Score:2)
It's only a model...
Re: (Score:2)
Shhhh!
Re: (Score:1)
Yes, apparently the hackers found a back door.
Re: (Score:1)
ROFL... thanks for the absurdity break
Crying because it sooooo true.
400GB (Score:3)
Seems unlikely. There's going to be a lot of... binary data in there, surely.
Re: (Score:2)
Seems unlikely. There's going to be a lot of... binary data in there, surely.
They got it all from /dev/null and used compression.
Re: (Score:1)
Git repositories, with history going back... Now on Github for your convenience: https://github.com/hackedteam?... [github.com]
Re: (Score:2)
de haxx0rz be haxx0red na0 (Score:1)
Not anybody knows what really happened. It's an excuse to bandy around meaningless but scary-sounding terms yet once more. Any excuse will do.
GeoTrust signing keys (Score:4, Interesting)
Can someone please explain the significance and consequences of publishing this:
GeoTrust_SigningCertificateExported_2011.pfx
https://github.com/hackedteam/... [github.com]
Re: (Score:1)
Can someone please explain the significance and consequences of publishing this:
It means that anything signed by that key can't be trusted and probably contains a government Trojan.
Re:GeoTrust signing keys (Score:4, Interesting)
From the looks of it, this key seems to be used for signing Windows binaries, not for SSL certificates.
Surely somebody more knowledgeable can confirm or deny this?
Re:GeoTrust signing keys (Score:4, Informative)
It's confirmed. One of the news stories (can't remember which one) said that HT would recommend that their clients purchase digital certs to sign the malware they bought in order to skirt anti-virus scans. Apparently most antivirus software will ignore legitamite looking signed apps with certs that have been timestamped. The GeoTrust cert is probably a test cert that HT uses.
Re: (Score:1)
Certificate has been revoked. It is also only valid for code signing.
The significance should be nil by now
Re: (Score:1)
Do you have a link to this information?
Re:GeoTrust signing keys (Score:4, Informative)
Can someone please explain the significance and consequences of publishing this:
GeoTrust_SigningCertificateExported_2011.pfx
It's another couple good patters for antivirus software to look for and trigger upon finding.
Anyone infected with their rootkitted drivers four years ago and haven't had the malware update may find out about being infected with it.
If they used the same company name for their 2015 certificate as is used in the certs published, that would be another signature for AV software to trigger on if they kept your rootkitted drivers updated.
That's about it however.
The certificate is long expired so can't be used to sign any new code with.
You can also be pretty certain their next certificate (to be issued any day now, if not already) will be under a different name as well.
Another stupid law enforcement name (Score:1)
It's a lame attempt at coolness, like "Black Asphalt" as a code for stealing random drivers' money during traffic stops. The name "Hacking Team" does not make it an actual hacking team.
apple issued enterprise dev cert to ht (Score:2, Informative)
https://twitter.com/FredericJa... [twitter.com]
Subject: UID=DE9J4B8GTF, CN=iPhone Distribution: HT srl, OU=DE9J4B8GTF, O=HT srl, C=IT
Re: (Score:2)
Oh ya. (Score:1)
51603bff88e0a1b3bad3962614978929c9d26955 (Score:1)
magnet [magnet]
Were Hackingteam planting evidence? (Score:2)
Kevin Mitnick's twitter has this update:
https://twitter.com/kevinmitni... [twitter.com]
Loser. (Score:2)
From first link: "Hacking Team's Christian Pozzi was personally exposed by the incident, as the security engineer's [poor quality, easily guessed] password store from Firefox was published as part of the massive data dump. The websites indexed include social media (Live, Facebook, LinkedIn), financial (banks, PayPal), and network related (routers with default credentials)."
What kind of security conscious person uses Firefox for storing important passwords, let alone someone calling themselves a security en
Re: (Score:2)
please elaborate on why it's dangerous to store passwords protected by a strong password in firefox sync. mozilla have no access to decrypted passwords, nobody has. the code is open source and the server can be your own instead of mozilla's.
Funny a month ago (Score:1)
Android Security Rewards Program (Score:1)
Re: (Score:1)