• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Big Data Virtual Summit

      The Big Data Virtual Summit will comprise expert keynotes, real world case studies and interactive discussion panels led by senior IT practitioners who will share their tips for Big Data technologies and data management strategies.

      • Date: 19 Oct 2016
      • Online
      View all events
      Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3-resources-120x194
      Leveraging data for small businesses

      The most successful businesses are those with confidence in their ability to store, access and use data effectively.  Rather than focusing on the nuts and bolts of storage, this view point looks at the data it holds and more importantly, what can be done with it.

      Download
      V3-resources-120x194
      Getting the SMB network just right

      This review looks at why small businesses need to stop being complacent about their networks and at what they can do to maintain their competitive edge as they follow the big boys down the route of increasing collaboration and other bandwidth-hungry applications likely to impact on network performance and availability.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • SMB Spotlight
  • Sign in
  •  
    •  

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      Forgot your password?
     
     
      • Saved articles
      • Newsletters
      • Apps
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
    • Apps
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    Forgot your password?
 
 
    • Saved articles
    • Newsletters
    • Apps
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Government

Hacking Team plays the victim card as it defends surveillance services

Italian firm hits back at critics, claiming it always operated within the law

name-and-shame-finger-pointing
Hacking Team says it has been unfairly treated
  • Jason Murdock and Dan Worth
  • 24 July 2015
  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
0 Comments

Italian surveillance software firm Hacking Team has issued a strongly worded statement attacking the criticism it received after it was hacked at the start of the month, claiming it is the true victim of the incident.

The hack of the company took place some weeks ago, and led to a rash of discoveries of major security vulnerabilities in tools such as Flash and Windows, which were being used by the firm's tool to help regimes spy on citizens.

This led to major criticism of the firm and claims that it was selling to nations that it should not be, such as Sudan. However, in a statement, Hacking Team has hit back at this, saying it has been unfairly treated.

“There is only one violation of law in this entire episode, and that one is the criminal attack on Hacking Team. The truth is that the company itself has operated within the law and all regulation at all times," it said.

“However, commentators dislike the fact that strong tools are needed to fight crime and terrorism, and Hacking Team provides them. So the company is being treated as the offender, and the criminals who attacked the company are not.”

The company also claimed that any sales to repressive regimes such as in Ethiopia, Sudan and Russia were done strictly within the law. It also said that claims its entire source code had been leaked were unfounded.

“Important elements of our source code were not compromised in this attack, and remain undisclosed and protected.”

The statement also denied claims that the information revealed the firm had installed a backdoor in its software that allowed it to see how its tool is being used, adding that clients are able to examine the software code to prove this themselves.

Security flaws uncovered

The leak of some 400GB of data from Hacking Team's database led to the discovery of several major security flaws in key products used on most computers around the world, including Adobe Flash.

In response to thi Google's research team Project Zero announced it is working to develop fixes for Adobe Flash after a number of zero-day exploits were recently discovered within the Hacking Team data leak.

Working in collaboration with Adobe, Google Project Zero is aiming to help fix the gaps in security currently found in the software. By isolating different types of memory contents, using a type of partitioning, the Google team will implement various structural changes it believes will reduce the number of successful attacks against Flash.

Meanwhile, Project Zero advised users to download the most up-to-date software version of Flash, v18.0.0.209, currently available for Windows, Macintosh and Linux. It updates critical vulnerabilities that could potentially allow an attacker to take control of the affected system.

Currently, the new Project Zero defences are only fully implemented in the Flash version included in Google Chrome, with the team now working to bring every fix to other browsers. If you're running Google Chrome, you can visit about:version to check the versions of various components. Similarly, on Windows you can visit chrome://chrome in order to boot the auto updater.

Alongside the latest patch, Project Zero said users should ensure their build of Flash matches their Chrome browser's capabilities, in order to get the full benefit of the patch.

"Now is a good time to upgrade to a 64-bit browser and Flash," they explain.

"If you're using Chrome on Windows 7 x64 (or newer), you might be running a 32-bit browser on a 64-bit capable system", the team added, explaining that this could lead to potential vulnerabilities.

The team at Project Zero are still analysing data to test for further Flash solutions.

"For every mitigation landed by defenders, attackers will attempt to devise a counter-mitigation. It's a cat-and-mouse-game," they said.

"We'll be looking out for attackers' attempts to adapt, and devising further mitigations based on what we see. Perhaps more importantly, we're also devising a next level of defenses based on what we expect we might see."

Adobe too has promised to do it all can to improve the security of its much maligned Flash tool, in response to recent criticisms from the new chief security officer of Facebook and Mozilla blocking the tool from its Firefox browser.

The company said in a blog post that it is working hard to fix problems that came to light after data was leaked from the server of Italian surveillance software firm Hacking Team.

Adobe went on to say that Flash is widely used and is naturally a target for hackers, but that the firm is confident of maintaining an adequate level of security for the product.

"Flash Player is one of the most ubiquitous and widely distributed pieces of software in the world and, as such, is a target of malicious hackers," the blog said.

"We are actively working to improve Flash Player security and, as we did in this case, will work to quickly address issues when they are discovered."

The comments come after Mozilla took the notable step of blocking Flash from its browser in light of security concerns that came to light in the past 10 days.

Mark Schmidt, head of Firefox support at Mozilla, confirmed that all versions of Flash up to the most recent 18.0.0.203 release have been added to the official Mozilla blocklist.

To be clear, Flash is only blocked until Adobe releases a version which isn't being actively exploited by publicly known vulnerabilities.

— Mark Schmidt (@MarkSchmidty) July 14, 2015

This came after incoming Facebook chief security officer Alex Stamos called for Adobe to announce an ‘end-of-life date’ for Flash given the problems it is causing.

It is time for Adobe to announce the end-of-life date for Flash and to ask the browsers to set killbits on the same day.

— Alex Stamos (@alexstamos) July 12, 2015

“Even if it's 18 months from now, one set date is the only way to disentangle the dependencies and upgrade the whole ecosystem at once,” he added.

Adobe has issued two major updates for Flash since the flaws were revealed. The first patch fixed the CVE-2015-5119 vulnerability. The firm was soon forced to issue a second patch for two further flaws that were uncovered, termed CVE-2015-5122 and CVE-2015-5123, as explained in a post on its website.

"Critical vulnerabilities have been identified in Adobe Flash Player 18.0.0.204 and earlier versions for Windows, Macintosh and Linux," it said.

"Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system."

Adobe rates the flaws as critical and firms have been urged to upgrade as soon as possible. The firm also thanked researchers at FireEye and Trend Micro for uncovering the vulnerabilities.

The revelations are just the latest information to come to light since the Hacking Team breach. Other data revealed that the FBI is a customer of Hacking Team, and is reported to have spent $775,000 on the firm's software.

The revelations from the hack have not come as a huge surprise to those who have criticised Hacking Team in the past, and the firm has been labelled an "enemy of the internet" by Reporters Without Borders.

"Hacking Team describes its lawful interception products as 'offensive technology' and has been called into question over deliveries to Morocco and the United Arab Emirates," the organisation said.

"The company’s 'Remote Control System', called DaVinci, is able, it says, to break encryption on emails, files and internet telephony protocols."

The attackers behind the hack have not yet come to light, but they too were clearly keen to embarrass and discredit Hacking Team, not only releasing the data from its systems but defacing its Twitter account and posting company emails.

The firm’s bio on Twitter was changed to read: 'Developing ineffective, easy-to-pwn offensive technology to compromise the operations of the worldwide law enforcement and intelligence communities.'

The leaked information allegedly includes contracts the company signed with repressive governments such as in Sudan, Uzbekistan and Russia. Hacking Team had denied ever working with Sudan after a report in 2014 accused it of doing so.

Hacking Team never sold to Sudan? Here's the instructions for the 480,000 Euro wire transfer. cc @hackingteam pic.twitter.com/JqexHpvb3s

— Eva (@evacide) July 6, 2015

  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
  • Topics
  • Government
  • Security
  • Privacy
  • Hacking
  • Adobe Flash
  • Trend Micro
  • Google
  • Facebook

V3 Latest

HMRC web page
HMRC digital push could see end of tax returns by 2020

Consultation documents reveal plans to fully digitalise the UK's tax system

  • Government
  • 15 August 2016
Tim Cook and Aaron Levie in discussion at BoxWorks in San Francisco
Tim Cook's 5 key moments as Apple CEO: Maps, iPhones and Apple Watch launch

Big moments from the past five years

  • Mobile Phones
  • 15 August 2016
rio-2016-700x725
Rio 2016 Official app for Android

Join in the Olympic Games excitement with the official Rio 2016 app

  • Mobile Software
  • 15 August 2016
Sky Sports Fantasy Football App logo
Sky Sports Fantasy Football for Android

Can you hold your nerve and tactically outwit your rivals?

  • Mobile Software
  • 15 August 2016
blog comments powered by Disqus
Back to Top

Most read

IBM TrueNorth chip core array - Image IBM
IBM TrueNorth 'cognitive chip' can capture 2,000 fps with a camera
Sage at Accountex
Sage breach exposes personal data of staff at 280 companies
Microsoft Windows 10 on a laptop
Windows 10 Anniversary Update: 8 ways to tackle problems caused by latest release
Galaxy Note 7 render
Samsung Galaxy Note 7 release date, price, specs and features
Apple chief executive Tim Cook
Apple CEO Tim Cook opens up on AI, augmented reality and FBI case
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube
  • Apps

© Incisive Business Media Limited

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016