1
0
Fork 0
9x0rg.com/content/posts/infosec/hacking-team-government-use...

28 lines
1.6 KiB
Markdown
Raw Normal View History

---
title: "Hacking Team government users"
date: 2017-07-09T08:26:00+06:00
draft: false
tags: ["surveillance","data privacy","infosec","malaysia"]
author: "9x0rg"
hidemeta: false
ShowReadingTime: true
ShowPostNavLinks: true
showtoc: false
cover:
image: ""
alt: ""
caption: ""
---
![21 Suspected Government Users of RCS by Hacking Team](/images/hacking-team-government-users-2014.jpg)
*The 21 suspected government users of RCS by Hacking Team*
> Hacking Team, also known as HT S.r.l., is a Milan-based company that describes itself as the “first to propose an offensive solution for cyber investigations".
>
> Their flagship Remote Control System (RCS)[^1] product, billed “the hacking suite for governmental interception,” is a suite of remote monitoring implants (i.e., spyware) sold exclusively to government agencies worldwide.
>
> We suspect that twenty-one governments are using Hacking Teams RCS spyware. Except as otherwise noted, we identified these countries based on tracing endpoints of Hacking Team proxy chains: Azerbaijan, Colombia, Egypt, Ethiopia, Hungary, Italy, Kazakhstan, Korea, Malaysia, Mexico, Morocco, Nigeria, Oman, Panama, Poland, Saudi Arabia, Sudan, Thailand, Turkey, United Arab Emirates, and Uzbekistan.
Full report: [Mapping Hacking Teams “Untraceable” Spyware](https://citizenlab.ca/2014/02/mapping-hacking-teams-untraceable-spyware/) by Bill Marczak, Claudio Guarnieri, Morgan Marquis-Boire, and John Scott-Railton, February 17, 2014
[^1]: Remote Control System (RCS) is sophisticated computer spyware marketed and sold exclusively to governments by Milan-based Hacking Team