1
0
forked from Git/tommy

Upload files to "content/posts/infosec"

This commit is contained in:
2025-03-25 15:29:35 +01:00
parent b4a5299ded
commit 7e2a47daab
5 changed files with 213 additions and 0 deletions

View File

@ -0,0 +1,28 @@
---
title: "Hacking Team government users"
date: 2017-07-09T08:26:00+06:00
draft: false
tags: ["surveillance","data privacy","infosec","malaysia"]
author: "Olivier Falcoz"
hidemeta: false
ShowReadingTime: true
ShowPostNavLinks: true
showtoc: false
cover:
image: ""
alt: ""
caption: ""
---
![21 Suspected Government Users of RCS by Hacking Team](/images/hacking-team-government-users-2014.jpg)
*The 21 suspected government users of RCS by Hacking Team*
> Hacking Team, also known as HT S.r.l., is a Milan-based company that describes itself as the “first to propose an offensive solution for cyber investigations".
>
> Their flagship Remote Control System (RCS)[^1] product, billed “the hacking suite for governmental interception,” is a suite of remote monitoring implants (i.e., spyware) sold exclusively to government agencies worldwide.
>
> We suspect that twenty-one governments are using Hacking Teams RCS spyware. Except as otherwise noted, we identified these countries based on tracing endpoints of Hacking Team proxy chains: Azerbaijan, Colombia, Egypt, Ethiopia, Hungary, Italy, Kazakhstan, Korea, Malaysia, Mexico, Morocco, Nigeria, Oman, Panama, Poland, Saudi Arabia, Sudan, Thailand, Turkey, United Arab Emirates, and Uzbekistan.
Full report: [Mapping Hacking Teams “Untraceable” Spyware](https://citizenlab.ca/2014/02/mapping-hacking-teams-untraceable-spyware/) by Bill Marczak, Claudio Guarnieri, Morgan Marquis-Boire, and John Scott-Railton, February 17, 2014
[^1]: Remote Control System (RCS) is sophisticated computer spyware marketed and sold exclusively to governments by Milan-based Hacking Team