SYMBOL | COMMON_NAME | aka. SYNONYMS |
The many 0-days that had been collected by Hacking Team and which became publicly available during the breach of their organization in 2015, have been used by several APT groups since. Since being founded in 2003, the Italian spyware vendor Hacking Team gained notoriety for selling surveillance tools to governments and their agencies across the world. The capabilities of its flagship product, the Remote Control System (RCS), include extracting files from a targeted device, intercepting emails and instant messaging, as well as remotely activating a device’s webcam and microphone. The company has been criticized for selling these capabilities to authoritarian governments – an allegation it has consistently denied. When the tables turned in July 2015, with Hacking Team itself suffering a damaging hack, the reported use of RCS by oppressive regimes was confirmed. With 400GB of internal data – including the once-secret list of customers, internal communications, and spyware source code – leaked online, Hacking Team was forced to request its customers to suspend all use of RCS, and was left facing an uncertain future. Following the hack, the security community has been keeping a close eye on the company’s efforts to get back on its feet. The first reports suggesting Hacking Team’s resumed operations came six months later – a new sample of Hacking Team’s Mac spyware was apparently in the wild. A year after the breach, an investment by a company named Tablem Limited brought changes to Hacking Team’s shareholder structure, with Tablem Limited taking 20% of Hacking Team’s shareholding. Tablem Limited is officially based in Cyprus; however, recent news suggests it has ties to Saudi Arabia.
2024-01-18
⋅
Google
⋅
Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware RCS SPICA |
2020-07-21
⋅
Vice
⋅
'World's Most Wanted Man' Involved in Bizarre Attempt to Buy Hacking Tools RCS |
2020-01-31
⋅
Virus Bulletin
⋅
Rich Headers: leveraging this mysterious artifact of the PE format Dridex Exaramel Industroyer Neutrino RCS Sathurbot |
2019-11-20
⋅
360
⋅
Shadow of the Circle Hovering Over Central Asia - The Golden Eagle (APT-C-34) Organizing Attack Revealed RCS APT-C-34 |
2019-01-01
⋅
Virus Bulletin
⋅
VB2018 paper: From Hacking Team to hacked team to...? RCS |
2018-03-09
⋅
ESET Research
⋅
New traces of Hacking Team in the wild RCS Hacking Team |
2017-08-25
⋅
Kaspersky Labs
⋅
Walking in your Enemy's Shadow: When Fourth-Party Collection becomes Attribution Hell NetTraveler RCS WannaCryptor Dancing Salome |
2017-04-01
⋅
F-Secure
⋅
CALLISTO GROUP RCS Callisto |
2015-07-05
⋅
Vice
⋅
Spy Tech Company 'Hacking Team' Gets Hacked Hacking Team |
2014-04-21
⋅
Wikipedia
⋅
Hacking Team Hacking Team |
2012-12-07
⋅
Contagiodump Blog
⋅
Aug 2012 W32.Crisis and OSX.Crisis - JAR file Samples - APT Crisis RCS |
2012-08-20
⋅
Symantec
⋅
Crisis for Windows Sneaks onto Virtual Machines Crisis RCS |
2012-07-24
⋅
The Mac Security Blog
⋅
New Apple Mac Trojan Called OSX/Crisis Discovered Crisis RCS |