Hacking campaign targets organizations through DNS hijacking attacks

Hacking campaign targets organizations through DNS hijacking attacks

Recently, a new hacking campaign, called "Sea Turtle", was launched, targeting public and private players. The characteristic...
Read More

Is the privacy of the iPhone real?

A unique ID is enabled by default on every iPhone that is available on the market, allowing advertisers to watch ...
Read More

WiFi Finder: Leak over 2 million Wi-Fi network passwords

WiFi Finder, an Android app installed by more than 100.000 users on Google Play, has leaked over ...
Read More

Cryptocurrency: Types of crime and ways of protection

When we talk about cryptocurrency always comes to our minds and crime, especially electronic crime. Cryptos are vulnerable ...
Read More
infosec tweaks

5 key steps for greater security of a data center

Data Center: We all know so far that Cloud technology has changed our lives. The cloud is here for ...
Read More
Latest Posts

Hacking Team returns with new Encryption Cracking tools

Hacking team

The Hacking Team announces its return with new tools

Hacking Team, the Italian company that provides hacking tools for businesses and businesses governments, made her official return with an email sent to her customers via her mailing list.

The revelation comes from Vice reporters who have been notified of a new e-mail that David Vincenzetti's Chief Executive Officer sent to his current and potential clients through the company's list.

A brief snippet of e-mail says: "Most [law enforcement agencies] in the US and abroad will be" blinded ", they will" find themselves in darkness: "They will not be able to fight against such phenomena as terrorism. Only private companies can help here and we are one of them. »

The e-mail then says: "It is clear that the current US government does not have the guts to oppose the American IT teams and to adopt unpopular but absolutely necessary arrangements."

This email was sent to 19 October, nearly four months after a hacker known only as PhineasFisher violated the company's servers, stole and then "emptied" over 400 GB data.

400 GB of files included a zero-day diversion exploited by various applications, the spyware and surveillance tools, hacking tools, internal company emails, customer lists and purchases, and source code of the company's main product: Remote Control System (RCS), 9 version.

After the event, the Chief Executive Officer promised to return and during the appearances he had made at various conferences during the summer, he announced that his team has already begun work for RCS 10.

It's unclear whether the e-mail sent a few days ago refers to RCS 10 or something completely new.

One thing is clear, and these are the new tools that will enable governments and businesses to crack encrypted files and web traffic, a problem that many governments, such as the United States and the United Kingdom, are trying to overcome with one way or the other.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *