# Hacking Team **en.wikipedia.org/wiki/Hacking_Team** Contributors to Wikimedia projects Jump to navigation Jump to search HackingTeam **Industry** [Information technology](https://en.wikipedia.org/wiki/Information_technology) **Founded** 2003 **Founders** David Vincenzetti, Valeriano Bedeschi [Milan](https://en.wikipedia.org/wiki/Milan) , Italy **Headquarters** **Products** Software **Website** [HackingTeam.it](https://www.hackingteam.it/) **HackingTeam was a** [Milan-based](https://en.wikipedia.org/wiki/Milan) [information technology company that sold offensive intrusion](https://en.wikipedia.org/wiki/Information_technology) [and surveillance capabilities to governments, law enforcement agencies and corporations.[1]](https://en.wikipedia.org/wiki/Surveillance) Its "Remote Control Systems" enable governments and corporations to monitor the [communications of internet users, decipher their encrypted files and emails, record Skype and](https://en.wikipedia.org/wiki/Cryptography) other [Voice over IP communications, and remotely activate microphones and camera on target](https://en.wikipedia.org/wiki/Voice_over_IP) computers.[2] The company has been criticized for providing these capabilities to governments with poor [human rights records,[3]](https://en.wikipedia.org/wiki/Human_rights) though HackingTeam states that they have the ability to disable their software if it is used unethically.[4][5] The Italian government has restricted their licence to do business with countries outside Europe.[6] HackingTeam employs around 40 people in its Italian office, and has subsidiary branches in [Annapolis,](https://en.wikipedia.org/wiki/Annapolis) [Washington, D.C., and](https://en.wikipedia.org/wiki/Washington,_D.C.) [Singapore.[7]](https://en.wikipedia.org/wiki/Singapore) Its products are in use in dozens of countries across six continents.[8] ## Company foundation HackingTeam was founded in 2003 by Italian entrepreneurs Vincenzetti and Valeriano Bedeschi. In 2007 the company was invested by two Italian VC: Fondo Next and Innogest. [9] The Milan police department learned of the company. Hoping to use its tool to spy on Italian citizens and listen to their Skype calls, the police contacted Vincenzetti and asked him to help. [10] HackingTeam became "the first sellers of commercial hacking software to the police”. ----- According to former employee Byamukama Robinhood, the company began as security services provider, offering [penetration testing, auditing and other defensive capabilities to](https://en.wikipedia.org/wiki/Penetration_testing) clients.[11] Byamukama states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Byamukama claims fellow employees working on aspects of the same platform – for example, Android exploits and payloads – would not communicate with one another, possibly leading to tensions and strife within the organization.[11] In February 2014, a report from [Citizen Lab identified the organisation to be using hosting](https://en.wikipedia.org/wiki/Citizen_Lab) services from [Linode,](https://en.wikipedia.org/wiki/Linode) [Telecom Italia,](https://en.wikipedia.org/wiki/Telecom_Italia) [Rackspace, NOC4Hosts and bullet proof hosting](https://en.wikipedia.org/wiki/Rackspace) company [Santrex.[12]](https://en.wikipedia.org/w/index.php?title=Santrex&action=edit&redlink=1) On 5 July 2015 the company suffered a major data breach of customer data, software code, internal documents and e-mails. (See: _§ 2015 data breach)_ On 2 April 2019 HackingTeam was acquired by InTheCyber Group to create Memento Labs [13] ## Products and capabilities Hacking Team enables clients to perform remote monitoring functions against citizens via their [RCS (remote control systems), including their Da Vinci and Galileo platforms:[1]](https://en.wikipedia.org/wiki/Remote_administration_tool) Covert collection of emails, text message, phone call history and address books [Keystroke logging](https://en.wikipedia.org/wiki/Keystroke_logging) Uncover search history data and take screenshots Record audio from phone calls [Capture audio and video stream from device memory to bypass cryptography of](https://en.wikipedia.org/wiki/Cryptography) [Skype](https://en.wikipedia.org/wiki/Skype) sessions[14] Use microphones on device to collect ambient background noise and conversations Activate phone or computer cameras Hijack telephone GPS systems to monitor target's location Infect target computer's [UEFI](https://en.wikipedia.org/wiki/UEFI) [BIOS](https://en.wikipedia.org/wiki/BIOS) [firmware with a](https://en.wikipedia.org/wiki/Firmware) [rootkit[15]](https://en.wikipedia.org/wiki/Rootkit) Extract WiFi passwords[16] Exfiltrate [Bitcoin and other cryptocurrency wallet files to collect data on local accounts,](https://en.wikipedia.org/wiki/Bitcoin) contacts and transaction histories[17] HackingTeam uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.[18][19] [The malware has payloads for Android,[16]](https://en.wikipedia.org/wiki/Android_(operating_system)) [BlackBerry, Apple](https://en.wikipedia.org/wiki/BlackBerry) [iOS,](https://en.wikipedia.org/wiki/IOS) [Linux,](https://en.wikipedia.org/wiki/Linux) [Mac OS X,](https://en.wikipedia.org/wiki/Mac_OS_X) [Symbian,](https://en.wikipedia.org/wiki/Symbian) as well as [Microsoft Windows,](https://en.wikipedia.org/wiki/Microsoft_Windows) [Windows Mobile and](https://en.wikipedia.org/wiki/Windows_Mobile) [Windows Phone class of](https://en.wikipedia.org/wiki/Windows_Phone) operating systems.[20] ----- RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis. ## Controversies ### Use by repressive governments HackingTeam has been criticized for selling its products and services to governments with poor [human rights records, including Sudan,](https://en.wikipedia.org/wiki/Sudan) [Bahrain,](https://en.wikipedia.org/wiki/Bahrain) [Venezuela, and](https://en.wikipedia.org/wiki/Venezuela) [Saudi Arabia.[21]](https://en.wikipedia.org/wiki/Saudi_Arabia) In June 2014, a [United Nations panel monitoring the implementation of sanctions on Sudan](https://en.wikipedia.org/wiki/United_Nations) requested information from HackingTeam about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of HackingTeam revealed the organization sold Sudanese National Intelligence and Security Service access to their "Remote Control System" software in 2012 for 960,000 Euros.[21] In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, HackingTeam asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.[21] The U.N. disagreed. "The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of 'military ... equipment' or 'assistance' related to prohibited items," the secretary wrote in March. "Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel."[21][22] In the fall of 2014, the Italian government abruptly froze all of HackingTeam's exports, citing human rights concerns. After lobbying Italian officials, the company temporarily won back the right to sell its products abroad.[21] ### 2015 data breach On July 5, 2015, the [Twitter account of the company was compromised by an unknown](https://en.wikipedia.org/wiki/Twitter) [individual who published an announcement of a data breach against HackingTeam's computer](https://en.wikipedia.org/wiki/Data_breach) [systems. The initial message read, "Since we have nothing to hide, we're publishing all our e-](https://en.wikipedia.org/wiki/Nothing_to_hide_argument) _[mails, files, and source code ..." and provided links to over 400 gigabytes of data, including](https://en.wikipedia.org/wiki/Gigabyte)_ [alleged internal e-mails, invoices, and source code; which were leaked via BitTorrent and](https://en.wikipedia.org/wiki/Source_code) [Mega.[23]](https://en.wikipedia.org/wiki/Mega_(service)) An announcement of the data breach, including a link to the bittorrent seed, was retweeted by [WikiLeaks and by many others through social media.[24][25]](https://en.wikipedia.org/wiki/WikiLeaks) ----- The material was voluminous and early analysis appeared to reveal that HackingTeam had [invoiced the Lebanese Army[26]](https://en.wikipedia.org/wiki/Lebanese_Army) and [Sudan and that spy tools were also sold to Bahrain and](https://en.wikipedia.org/wiki/Sudan) [Kazakhstan.[25]](https://en.wikipedia.org/wiki/Kazakhstan) HackingTeam had previously claimed they had never done business with Sudan.[27] [The leaked data revealed a zero-day cross-platform Flash exploit (CVE number:](https://en.wikipedia.org/wiki/Zero-day_(computing)) [CVE-2015-](https://en.wikipedia.org/wiki/CVE_(identifier)) 5119.[28] [The dump included a demo of this exploit by opening Calculator from a test webpage.](https://en.wikipedia.org/wiki/Calculator_(computer_program)) [29][30][31] [Adobe patched the hole on July 8, 2015.[32]](https://en.wikipedia.org/wiki/Software_patch) Another vulnerability involving Adobe was [revealed in the dumps, which took advantage of a buffer overflow attack on an Adobe Open](https://en.wikipedia.org/wiki/Buffer_overflow) [Type Manager DLL included with Microsoft Windows. The DLL is run in kernel mode, so the](https://en.wikipedia.org/wiki/Dynamic-link_library) attack could perform [privilege escalation to bypass the](https://en.wikipedia.org/wiki/Privilege_escalation) [sandbox.[33]](https://en.wikipedia.org/wiki/Sandbox_(computer_security)) Also revealed in leaked data was HackingTeam employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'.[34] After a few hours without response from HackingTeam, member Christian Pozzi tweeted the company was working closely with police and "what the attackers are claiming regarding our _company is not true."[35][36]_ He also claimed the leaked archive "contains a virus" and that it constituted "false info".[37] Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised.[38] Responsibility for this attack was claimed by the hacker known as "Phineas Fisher" (or Phisher) on Twitter.[39] [Phineas has previously attacked spyware firm Gamma International, who](https://en.wikipedia.org/wiki/Gamma_International) [produce malware, such as FinFisher, for governments and corporations.[40]](https://en.wikipedia.org/wiki/FinFisher) In 2016, Phineas published details of the attack, in Spanish and English, as a "how-to" for others, and explained the motivations behind the attack.[41] The internal documents revealed details of HackingTeam's contracts with repressive governments.[42] In 2016, the Italian government again revoked the company's license to sell spyware outside of Europe without special permission.[6][43] ### Use by Mexican drug cartels Corrupt Mexican officials have helped drug cartels obtain state-of-the-art spyware (including Hacking Team spyware). The software has been used to target and intimidate Mexican journalists by drug cartels and cartel-entwined government actors.[44] ## Customer list HackingTeam's clientele include not just governments, but also corporate clients such as [Barclays and](https://en.wikipedia.org/wiki/Barclays) [British Telecom (BT) of the](https://en.wikipedia.org/wiki/BT_Group) [United Kingdom, as well as](https://en.wikipedia.org/wiki/United_Kingdom) [Deutsche Bank of](https://en.wikipedia.org/wiki/Deutsche_Bank) [Germany.[1]](https://en.wikipedia.org/wiki/Germany) A full list of HackingTeam's customers were leaked in the 2015 breach. Disclosed documents show HackingTeam had 70 current customers, mostly military, police, federal and provincial gov[50] [ernments. The total company revenues disclosed exceeded 40 million Euros.[45][46][47][48][49]](https://en.wikipedia.org/wiki/Euro) ----- On Sep 8, 2021,SentinelLABS released a research report about a Turkish threat actor EGoManiac,that used Remote Control System (RCS), software from the Italian infosec firm Hacking Team,which was operated between 2010 and 2016 and campaign run by Turkish TV journalists at OdaTV for spying Turkish police.[51] **Annual** **maintenance** **fees** **Total** **client** **revenues** **Customer** **Country** **Area** **Agency** **Year** **of** **first** **sale** Polizia Postale e delle Comunicazioni[52] Centro Nacional de [Inteligencia[53]](https://en.wikipedia.org/wiki/Centro_Nacional_de_Inteligencia) Infocomm Development Authority of Singapore Italy Europe LEA 2004 €100,000 €808,833 [Spain](https://en.wikipedia.org/wiki/Spain) Europe Intelligence 2006 €52,000 €538,000 [Singapore](https://en.wikipedia.org/wiki/Singapore) APAC Intelligence 2008 €89,000 €1,209,967 Information Office [Hungary](https://en.wikipedia.org/wiki/Hungary) Europe Intelligence 2008 €41,000 €885,000 CSDN [Morocco](https://en.wikipedia.org/wiki/Morocco) MEA Intelligence 2009 €140,000 €1,936,050 UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the President [Uganda](https://en.wikipedia.org/wiki/Uganda) Africa Intelligence 2015 €731,000 €920,197 Italy - DA - Rental Italy Europe Other 2009 €50,000 €628,250 Malaysian Anti[Corruption](https://en.wikipedia.org/wiki/Malaysian_Anti-Corruption_Commission) Commission [Malaysia](https://en.wikipedia.org/wiki/Malaysia) APAC Intelligence 2009 €77,000 €789,123 PCM Italy Europe Intelligence 2009 €90,000 €764,297 SSNS - Ungheria Hungary Europe Intelligence 2009 €64,000 €1,011,000 CC - Italy Italy Europe LEA 2010 €50,000 €497,349 Al Mukhabarat Al A'amah IR Authorities (Condor) Saudi Arabia MEA Intelligence 2010 €45,000 €600,000 [Luxembourg](https://en.wikipedia.org/wiki/Luxembourg) Europe Other 2010 €45,000 €446,000 ----- La Dependencia y/o CISEN[54] [Mexico](https://en.wikipedia.org/wiki/Mexico) LATAM Intelligence 2010 €130,000 €1,390,000 UZC[55] Czech Republic Europe LEA 2010 €55,000 €689,779 Egypt - MOD[55] [Egypt](https://en.wikipedia.org/wiki/Egypt) MEA Other 2011 €70,000 €598,000 Federal Bureau of [Investigation[56]](https://en.wikipedia.org/wiki/Federal_Bureau_of_Investigation) USA North America LEA 2011 €100,000 €697,710 Oman - Intelligence [Oman](https://en.wikipedia.org/wiki/Oman) MEA Intelligence 2011 €30,000 €500,000 President Security[57][58] Turkish National Police [Panama](https://en.wikipedia.org/wiki/Panama) LATAM Intelligence 2011 €110,000 €750,000 [Turkey](https://en.wikipedia.org/wiki/Turkey) Europe LEA 2011 €45,000 €440,000 UAE - MOI [UAE](https://en.wikipedia.org/wiki/United_Arab_Emirates) MEA LEA 2011 €90,000 €634,500 National Security [Service[55]](https://en.wikipedia.org/wiki/National_Security_Service_(Uzbekistan)) Department of [Defense[56]](https://en.wikipedia.org/wiki/United_States_Department_of_Defense) Bayelsa State Government [Uzbekistan](https://en.wikipedia.org/wiki/Uzbekistan) Europe Intelligence 2011 €50,000 €917,038 USA North America LEA 2011 €190,000 [Nigeria](https://en.wikipedia.org/wiki/Nigeria) MEA Intelligence 2012 €75,000 €450,000 Estado de Mexico Mexico LATAM LEA 2012 €120,000 €783,000 Information Network Security Agency State security (Falcon) [Ethiopia](https://en.wikipedia.org/wiki/Ethiopia) MEA Intelligence 2012 €80,000 €750,000 Luxemburg Europe Other 2012 €38,000 €316,000 Italy - DA - Rental Italy Europe Other 2012 €60,000 €496,000 MAL - MI Malaysia APAC Intelligence 2012 €77,000 €552,000 Direction générale [de la surveillance](https://en.wikipedia.org/wiki/Direction_g%C3%A9n%C3%A9rale_de_la_surveillance_du_territoire) du territoire National [Intelligence and](https://en.wikipedia.org/wiki/National_Intelligence_and_Security_Service) Security Service[55] Morocco MEA Intelligence 2012 €160,000 €1,237,500 [Sudan](https://en.wikipedia.org/wiki/Sudan) MEA Intelligence 2012 €76,000 €960,000 Russia - KVANT[59] [Russia](https://en.wikipedia.org/wiki/Russia) Europe Intelligence 2012 €72,000 €451,017 ----- Saudi - GID Saudi MEA LEA 2012 €114,000 €1,201,000 SIS of National [Security Committee](https://en.wikipedia.org/wiki/National_Security_Committee_of_the_Republic_of_Kazakhstan) of Kazakhstan[55] The 5163 Army Division (Alias of South Korean National Intelligence Service)[55][60][61] [Kazakhstan](https://en.wikipedia.org/wiki/Kazakhstan) Europe Intelligence 2012 €140,000 €1,012,500 [S. Korea](https://en.wikipedia.org/wiki/South_Korea) APAC Other 2012 €67,000 €686,400 UAE - Intelligence [UAE](https://en.wikipedia.org/wiki/United_Arab_Emirates) MEA Other 2012 €150,000 €1,200,000 Central Intelligence [Agency[62]](https://en.wikipedia.org/wiki/Central_Intelligence_Agency) Drug Enforcement [Administration[56][63]](https://en.wikipedia.org/wiki/Drug_Enforcement_Administration) Central [Anticorruption](https://en.wikipedia.org/wiki/Central_Anticorruption_Bureau) Bureau USA North America USA North America Intelligence 2011 Other 2012 €70,000 €567,984 [Poland](https://en.wikipedia.org/wiki/Poland) Europe LEA 2012 €35,000 €249,200 MOD Saudi Saudi MEA Other 2013 €220,000 €1,108,687 PMO Malaysia APAC Intelligence 2013 €64,500 €520,000 Estado de Queretaro National Security Agency[55] Gobierno de Puebla Gobierno de Campeche Mexico LATAM LEA 2013 €48,000 €234,500 [Azerbaijan](https://en.wikipedia.org/wiki/Azerbaijan) Europe Intelligence 2013 €32,000 €349,000 Mexico LATAM Other 2013 €64,000 €428,835 Mexico LATAM Other 2013 €78,000 €386,296 AC Mongolia [Mongolia](https://en.wikipedia.org/wiki/Mongolia) APAC Intelligence 2013 €100,000 €799,000 Dept. of Correction Thai Police National [Intelligence](https://en.wikipedia.org/wiki/National_Intelligence_Secretariat_(Ecuador)) Secretariat[64] Police Intelligence Directorate [Thailand](https://en.wikipedia.org/wiki/Thailand) APAC LEA 2013 €52,000 €286,482 [Ecuador](https://en.wikipedia.org/wiki/Ecuador) LATAM LEA 2013 €75,000 €535,000 [Colombia](https://en.wikipedia.org/wiki/Colombia) LATAM LEA 2013 €35,000 €335,000 ----- [Guardia di Finanza](https://en.wikipedia.org/wiki/Guardia_di_Finanza) Italy Europe LEA 2013 €80,000 €400,000 Intelligence[65] [Cyprus](https://en.wikipedia.org/wiki/Cyprus) Europe LEA 2013 €40,000 €375,625 MidWorld[66] [Bahrain](https://en.wikipedia.org/wiki/Bahrain) MEA Intelligence 2013 €210,000 Mexico - PEMEX Mexico LATAM LEA 2013 €321,120 Malysia K Malaysia APAC LEA 2013 €0 Honduras [Honduras](https://en.wikipedia.org/wiki/Honduras) LATAM LEA 2014 €355,000 Mex Taumalipas Mexico LATAM 2014 €322,900 Secretaría de Planeación y Finanzas Mexico LATAM LEA 2014 €91,000 €371,035 AREA Italia Europe 2014 €430,000 Mexico Yucatán Mexico LATAM LEA 2014 €401,788 Mexico Durango Mexico LATAM LEA 2014 €421,397 Investigations Police of Chile [Chile](https://en.wikipedia.org/wiki/Chile) LATAM LEA 2014 €2,289,155 Jalisco Mexico Mexico LATAM LEA 2014 €748,003 [Royal Thai Army](https://en.wikipedia.org/wiki/Royal_Thai_Army) Thailand APAC LEA 2014 €360,000 Vietnam GD5 [Vietnam](https://en.wikipedia.org/wiki/Vietnam) APAC 2014 €281,170 Kantonspolizei Zürich Switzerland Europe LEA 2014 €486,500 Vietnam GD1 Vietnam APAC LEA 2015 €543,810 Egypt TRD GNSE Egypt MEA LEA 2015 €137,500 [Lebanese Army](https://en.wikipedia.org/wiki/Lebanese_Armed_Forces) [Lebanon](https://en.wikipedia.org/wiki/Lebanon) MEA LEA 2015 Federal Police Department National [Anticorruption](https://en.wikipedia.org/wiki/National_Anticorruption_Directorate) Directorate State Informative [Service[67]](https://en.wikipedia.org/wiki/SHISH) Brazil LATAM LEA 2015 [Romania](https://en.wikipedia.org/wiki/Romania) DNA Intelligence 2015 [Albania](https://en.wikipedia.org/wiki/Albania) Europe SHIK 2015 ----- Danish National Police[68] ## See also Denmark Europe 2015 €570,000 [FinFisher](https://en.wikipedia.org/wiki/FinFisher) [MiniPanzer and MegaPanzer](https://en.wikipedia.org/wiki/MiniPanzer_and_MegaPanzer) ## References 1. ^ a b c _Batey, Angus (24 November 2011)._ _["The spies behind your screen". The](https://www.telegraph.co.uk/technology/8899353/The-spies-behind-your-screen.html)_ _Telegraph. Retrieved 26 July 2015._ 2. ^ _["Enemies of the Internet: HackingTeam".](https://web.archive.org/web/20140429193708/http://surveillance.rsf.org/en/hacking-team/)_ _[Reporters Without Borders. Archived from](https://en.wikipedia.org/wiki/Reporters_Without_Borders)_ _the_ _original on 29 April 2014. Retrieved 24 April 2014._ 3. ^ _Marczak, Bill; Gaurnieri, Claudio; Marquis-Boire, Morgan; Scott-Railton, John (17_ _[February 2014). "Mapping HackingTeam's "Untraceable" Spyware".](https://web.archive.org/web/20140220070424/https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/)_ _[Citizen Lab. Archived](https://en.wikipedia.org/wiki/Citizen_Lab)_ _from_ _[the original on 20 February 2014.](https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/)_ 4. ^ _[Kopfstein, Janus (10 March 2014). "Hackers Without Borders".](https://www.newyorker.com/tech/annals-of-technology/hackers-without-borders)_ _[The New Yorker.](https://en.wikipedia.org/wiki/The_New_Yorker)_ _Retrieved 24 April 2014._ 5. ^ _Marquis-Boire, Morgan; Gaurnieri, Claudio; Scott-Railton, John; Kleemola, Katie (24_ _[June 2014). "Police Story: HackingTeam's Government Surveillance Malware". Citizen](https://web.archive.org/web/20140625065101/https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/)_ _[Lab. University of Toronto. Archived from the original on 25 June 2014. Retrieved 3](https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/)_ _August 2014._ 6. ^ a b _[Zorabedian, John (8 April 2016). "HackingTeam loses global license to sell spyware".](https://nakedsecurity.sophos.com/2016/04/08/hacking-team-loses-global-license-to-sell-spyware/)_ _Naked Security. Retrieved 15 May 2016._ 7. ^ _[Human Rights Watch (25 March 2014).](https://en.wikipedia.org/wiki/Human_Rights_Watch)_ ["They Know Everything We Do". Retrieved 1](https://www.hrw.org/report/2014/03/25/they-know-everything-we-do/telecom-and-internet-surveillance-ethiopia) August 2015. 8. ^ _Jeffries, Adrianne (13 September 2013). "Meet HackingTeam, the company that helps_ _the police hack you"._ _[The Verge. Retrieved 21 April 2014.](https://en.wikipedia.org/wiki/The_Verge)_ 9. ^ _Jeffries, Adrianne (13 September 2013). "Meet Hacking Team, the company that helps_ _the police hack you". The Verge. Retrieved 20 August 2021._ 10. ^ a b Farivar, Cyrus (20 July 2015) HackingTeam goes to war against former employees, suspects some helped hackers. Ars Technica. Retrieved 26 July 2015. 11. ^ _["HackingTeam's US Nexus". 28 February 2014. Retrieved 2 August 2015.](https://citizenlab.org/2014/02/hacking-teams-us-nexus/)_ 12. ^ _Stecklow, Steve; Sonne, Paul; Bradley, Matt (1 June 2011)._ _"Mideast Uses Western_ _Tools to Battle the Skype Rebellion". The Wall Street Journal. Retrieved 26 July 2015._ 13. ^ _Lin, Philippe (13 July 2015). "HackingTeam Uses UEFI BIOS Rootkit to Keep RCS 9_ _Agent in Target Systems". TrendLabs Security Intelligence Blog._ _[Trend Micro. Retrieved](https://en.wikipedia.org/wiki/Trend_Micro)_ _26 July 2015._ 14. ^ _Schneier, Bruce._ _["More on HackingTeam's Government Spying Software".](https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html)_ 15. ^ Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014). "To Protect And Infect: The militarization of the Internet". At the 30th [Chaos Communications Congress – "30C3".](https://en.wikipedia.org/wiki/Chaos_Communications_Congress) [(Video or Audio). Chaos Computer Club. Retrieved 15 August 2015.](https://en.wikipedia.org/wiki/Chaos_Computer_Club) ----- 16. _Hay Newman, Lily (7 July 2015). A Detailed Look at HackingTeam s Emails_ _About Its Repressive Clients". The Intercept. Retrieved 15 May 2016._ 17. ^ _Knibbs, Kate (8 July 2015). "HackingTeam's Lame Excuse for Selling Digital Weapons_ _to Sudan". Gizmodo. Retrieved 15 May 2016._ 18. ^ _["Hacked Team (@hackingteam)". Archived from the original on 6 July 2015. Retrieved 6](https://web.archive.org/web/20150706010312/https://twitter.com/hackingteam)_ _[July 2015. {{cite web}} : CS1 maint: bot: original URL status unknown (link)](https://en.wikipedia.org/wiki/Template:Cite_web)_ 19. ^ _[WikiLeaks [@wikileaks] (6 July 2015). "Inside malware makers "HackingTeam":](https://en.wikipedia.org/wiki/WikiLeaks)_ _hundreds of gigabytes of e-mails, files, and source code" (Tweet). Retrieved 6 July 2015_ _– via_ _[Twitter.](https://en.wikipedia.org/wiki/Twitter)_ 20. ^ [Hacking Team on](https://twitter.com/SynAckPwn/status/617955067006578689) [Twitter](https://en.wikipedia.org/wiki/Twitter) 21. ^ _Ragan, Steve (5 July 2015). "HackingTeam hacked, attackers claim 400GB in dumped_ _data". Retrieved 6 July 2015._ 22. ^ _Khandelwal, Swati. "Zero-Day Flash Player Exploit Disclosed In 'HackingTeam' Data_ _Dump". Retrieved 6 July 2015._ 23. ^ _Pi, Peter._ _["Unpatched Flash Player Flaw, More POCs Found in HackingTeam Leak".](https://thehackernews.com/2015/07/flash-zero-day-vulnerability.html)_ _Retrieved 8 July 2015._ 24. ^ _[Adobe Systems (corporate author). "Adobe Security Bulletin". Retrieved 11 July 2015.](https://helpx.adobe.com/security/products/flash-player/apsb15-16.html)_ ``` {{cite web}} : |last= has generic name (help) ``` 25. ^ _Tang, Jack (7 July 2015). "A Look at the Open Type Font Manager Vulnerability from_ _the HackingTeam Leak". Retrieved 8 July 2015._ 26. ^ _Whittaker, Zack._ _["HackingTeam used shockingly bad passwords".](https://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/)_ _[ZDNet. Retrieved 6](https://en.wikipedia.org/wiki/ZDNet)_ _July 2015._ 27. ^ _[Christian Pozzi. "unknown". Archived from](https://web.archive.org/web/20210307202902/https://twitter.com/christian_pozzi/status/617964180042190848)_ _[the original on 7 March 2021. Retrieved 6](https://twitter.com/christian_pozzi/status/617964180042190848)_ _July 2015 – via Twitter._ `{{cite web}} : Cite uses generic title (help)` 28. ^ _[Christian Pozzi. "unknown". Archived from](https://web.archive.org/web/20210307215040/https://twitter.com/christian_pozzi/status/617964660705234944)_ _[the original on 7 March 2021. Retrieved 6](https://twitter.com/christian_pozzi/status/617964660705234944)_ _July 2015 – via Twitter._ `{{cite web}} : Cite uses generic title (help)` 29. ^ _[Christian Pozzi. "unknown". Archived from](https://web.archive.org/web/20201223092507/https://twitter.com/christian_pozzi/status/617962663188926465)_ _[the original on 23 December 2020. Retrieved](https://twitter.com/christian_pozzi/status/617962663188926465)_ _6 July 2015 – via Twitter._ `{{cite web}} : Cite uses generic title (help)` 30. ^ _["Christian Pozzi on Twitter: "Uh Oh - my twitter account was also hacked."". 6 July](https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512)_ _[2015. Archived from the original on 6 July 2015. Retrieved 6 July 2015.](https://twitter.com/christian_pozzi/status/617977753250496512)_ 31. ^ _Osbourne, Charlie. "HackingTeam: We won't 'shrivel up and go away' after_ _cyberattack"._ _[ZDNet. Retrieved 6 July 2015.](https://en.wikipedia.org/wiki/ZDNet)_ 32. ^ _["How HackingTeam got hacked". Ars Technica. 19 April 2016. Retrieved 15 May 2016.](https://arstechnica.com/security/2016/04/how-hacking-team-got-hacked-phineas-phisher/)_ 33. ^ _["Hacking Team's Global License Revoked by Italian Export Authorities". Privacy](https://web.archive.org/web/20190505001143/https://www.privacyinternational.org/blog/1042/hacking-teams-global-license-revoked-italian-export-authorities)_ _[International. 8 April 2016. Archived from the original on 5 May 2019. Retrieved 15 May](https://www.privacyinternational.org/blog/1042/hacking-teams-global-license-revoked-italian-export-authorities)_ _2016._ 34. ^ _Kopstein, Justin (6 July 2015). "Here Are All the Sketchy Government Agencies Buying_ _HackingTeam's Spy Tech". Vice Magazine._ 35. ^ _Weissman, Cale Guthrie (6 July 2015). "Hacked security company's documents show a_ _laundry list of questionable clients"._ _[Business Insider.](https://en.wikipedia.org/wiki/Business_Insider)_ 36. ^ _[Ragan, Steve. "In Pictures: HackingTeam's hack curated". CSO Online (Australia).](https://www.cso.com.au/slideshow/579158/pictures-hacking-team-hack-curated/)_ 37. ^ _Hern, Alex (6 July 2015). "HackingTeam hacked: firm sold spying tools to repressive_ _regimes, documents claim". The Guardian. Retrieved 22 July 2015._ ----- 38. Ragan, Steve (6 July 2015). HackingTeam responds to data breach, issues public _threats and denials". CSO Online. Retrieved 22 July 2015._ 39. ^ _Stevenson, Alastair (14 July 2015). "A whole bunch of downed government surveillance_ _programs are about to go back online". Business Insider. Retrieved 22 July 2015._ 40. ^ _Stevenson, Alastair (8 September 2021). "Hacking Team Customer in Turkey Was_ _Arrested for Spying on Police Colleagues [or: The Spy Story That Spun a Tangled Web]"._ _Zetter. Retrieved 8 September 2021._ [41. ^ Jone Pierantonio. "Ecco chi ha bucato HackingTeam"](http://it.ibtimes.com/cyber-space/ecco-chi-ha-bucato-hacking-team-1408915) [Archived 6 August 2015 at the](https://web.archive.org/web/20150806132049/http://it.ibtimes.com/cyber-space/ecco-chi-ha-bucato-hacking-team-1408915) [Wayback Machine. International Business Times. Retrieved 2 August 2015.](https://en.wikipedia.org/wiki/Wayback_Machine) 42. ^ Ediciones El País (8 July 2015). "HackingTeam: “Ofrecemos tecnología ofensiva para la Policía”". El País. Retrieved 2 August 2015. [43. ^ McGrath, Ben (25 July 2015). "Further revelations in South Korean hacking scandal".](https://www.wsws.org/en/articles/2015/07/25/kore-j25.html) _World Socialist Web Site. Retrieved 26 July 2015._ [44. ^ In Cyprus (11 July 2015).Intelligence Service chief steps down](http://in-cyprus.com/intelligence-service-chief-steps-down/) [Archived 2015-08-15 at](https://web.archive.org/web/20150815133237/http://in-cyprus.com/intelligence-service-chief-steps-down/) the [Wayback Machine. Retrieved 26 July 2015.](https://en.wikipedia.org/wiki/Wayback_Machine) 45. ^ Perlroth, Nicole (10 October 2012). Ahead of Spyware Conference, More Evidence of Abuse. The New York Times (Bits). ## External links [Official website](http://www.hackingteam.it/) [HackingTeam Archives - investigative reports published by The Citizen Lab](https://citizenlab.org/tag/hacking-team/) [WikiLeaks: The Hackingteam Archives - searchable database of 1 million internal emails](https://wikileaks.org/hackingteam/emails) [HackingTeam presentations in the](https://web.archive.org/web/20140918005805/https://www.wikileaks.org/spyfiles/list/company-name/hackingteam.html) [WikiLeaks "Spy Files"](https://en.wikipedia.org/wiki/WikiLeaks) **Hacking in the** **2010s** [Timeline](https://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history#2010s) **Major incidents** [Operation Aurora](https://en.wikipedia.org/wiki/Operation_Aurora) [Australian cyberattacks](https://en.wikipedia.org/wiki/February_2010_Australian_cyberattacks) [Operation ShadowNet](https://en.wikipedia.org/wiki/Shadow_Network) [Operation Payback](https://en.wikipedia.org/wiki/Operation_Payback) **2010** ----- **2011** **2012** **2013** **2014** **2015** **2016** [DigiNotar](https://en.wikipedia.org/wiki/DigiNotar) [DNSChanger](https://en.wikipedia.org/wiki/DNSChanger) [HBGary Federal](https://en.wikipedia.org/wiki/HBGary) [Operation AntiSec](https://en.wikipedia.org/wiki/Operation_AntiSec) [Operation Tunisia](https://en.wikipedia.org/wiki/Operation_Tunisia) [PlayStation](https://en.wikipedia.org/wiki/2011_PlayStation_Network_outage) [RSA SecurID compromise](https://en.wikipedia.org/wiki/RSA_SecurID#March_2011_system_compromise) [LinkedIn hack](https://en.wikipedia.org/wiki/2012_LinkedIn_hack) [Stratfor email leak](https://en.wikipedia.org/wiki/2012%E2%80%9313_Stratfor_email_leak) [Operation High Roller](https://en.wikipedia.org/wiki/Operation_High_Roller) [South Korea cyberattack](https://en.wikipedia.org/wiki/2013_South_Korea_cyberattack) [Snapchat hack](https://en.wikipedia.org/wiki/Snapchat#December_2013_hack) [Cyberterrorism Attack of June 25](https://en.wikipedia.org/wiki/June_25_cyber_terror) [2013 Yahoo! data breach](https://en.wikipedia.org/wiki/Yahoo!_data_breaches#August_2013_breach) [Singapore cyberattacks](https://en.wikipedia.org/wiki/2013_Singapore_cyberattacks) [Anthem medical data breach](https://en.wikipedia.org/wiki/Anthem_medical_data_breach) [Operation Tovar](https://en.wikipedia.org/wiki/Operation_Tovar) [2014 celebrity nude photo leak](https://en.wikipedia.org/wiki/2014_celebrity_nude_photo_leak) [2014 JPMorgan Chase data breach](https://en.wikipedia.org/wiki/2014_JPMorgan_Chase_data_breach) [Sony Pictures hack](https://en.wikipedia.org/wiki/Sony_Pictures_hack) [Russian hacker password theft](https://en.wikipedia.org/wiki/2014_Russian_hacker_password_theft) [2014 Yahoo! data breach](https://en.wikipedia.org/wiki/Yahoo!_data_breaches#Late_2014_breach) [Office of Personnel Management data breach](https://en.wikipedia.org/wiki/Office_of_Personnel_Management_data_breach) [Hacking Team](https://en.wikipedia.org/wiki/Hacking_Team#2015_data_breach) [Ashley Madison data breach](https://en.wikipedia.org/wiki/Ashley_Madison_data_breach) [VTech data breach](https://en.wikipedia.org/wiki/VTech#2015_data_breach) [Ukrainian Power Grid Cyberattack](https://en.wikipedia.org/wiki/December_2015_Ukraine_power_grid_cyberattack) [SWIFT banking hack](https://en.wikipedia.org/wiki/2015%E2%80%932016_SWIFT_banking_hack) [Bangladesh Bank robbery](https://en.wikipedia.org/wiki/Bangladesh_Bank_robbery) Hollywood Presbyterian Medical Center ransomware incident [Commission on Elections data breach](https://en.wikipedia.org/wiki/Commission_on_Elections_data_breach) [Democratic National Committee cyber attacks](https://en.wikipedia.org/wiki/Democratic_National_Committee_cyber_attacks) [Vietnam Airport Hacks](https://en.wikipedia.org/wiki/Vietnamese_airports_hackings) [DCCC cyber attacks](https://en.wikipedia.org/wiki/Democratic_Congressional_Campaign_Committee_cyber_attacks) [Indian Bank data breaches](https://en.wikipedia.org/wiki/2016_Indian_Banks_data_breach) [Surkov leaks](https://en.wikipedia.org/wiki/Surkov_leaks) [Dyn cyberattack](https://en.wikipedia.org/wiki/2016_Dyn_cyberattack) [Russian interference in the 2016 U.S. elections](https://en.wikipedia.org/wiki/Russian_interference_in_the_2016_United_States_elections) [2016 Bitfinex hack](https://en.wikipedia.org/wiki/2016_Bitfinex_hack) ----- **2017** **2018** **2019** [2017 Macron e-mail leaks](https://en.wikipedia.org/wiki/2017_Macron_e-mail_leaks) [WannaCry ransomware attack](https://en.wikipedia.org/wiki/WannaCry_ransomware_attack) [Westminster data breach](https://en.wikipedia.org/wiki/2017_Westminster_data_breach) [Petya cyberattack](https://en.wikipedia.org/wiki/Petya_(malware)) [2017 cyberattacks on Ukraine](https://en.wikipedia.org/wiki/2017_cyberattacks_on_Ukraine) [Equifax data breach](https://en.wikipedia.org/wiki/2017_Equifax_data_breach) [Deloitte breach](https://en.wikipedia.org/wiki/Deloitte#E-mail_hack) [Disqus breach](https://en.wikipedia.org/wiki/Disqus#October_2017_security_breach) [Trustico](https://en.wikipedia.org/wiki/Trustico#DigiCert_and_Trustico_spat,_2018) [Atlanta cyberattack](https://en.wikipedia.org/wiki/Atlanta_government_ransomware_attack) [SingHealth data breach](https://en.wikipedia.org/wiki/2018_SingHealth_data_breach) [Sri Lanka cyberattack](https://en.wikipedia.org/wiki/2019_cyberattacks_on_Sri_Lanka) [Baltimore ransomware attack](https://en.wikipedia.org/wiki/2019_Baltimore_ransomware_attack) [Bulgarian revenue agency hack](https://en.wikipedia.org/wiki/2019_Bulgarian_revenue_agency_hack) [Jeff Bezos phone hacking](https://en.wikipedia.org/wiki/Jeff_Bezos_phone_hacking) **[Hacktivism](https://en.wikipedia.org/wiki/Hacktivism)** [Anonymous](https://en.wikipedia.org/wiki/Anonymous_(group)) [associated events](https://en.wikipedia.org/wiki/Timeline_of_events_associated_with_Anonymous) [CyberBerkut](https://en.wikipedia.org/wiki/CyberBerkut) [GNAA](https://en.wikipedia.org/wiki/Gay_Nigger_Association_of_America) [Goatse Security](https://en.wikipedia.org/wiki/Goatse_Security) [Lizard Squad](https://en.wikipedia.org/wiki/Lizard_Squad) [LulzRaft](https://en.wikipedia.org/wiki/LulzRaft) [LulzSec](https://en.wikipedia.org/wiki/LulzSec) [New World Hackers](https://en.wikipedia.org/wiki/2016_Dyn_cyberattack#Perpetrators) [NullCrew](https://en.wikipedia.org/wiki/NullCrew) [OurMine](https://en.wikipedia.org/wiki/OurMine) [PayPal 14](https://en.wikipedia.org/wiki/PayPal_14) [RedHack](https://en.wikipedia.org/wiki/RedHack) [TeaMp0isoN](https://en.wikipedia.org/wiki/TeaMp0isoN) [TDO](https://en.wikipedia.org/wiki/The_Dark_Overlord_(hacker_group)) [UGNazi](https://en.wikipedia.org/wiki/UGNazi) [Ukrainian Cyber Alliance](https://en.wikipedia.org/wiki/Ukrainian_Cyber_Alliance) ----- **Advanced** **persistent threats** **[Individuals](https://en.wikipedia.org/wiki/Hacker)** [Bureau 121](https://en.wikipedia.org/wiki/Bureau_121) [Charming Kitten](https://en.wikipedia.org/wiki/Charming_Kitten) [Cozy Bear](https://en.wikipedia.org/wiki/Cozy_Bear) [Dark Basin](https://en.wikipedia.org/wiki/Dark_Basin) [Elfin Team](https://en.wikipedia.org/wiki/Elfin_Team) [Equation Group](https://en.wikipedia.org/wiki/Equation_Group) [Fancy Bear](https://en.wikipedia.org/wiki/Fancy_Bear) [Guccifer 2.0](https://en.wikipedia.org/wiki/Guccifer_2.0) Hacking Team [Helix Kitten](https://en.wikipedia.org/wiki/Helix_Kitten) [Iranian Cyber Army](https://en.wikipedia.org/wiki/Iranian_Cyber_Army) [Lazarus Group (BlueNorOff) (AndAriel)](https://en.wikipedia.org/wiki/Lazarus_Group) [NSO Group](https://en.wikipedia.org/wiki/NSO_Group) [PLA Unit 61398](https://en.wikipedia.org/wiki/PLA_Unit_61398) [PLA Unit 61486](https://en.wikipedia.org/wiki/PLA_Unit_61486) [PLATINUM](https://en.wikipedia.org/wiki/PLATINUM_(cybercrime_group)) [Pranknet](https://en.wikipedia.org/wiki/Pranknet) [Red Apollo](https://en.wikipedia.org/wiki/Red_Apollo) [Rocket Kitten](https://en.wikipedia.org/wiki/Rocket_Kitten) [Syrian Electronic Army](https://en.wikipedia.org/wiki/Syrian_Electronic_Army) [Tailored Access Operations](https://en.wikipedia.org/wiki/Tailored_Access_Operations) [The Shadow Brokers](https://en.wikipedia.org/wiki/The_Shadow_Brokers) [Yemen Cyber Army](https://en.wikipedia.org/wiki/Yemen_Cyber_Army) [George Hotz](https://en.wikipedia.org/wiki/George_Hotz) [Guccifer](https://en.wikipedia.org/wiki/Guccifer) [Jeremy Hammond](https://en.wikipedia.org/wiki/Jeremy_Hammond) [Junaid Hussain](https://en.wikipedia.org/wiki/Junaid_Hussain) [Kristoffer von Hassel](https://en.wikipedia.org/wiki/Kristoffer_von_Hassel) [Mustafa Al-Bassam](https://en.wikipedia.org/wiki/Mustafa_Al-Bassam) [MLT](https://en.wikipedia.org/wiki/MLT_(hacktivist)) [Ryan Ackroyd](https://en.wikipedia.org/wiki/Ryan_Ackroyd) [Sabu](https://en.wikipedia.org/wiki/Hector_Monsegur) [Topiary](https://en.wikipedia.org/wiki/Topiary_(hacktivist)) [Track2](https://en.wikipedia.org/wiki/Roman_Seleznev) [The Jester](https://en.wikipedia.org/wiki/The_Jester_(hacktivist)) ----- **Major** **[vulnerabilities](https://en.wikipedia.org/wiki/Vulnerability_(computing))** **publicly** **[disclosed](https://en.wikipedia.org/wiki/Full_disclosure_(computer_security))** **[Malware](https://en.wikipedia.org/wiki/Malware)** [Evercookie (2010)](https://en.wikipedia.org/wiki/Evercookie) [iSeeYou (2013)](https://en.wikipedia.org/wiki/ISeeYou) [Heartbleed (2014)](https://en.wikipedia.org/wiki/Heartbleed) [Shellshock (2014)](https://en.wikipedia.org/wiki/Shellshock_(software_bug)) [POODLE (2014)](https://en.wikipedia.org/wiki/POODLE) [Rootpipe (2014)](https://en.wikipedia.org/wiki/Rootpipe) [Row hammer (2014)](https://en.wikipedia.org/wiki/Row_hammer) [JASBUG (2015)](https://en.wikipedia.org/wiki/JASBUG) [Stagefright (2015)](https://en.wikipedia.org/wiki/Stagefright_(bug)) [DROWN (2016)](https://en.wikipedia.org/wiki/DROWN_attack) [Badlock (2016)](https://en.wikipedia.org/wiki/Badlock) [Dirty COW (2016)](https://en.wikipedia.org/wiki/Dirty_COW) [Cloudbleed (2017)](https://en.wikipedia.org/wiki/Cloudbleed) [Broadcom Wi-Fi (2017)](https://en.wikipedia.org/wiki/Broadcom_Corporation#soc-wifi-vulns) [EternalBlue (2017)](https://en.wikipedia.org/wiki/EternalBlue) [DoublePulsar (2017)](https://en.wikipedia.org/wiki/DoublePulsar) [Silent Bob is Silent (2017)](https://en.wikipedia.org/wiki/Intel_Active_Management_Technology#Silent_Bob_is_Silent) [KRACK (2017)](https://en.wikipedia.org/wiki/KRACK) [ROCA vulnerability (2017)](https://en.wikipedia.org/wiki/ROCA_vulnerability) [BlueBorne (2017)](https://en.wikipedia.org/wiki/BlueBorne_(security_vulnerability)) [Meltdown (2018)](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)) [Spectre (2018)](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)) [EFAIL (2018)](https://en.wikipedia.org/wiki/EFAIL) [Exactis (2018)](https://en.wikipedia.org/wiki/Exactis) [Speculative Store Bypass (2018)](https://en.wikipedia.org/wiki/Speculative_Store_Bypass) [Lazy FP State Restore (2018)](https://en.wikipedia.org/wiki/Lazy_FP_State_Restore) [TLBleed (2018)](https://en.wikipedia.org/wiki/TLBleed) [SigSpoof (2018)](https://en.wikipedia.org/wiki/SigSpoof) [Foreshadow (2018)](https://en.wikipedia.org/wiki/Foreshadow) [Microarchitectural Data Sampling (2019)](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling) [BlueKeep (2019)](https://en.wikipedia.org/wiki/BlueKeep) [Kr00k (2019)](https://en.wikipedia.org/wiki/Kr00k) [Bad Rabbit](https://en.wikipedia.org/wiki/Ransomware#Bad_Rabbit) [SpyEye](https://en.wikipedia.org/wiki/SpyEye) [Stuxnet](https://en.wikipedia.org/wiki/Stuxnet) **2010** **2011** [Alureon](https://en.wikipedia.org/wiki/Alureon) [Duqu](https://en.wikipedia.org/wiki/Duqu) [Kelihos](https://en.wikipedia.org/wiki/Kelihos_botnet) [Metulji botnet](https://en.wikipedia.org/wiki/Metulji_botnet) [Stars](https://en.wikipedia.org/wiki/Stars_virus) ----- **2012** **2013** **2014** **2015** **2016** **2017** [Carna](https://en.wikipedia.org/wiki/Carna_botnet) [Dexter](https://en.wikipedia.org/wiki/Dexter_(malware)) [FBI](https://en.wikipedia.org/wiki/FBI_MoneyPak_Ransomware) [Flame](https://en.wikipedia.org/wiki/Flame_(malware)) [Mahdi](https://en.wikipedia.org/wiki/Mahdi_(malware)) [Red October](https://en.wikipedia.org/wiki/Red_October_(malware)) [Shamoon](https://en.wikipedia.org/wiki/Shamoon) [CryptoLocker](https://en.wikipedia.org/wiki/CryptoLocker) [DarkSeoul](https://en.wikipedia.org/wiki/DarkSeoul_(wiper)) [Brambul](https://en.wikipedia.org/wiki/Brambul) [Carbanak](https://en.wikipedia.org/wiki/Carbanak) [Careto](https://en.wikipedia.org/wiki/Careto_(malware)) [DarkHotel](https://en.wikipedia.org/wiki/DarkHotel) [Duqu 2.0](https://en.wikipedia.org/wiki/Duqu_2.0) [FinFisher](https://en.wikipedia.org/wiki/FinFisher) [Gameover ZeuS](https://en.wikipedia.org/wiki/Gameover_ZeuS) [Regin](https://en.wikipedia.org/wiki/Regin_(malware)) [Dridex](https://en.wikipedia.org/wiki/Dridex) [Hidden Tear](https://en.wikipedia.org/wiki/Hidden_Tear) [Rombertik](https://en.wikipedia.org/wiki/Rombertik) [TeslaCrypt](https://en.wikipedia.org/wiki/TeslaCrypt) [Hitler](https://en.wikipedia.org/wiki/Hitler-Ransomware) [Jigsaw](https://en.wikipedia.org/wiki/Jigsaw_(ransomware)) [KeRanger](https://en.wikipedia.org/wiki/KeRanger) [MEMZ](https://en.wikipedia.org/wiki/MEMZ) [Mirai](https://en.wikipedia.org/wiki/Mirai_(malware)) [Pegasus](https://en.wikipedia.org/wiki/Pegasus_(spyware)) [Petya (NotPetya)](https://en.wikipedia.org/wiki/Petya_(malware)) [X-Agent](https://en.wikipedia.org/wiki/X-Agent) [BrickerBot](https://en.wikipedia.org/wiki/BrickerBot) [Kirk](https://en.wikipedia.org/wiki/Kirk_Ransomware) [LogicLocker](https://en.wikipedia.org/wiki/LogicLocker) _[Rensenware ransomware](https://en.wikipedia.org/wiki/Rensenware)_ [Triton](https://en.wikipedia.org/wiki/Triton_(malware)) [WannaCry](https://en.wikipedia.org/wiki/WannaCry_ransomware_attack) [XafeCopy](https://en.wikipedia.org/wiki/Xafecopy_Trojan) ----- **2019** [Grum](https://en.wikipedia.org/wiki/Grum_botnet) [Joanap](https://en.wikipedia.org/wiki/Joanap) [NetTraveler](https://en.wikipedia.org/wiki/NetTraveler) [R2D2](https://en.wikipedia.org/wiki/Chaos_Computer_Club#Staatstrojaner_affair) [Tinba](https://en.wikipedia.org/wiki/Tinba) [Titanium](https://en.wikipedia.org/wiki/Titanium_(malware)) [Vault 7](https://en.wikipedia.org/wiki/Vault_7) [ZeroAccess botnet](https://en.wikipedia.org/wiki/ZeroAccess_botnet) {software update} [Retrieved from "https://en.wikipedia.org/w/index.php?title=Hacking_Team&oldid=1088136701"](https://en.wikipedia.org/w/index.php?title=Hacking_Team&oldid=1088136701) -----