Header Ads

Hacker Explained Step By Step About The Attack On The “Hacking Team”


Last year a big cyber attack took place on the Italian company “Hacking Team” by Phineas Fisher. According to Phineas Fisher, “hacking humiliated gives the opportunity to fight and win.”

Hacker Explained Step By Step About The Attack On The “Hacking Team”

IIn July last year, a great response in the media received a cyber attack on the Italian company “Hacking Team“, supplying intelligence agencies of different countries to monitor citizens. The leak of more than 400 GB of corporate data was widely covered in the media, but the manner of the attack and stood behind its intruder virtually nothing was known. Responsibility for the incident took the hacker, who identified himself as Phineas Fisher. Last week, after eight months of silence he published details of hacking “Hacking Team“.
Publication Phineas Fisher is not just a detailed account of the attack on the company’s system, but also a kind of political platform, explaining the motives of the attacker. “That’s all you need to close the company and prevent human rights violations. That is the beauty and the asymmetry of resistance: in just one hundred hours, only one person is able to nullify the years a multi-million company. Hacking humiliated gives a chance to fight and win,” said in a statement.
According to Phineas Fisher real “ethical hackers” publish documents revealing corruption and abuse of power, rather than advise and help companies deserve to be hacked. As the hacker explained to penetrate the internal network of “Hacking Team”, he exploited a zero-day vulnerability. Since the vulnerabilityremains unpatched, Phineas Fisher does not report any details of it. Once inside the network, he downloaded e-mails and access other servers. Then the hacker gained administrative privileges basic Windows network and observed the actions of the administrators. Using keylogger Phineas Fisher managed to steal the password of a member of Hacking Team Christian Pozzi and used it to gain access to all the source code of Hacking Team, stored on a separate isolated network.


Using password recovery function, the hacker changed the password to the account of the company on Twitter, and on July 5, 2015, Phineas Fisher reported a burglary on behalf of itself Hacking Team. According to Phineas Fisher, he spent six weeks on the corporate network, and the implementation of the attack and the kidnapping of data to it took one hundred hours.

No comments

Powered by Blogger.