July 08, 2015
It is now apparent that a major threat exists because of the posting by cyber criminals of HackingTeam proprietary software on the Internet the night of July 6. HackingTeam’s investigation has determined that sufficient code was released to permit anyone to deploy the software against any target of their choice.
Before the attack, HackingTeam could control who had access to the technology which was sold exclusively to governments and government agencies. Now, because of the work of criminals, that ability to control who uses the technology has been lost. Terrorists, extortionists and others can deploy this technology at will if they have the technical ability to do so.
We believe this is an extremely dangerous situation.
HackingTeam is evaluating if it is possibile to mitigate the danger. We expect too that anti-virus companies are upgrading their programs to detect the compromised RCS.
HackingTeam engineers are working around the clock to provide an update to the Remote Control System that will allow clients to resume criminal and intelligence investigations.
In response to HackingTeam’s request, virtually all clients have suspended use of the system that was compromised in the attack.
This is an important step to protect on-going police and intelligence investigations.
There have been reports that HackingTeam has ‘backdoors’ in its systems that would allow us to control the systems remotely. This is simply not true. Clients operate our technology on their own computer systems, and so it is clients who must take action to suspend operations.