L
LabZero
Thread author
- Content source
- https://wikileaks.org/hackingteam/emails/
Wikileaks has put online a repository
containing over a million emails from data leakage that hit Hacking Team.
If in these early days the journalistic investigations to verify any of the Italian company collaborations with repressive Governments were hampered by technical difficulties to download 400 gigabytes of data stolen or browse the various parts online, now anyone can look in all correspondence Hacking Team with a simple click.
For example, a search for "IP address" along with "VPS" reveals many interesting communications and surveillance infrastructure details of Hacking Team. A search for "gov.sa" reveals communications with Saudi Arabia's Government addresses, and so on. Other keywords are potentially interesting exploits, Eric., e. rabe rabe, leak and leaker.
The mail archive are also very recent exchanges with the security services of Ethiopia, as this mail of June 10, 2015:
"David, Giancarlo, tomorrow at midnight the temporary, read-only license we gave to INSA is going to expire. Since we issued this last license. We have not received any reply from them, on any channel. I would wait and see if anything moves on their side, or do you want to advance action (e.g., issue a new license)? Thanks, Daniele "
And you can also see the exploit for Adobe Flash, traded from Hacking Team.
But there is much more ...
containing over a million emails from data leakage that hit Hacking Team.
If in these early days the journalistic investigations to verify any of the Italian company collaborations with repressive Governments were hampered by technical difficulties to download 400 gigabytes of data stolen or browse the various parts online, now anyone can look in all correspondence Hacking Team with a simple click.
For example, a search for "IP address" along with "VPS" reveals many interesting communications and surveillance infrastructure details of Hacking Team. A search for "gov.sa" reveals communications with Saudi Arabia's Government addresses, and so on. Other keywords are potentially interesting exploits, Eric., e. rabe rabe, leak and leaker.
The mail archive are also very recent exchanges with the security services of Ethiopia, as this mail of June 10, 2015:
"David, Giancarlo, tomorrow at midnight the temporary, read-only license we gave to INSA is going to expire. Since we issued this last license. We have not received any reply from them, on any channel. I would wait and see if anything moves on their side, or do you want to advance action (e.g., issue a new license)? Thanks, Daniele "
And you can also see the exploit for Adobe Flash, traded from Hacking Team.
But there is much more ...