https://de.wikipedia.org/w/api.php?action=feedcontributions&feedformat=atom&user=MorpheusKafkaWikipedia - Benutzerbeiträge [de]2025-06-05T17:48:39ZBenutzerbeiträgeMediaWiki 1.45.0-wmf.3https://de.wikipedia.org/w/index.php?title=Hong_Kong_97&diff=171156765Hong Kong 972016-11-20T02:53:36Z<p>MorpheusKafka: Reverted 1 good faith edit by Doraemonfan using STiki</p>
<hr />
<div>{{Infobox video game<br />
|title = Hong Kong 97<br />
|image =File:Hong Kong 97 cover.jpg<br />
|caption = Box art<br />
<br />
|developer = HappySoft<br />
| designer = Kowloon Kurosawa<br />
|publisher = HappySoft<br />
|released = 1995<br />
|genre = [[Shoot 'em up#Multidirectional shooters|Multidirectional shooter]]<br />
|modes = [[Single-player video game|Single-player]]<br />
|platforms = [[Super Nintendo Entertainment System|Super Famicom]] with [[Game backup device|floppy disk drive]]<br />
}}<br />
<br />
{{nihongo|'''''Hong Kong 97'''''|香港97}}, stylized as ''HONGKONG1997'' on the game's boxart, is a 1995 [[Shoot 'em up#Multidirectional shooters|multidirectional shooter]] [[video game]] made in [[Japan]] for the [[Super Nintendo Entertainment System|Super Famicom]] in disk drive format by HappySoft Ltd., a Japanese [[homebrew (video games)|homebrew]] game company. The game was designed by the Japanese game journalist {{Interlanguage link multi|Kowloon Kurosawa|ja|3=クーロン黒沢}} (クーロン黒沢 ''Kūron Kurosawa''), who said the game was made in about a week.<ref name="sixsamana">{{cite web |url= http://sixsamana.com/?p=257| script-title = 香港97 | trans-title = Hong Kong 97 |last1= Kowloon Kurosawa|first1= |date= |website= Six Samana|publisher= |access-date= March 26, 2015| language = Japanese}}</ref> The game has gained a [[cult following]] in Japan and [[Taiwan]] for its [[List of video games notable for negative reception|notoriously poor quality]] – it has been ranked as a ''[[kusoge]]'', which literally means "shitty game", a game considered "so bad that it's good". It has since been given multiple parody treatments.<br />
<br />
The game also achieved Number One "Wacky Japanese Game of All Time" in the [[XLEAGUE.TV]] video game TV show ''Wez and Larry's Top Tens'' and was featured in an episode of the ''[[Angry Video Game Nerd]]''.<ref>{{cite web |url=http://cinemassacre.com/2015/03/26/hong-kong-97-super-famicom-angry-video-game-nerd/ |title=Hong Kong 97 (Super Famicom) Angry Video Game Nerd – Episode 134 |date=March 26, 2015 |accessdate=March 26, 2015}}</ref><br />
<br />
==Plot==<br />
The game is set around the [[transfer of sovereignty over Hong Kong]] in 1997. It is said that, at the time, people from the [[Mainland China|Chinese Mainland]] (referred to as "fuckin' ugly [[Communist Party of China|reds]]", making this one of the very few games on the Super Famicom that contains cursing) started immigrating to [[Hong Kong]] and greatly increased the crime rate. As a countermeasure, Chin ([[Jackie Chan]] in his ''[[Wheels on Meals]]'' appearance), an unspecified relative of [[Bruce Lee]], was hired by the Hong Kong government (represented by [[Chris Patten]]) to wipe out all 1.2 billion people in [[China]]. But meanwhile, in China, research was underway to bring the dead "Tong Shau Ping" ([[Deng Xiaoping]]) back to life as the "ultimate weapon".<br />
<br />
When the game was released in 1995, Deng Xiaoping, said to be dead in the game, was still alive. However, he did die months before the handover, which is when the game's plot actually takes place.<br />
<br />
==Gameplay==<br />
Immediately after the introduction above (which follows some ads and the title screen), the game starts without any warning. (What usually follows is an instant [[game over]].) The player controls Chin, who tries to shoot and evade the Chinese populace and police officers moving about and spitting randomly on the screen. When shot, the enemies explode in a [[mushroom cloud]] (notably poorly cropped, to the point the explosion is nearly rectangular), leaving behind a flashing corpse and items for instant death or temporary invincibility. After a while, cars appear from the sides and, after three cars have been destroyed by the player, the final boss appears. The final boss is actually Deng Xiaoping's head from the title screen, and once he is defeated, the game repeats itself. All these happen with a stagnant photo as the background; it is random and might be pictures of [[Maoism|Maoist]] [[propaganda]], [[Guilin]], the logo for [[Asia Television]], the logo for the Chinese [[Coca-Cola]] or even [[Mao Zedong]] in monochrome.<br />
<br />
If Chin is hit by anything other than the invincibility item the game is immediately over (unless Chin is under invincibility), and an image of what appears to be a corpse<!--PLEASE PROVIDE DEFINITE PROOF IF YOU WANT TO ADD THAT THE CORPSE IS THE POLISH BOXER LESZEK BLANZYNSKI--> shows as the game over screen. The words "CHIN IS DEAD!" in English and in grammatically incorrect Chinese – "Chén sǐ wáng" (陳死亡) can be interpreted as either "Chin is dead", or as a proper name, "Dead Chin" – are superimposed on the game over screen. The game then goes to the credits and back to the title screen and repeats again. The game is noted for its difficulty, one of the factors that made the game a ''[[Kusoge|kuso-ge]]''.<br />
<br />
The game can be played in [[English language|English]], [[Japanese language|Japanese]] or [[Traditional Chinese characters|traditional Chinese]].<br />
<br />
==Audio==<br />
Upon turning on the game, the first two lines of an upbeat "[[I Love Beijing Tiananmen]]" song can be heard. The two lines will loop endlessly throughout the game until the game is turned off. The track, though short, is actually one of the few streamed tracks to be played on the Super Famicom platform. There are no sound effects in the game.<br />
<br />
==Influence==<br />
HappySoft Ltd. distributed the games themselves, but few retail stores were interested in getting copies of the game at the time. After this game, HappySoft was never heard from again; therefore, actual hard copies are extremely rare (numerous reviewers have commented on this; the [[Angry Video Game Nerd]] commented that he was unable to locate even photo evidence that a cartridge of the game existed, let alone the cartridge itself), and the ones commonly available are emulated [[ROM image|ROM]]s.<br />
<br />
Although this game is difficult to obtain through legal means, it gained notoriety years after its release for portraying an actual event in bad taste and bad quality, and was thus spread on the internet. Soon it became famous enough in Japanese gaming forums that it was featured in articles of underground books and magazines. The game eventually spilled out of Japan, and received a following in [[Taiwan]]. This is probably because of the relative familiarity with the Hong Kong transfer of sovereignty in 1997 and the awkward Chinese subtitles that were also available in the game. The song "I Love Beijing Tiananmen" also gained popularity because of its repetitive nature, though this popularity is mostly satirical towards the [[China|People's Republic of China]]. Some teenagers in Taiwan made a spoof of ''HK97'' called ''TW2001'' for the [[Personal computer|PC]], claiming it to be worse than ''HK97''.<ref name="sixsamana" /><br />
<br />
==References==<br />
{{reflist}}<br />
<br />
==External links==<br />
<br />
*[http://www.hardcoregaming101.net/hongkong97/hongkong97.htm Game review on Hardcore Gaming 101]<br />
*[http://michaelgoraku.blog22.fc2.com/blog-entry-23.html Japanese article about the game in @wiki]<br />
*[http://michaelgoraku.blog22.fc2.com/blog-entry-23.html Japanese blog post talking more about the gameplay]<br />
<br />
{{DEFAULTSORT:Hong Kong 97 (Game)}}<br />
[[Category:1995 video games]]<br />
[[Category:Shoot 'em ups]]<br />
[[Category:Super Nintendo Entertainment System-only games]]<br />
[[Category:Video games set in Hong Kong]]<br />
[[Category:Video games developed in Japan]]<br />
[[Category:Video games set in 1997]]<br />
[[Category:Homebrew software]]<br />
[[Category:Anti-Chinese sentiment in Asia]]</div>MorpheusKafkahttps://de.wikipedia.org/w/index.php?title=Juliana_Harkavy&diff=162745277Juliana Harkavy2016-07-30T19:48:47Z<p>MorpheusKafka: Reverted 1 good faith edit by Slinnane using STiki. Uncited BLP change.</p>
<hr />
<div>{{Infobox person<br />
| image =<br />
| caption = <br />
| name = Juliana Harkavy<br />
| birth_date = {{birth date and age|mf=yes|1985|1|1}}<br />
| birth_place = [[New York City|New York]], United States<br />
| occupation = Actress, writer, musician<br />
| years_active = 1995&ndash;present<br />
}}<br />
<br />
'''Juliana Harkavy''' (born January 1, 1985) is an [[United States|American]] [[actress]]. She is known for portraying Rebecca in ''[[Dolphin Tale]]'', Jessie in ''[[Day One (2012 film)|To Write Love on her Arms]]'', and [[List of The Walking Dead (TV series) characters#Martinez's Group|Alisha]] in the television series ''[[The Walking Dead (TV series)|The Walking Dead]]''. Her roles include a starring role in the [[horror film]] ''[[Last Shift]]'', and a reprise of her role as Rebecca in ''[[Dolphin Tale 2]]''.<ref>{{cite web|author= |url=http://www.onlocationvacations.com/2013/10/18/dolphin-tale-2-filming-underway-at-clearwater-aquarium/ |title='Dolphin Tale 2' filming underway at Clearwater Aquarium |publisher=On Location Vacations |date=2013-10-18 |accessdate=2015-08-02}}</ref><ref>{{cite web|last=Goldberg |first=Matt |url=http://collider.com/renee-movie-image-set-photo/ |title=RENEE Movie Image and Set Photo |publisher=Collider |date=2012-02-16 |accessdate=2015-08-02}}</ref><ref>{{cite web|url=http://www.deadline.com/2013/06/anthony-deblasi-directing-horror-pic-paymon/ |title=Anthony DiBlasi Directing Horror Pic ‘Paymon’ |publisher=Deadline |date=2013-06-28 |accessdate=2015-08-02}}</ref><ref>{{cite web|url=http://www.contactmusic.com/photo/juliana-harkavy-the-los-angeles-premiere-of-dolphin-tale-at-the-mann_3518761 |title=Picture - Juliana Harkavy Los Angeles, California, Saturday 17th September 2011 &#124; Photo 2588460 |publisher=Contactmusic.com |date=2011-09-17 |accessdate=2015-08-02}}</ref><ref>{{cite web|url=http://www.reneethemovie.com/cast.html |title=Meet The Cast |publisher=Reneethemovie.com |accessdate=2015-08-02}}</ref><br />
<br />
==Early life==<br />
Juliana Harkavy was born in [[New York City]] on January 1, 1985. She is the daughter of Berta Carela and Michael Harkavy, who is the former Senior [[Vice president]] of [[Warner Bros.|Warner Bros. Entertainment]] Worldwide Publishing, [[Kids' WB]] Music, and [[Warner Bros. Interactive Entertainment]]. Her professional acting career began when she was 10 years old.<br />
<br />
==Education==<br />
Harkavy trained at the [[Young Actors Space]] in [[Sherman Oaks, California]] for nine years. She attended her first year of high school at [[Le Lycée Français de Los Angeles]], where she became fluent in French, and did part of her schooling in the South of France. She earned her high school diploma from the [[Milken Community High School]] in [[Los Angeles, California]]. After high school, Juliana attended The [[Tisch School of the Arts]] at [[New York University]], where she majored in Theater in the Sanford Meisner studio.<ref>{{cite web|url=http://www.imdb.com/name/nm3952890/bio?ref_=nm_ov_bio_sm|title=ABCD|publisher=IMDb.com|accessdate=2015-08-02}}</ref><br />
<br />
==Career==<br />
===Early work===<br />
Harkavy’s first acting job was at age 10 in a commercial for the [[Fox Kids]] series ''[[Goosebumps (TV series)|Goosebumps]]'', based on the popular horror-book series. Her first role in a major motion picture was an uncredited role in the 1995 version of ''[[A Little Princess (1995 film)|A Little Princess]]'', directed by [[Alfonso Cuarón]].<br />
<br />
===Main roles===<br />
'''Feature Films'''<br />
*Harkavy starred in the 2011 film ''If You Only Knew'' about early-onset [[Alzheimer's Disease]].<br />
*Harkavy stars as Jessica Loren in the [[horror film]] ''[[Last Shift]]''.<ref>{{cite web|url=http://www.fearnet.com/news/news-article/character-poster-paymon |title=Chiller &#124; Scary Good |publisher=Fearnet.com |date=2015-07-29 |accessdate=2015-08-02}}</ref><ref>{{cite web|author=Ryan Turek |url=http://www.shocktillyoudrop.com/news/174643-first-official-image-from-anthony-diblasis-paymon/ |title=First Official Image from Anthony DiBlasi's Paymon |publisher=Shock Till You Drop |date=2013-06-25 |accessdate=2015-08-02}}</ref><ref>{{cite web|author= |url=http://horrorcultfilms.co.uk/2013/07/character-one-sheets-released-for-dread-directors-unique-sounding-chiller-paymon/ |title=Character one-sheets released for Dread director’s unique sounding chiller ‘Paymon’ » Horror Cult Films - Movie Reviews of Obscure, Weird, Strange, Horror and Cult Cinema |publisher=Horror Cult Films |date=2013-07-10 |accessdate=2015-08-02}}</ref><br />
<br />
'''Shorts'''<br />
*Harkavy starred in the 2010 short film ''[[Whatever Lola Wants (film)|Whatever Lola Wants]]''. Nominated for a Best Actress Award at the 2011 [[University of Miami]] Canes Film Festival<ref>{{cite web|url=http://www.naplesnews.com/photos/2010/oct/05/251326/ |accessdate=November 17, 2013 |deadurl=yes |archiveurl=https://web.archive.org/20140201220940/http://www.naplesnews.com/photos/2010/oct/05/251326/ |archivedate=February 1, 2014 }}</ref><br />
*Harkavy will star in the upcoming short film "The Lost Doll” directed by [[Jokes Yanes]].<br />
<br />
'''Television'''<br />
*Harkavy plays Alisha, a survivor involved with the Governor in a recurring role on ''[[The Walking Dead (TV series)|The Walking Dead]]''. She appeared in two episodes: "Dead Weight" and "Too Far Gone".<ref>{{cite web|last=Dessner |first=Dina |url=http://geekleagueofamerica.com/2013/12/01/geek-league-interview-juliana-harkavy-alicia-on-the-walking-dead/ |title=Geek League Interview - Juliana Harvkavy, "Alisha" On 'The Walking Dead' |publisher=Geek League of America |date=2013-12-01 |accessdate=2015-08-02}}</ref><br />
<br />
==Personal life==<br />
Harkavy is of Dominican, African, Chinese, Russian and Hungarian descent. She plays the piano, the guitar, and the flute. She has lived in New York, [[New Mexico]], [[New Jersey]], [[California]], [[Florida]], and [[France]].<br />
<br />
==Filmography==<br />
{| class="wikitable sortable"<br />
|+Film<br />
! Year<br />
! Title<br />
! Role<br />
! class="unsortable" | Notes<br />
|-<br />
| 1995<br />
| ''[[A Little Princess (1995 film)|A Little Princess]]''<br />
| Girl in India<br />
|<br />
|-<br />
| 2005<br />
| ''Flushed''<br />
| Groupie<br />
| Short<br />
|-<br />
|rowspan=2|2006<br />
| ''Love is Blind''<br />
| Crystal<br />
|<br />
|-<br />
| ''[[My Super Ex-Girlfriend]]'' <br />
| Passerby<br />
|<br />
|-<br />
| 2010<br />
| ''[[Whatever Lola Wants (film)|Whatever Lola Wants]]''<br />
| Lola<br />
| Nominated for Best Actress Award at UM Canes film festival.<br />
|-<br />
|rowspan=3|2011<br />
| ''[[Dolphin Tale]]''<br />
| Rebecca<br />
| <br />
|-<br />
| ''If You Only Knew''<br />
| Louise<br />
|<br />
|-<br />
| ''Big Mike''<br />
| Janette Ogilvy<br />
| TV movie<br />
|-<br />
| 2012<br />
| ''A Feeling from Within''<br />
| Stacey<br />
|<br />
|-<br />
|rowspan=3|2013<br />
| ''Finding Joy''<br />
| Pretty Young Woman<br />
| <br />
|-<br />
| ''[[House of Bodies]]''<br />
| Tisha<br />
| <br />
|-<br />
| ''Marriage Material''<br />
| Madeline<br />
| <br />
|-<br />
|rowspan=2|2014<br />
| ''[[Dolphin Tale 2]]''<br />
| Rebecca<br />
|<br />
|- <br />
|''[[Last Shift]]''<br />
| Officer Jessica Loren<br />
| <br />
|-<br />
|2015 <br />
|''[[To Write Love on Her Arms (film)|To Write Love on Her Arms]]''<br />
|Jessie<br />
|Filmed in 2011, released in 2015<br />
|}<br />
<br />
{| class="wikitable sortable"<br />
|+Television<br />
! Year<br />
! Title<br />
! Role<br />
! class="unsortable" | Notes <br />
|-<br />
| 2010<br />
| ''[[The Glades (TV series)|The Glades]]''<br />
| Amy<br />
| 1 episode<br />
|-<br />
|rowspan=2|2013<br />
| ''[[Graceland (TV series)|Graceland]]''<br />
| Alex<br />
| 1 episode<br />
|-<br />
| ''[[The Walking Dead (TV series)|The Walking Dead]]''<br />
| [[List of The Walking Dead (TV series) characters#Martinez's Group|Alisha]]<br />
| 4 episodes<br />
|}<br />
<br />
==References==<br />
{{Reflist}}<br />
<br />
==External links==<br />
{{Commons category|Juliana Harkavy}}<br />
* [http://www.julianaharkavy.com/ Official website]<br />
* {{IMDb name|3952890|Juliana Harkavy}}<br />
* {{YouTube|6T-xRSv-ECc|Juliana Harkavy interview}}<br />
* {{YouTube|7bjvKvmeWxU|Juliana Harkavy in UNICEF PSA video}}<br />
* {{YouTube|XZKOcch4is4|A young Juliana Harkavy in National Cotton Campaign ad}}<br />
<br />
<br />
{{DEFAULTSORT:Harkavy, Juliana}}<br />
[[Category:1985 births]]<br />
[[Category:20th-century American actresses]]<br />
[[Category:21st-century American actresses]]<br />
[[Category:Actresses from New York City]]<br />
[[Category:American film actresses]]<br />
[[Category:American television actresses]]<br />
[[Category:Living people]]<br />
[[Category:American child actresses]]<br />
[[Category:African-American actresses]]<br />
[[Category:American people of Dominica descent]]<br />
[[Category:American actresses of Chinese descent]]<br />
[[Category:American people of Russian descent]]<br />
[[Category:American people of Hungarian descent]]<br />
[[Category:Tisch School of the Arts alumni]]</div>MorpheusKafkahttps://de.wikipedia.org/w/index.php?title=Pyongyang_(Restaurantkette)&diff=197826188Pyongyang (Restaurantkette)2016-04-08T17:38:14Z<p>MorpheusKafka: Added info about recent mass defection from restaurant</p>
<hr />
<div>{{other uses|Pyongyang (disambiguation)}}<br />
[[File:Pyongyang Restaurant in Phnom Penh.jpg|thumb|Sign for the Pyongyang Restaurant in Phnom Penh, Cambodia]]<br />
<br />
'''Pyongyang''' is a [[restaurant chain|chain of restaurants]] named after the [[Pyongyang|capital]] of [[North Korea]]. The restaurants are owned and operated by the [[Haedanghwa Group]], an organisation of the [[government of North Korea]].<ref name=nklw20140121>{{cite web|title=DPRK Restaurant in Amsterdam Reopened Under New Ownership|url=http://nkleadershipwatch.wordpress.com/2014/01/21/dprk-restaurant-in-amsterdam-reopened-under-new-ownership/|website=North Korea Leadership Watch|accessdate=30 August 2014}}</ref><br />
<br />
==Locations==<br />
Pyongyang restaurants are found mainly in China near the North Korean border and also [[Beijing]] and [[Shanghai]], but in the 2000s the chain has been expanding into South East Asian cities including [[Jakarta]],<ref>{{cite web|title=North Korea’s Hidden Menu|author=Tash Roslin|date=May 6, 2010|url=http://www.thejakartaglobe.com/archive/north-koreas-hidden-menu/ | publisher= Jakarta Globe| accessdate =March 10, 2014}}</ref> [[Phnom Penh]],<ref name=bbc-20140607>{{Cite episode |url=http://downloads.bbc.co.uk/podcasts/radio4/fooc/fooc_20140607-1200a.mp3 |series=From Our Own Correspondent |title=Mort Pour La France |minutes=22:25s |author=Ed Butler |network=BBC |station=Radio 4 |date=7 June 2014 |accessdate=7 June 2014}}</ref> [[Ho Chi Minh City]], [[Hanoi]], [[Da Nang]], [[Siem Reap]], [[Dhaka]],<ref>{{cite web|last1=Mitra|first1=Devirupa|title=Dining with Dear Leader in Dhaka|url=http://www.newindianexpress.com/thesundaystandard/Dining-with-Dear-Leader-in-Dhaka/2013/12/29/article1970514.ece|website=The Sunday Standard|publisher=New Indian Express|accessdate=20 May 2015}}</ref> [[Vientiane]] and [[Kuala Lumpur]].<ref name="Strangio 2010">{{cite news|url=http://www.slate.com/id/2247402|title=Kingdom Kim's Culinary Outposts: Inside the bizarre world of Asia's North Korean restaurant chain.|last=Strangio|first=Sebastian|date=22 March 2010|work=[[Slate (magazine)|Slate]]|accessdate=23 March 2010}}</ref> There is also one restaurant in Mongolia in [[Ulaanbaatar]]. The restaurants initially catered to the many South Korean businessmen in South East Asia, and have now become popular with curious tourists.<ref>{{cite web | url =http://www.voanews.com/khmer-english/news/Pyongyang-Restaurants-Extending-Reach-in-Southeast-Asian-Cities-135022938.html| title= Pyongyang Restaurants Extending Reach in Southeast Asian Cities (public domain text as cited) | publisher= Voice of America, Khmer-English | accessdate= January 13, 2012}}</ref> A branch was opened in [[Amsterdam]] in 2012 along with Dutch co-owners, closed 7 months later, and reopened in December 2013 under the name Haedanghwa in a new location, which closed a year later.<ref name=nklw20140121 /> The chain used to have branches in [[Bangkok]] and [[Pattaya]] but these have closed down and back opened in [[Bangkok]] in 2015. It was believed that a new branch was set to open in [[Scotland]], in line with Kim Jong Un's interest in the country after its recent independence referendum, although this has been denied by North Korean officials.<ref>{{Cite web |url=http://www.mirror.co.uk/news/uk-news/kim-jong-un-set-open-new-4957996 | title= Kim Jong-un 'set to open a new restaurant in SCOTLAND'}}</ref><ref>{{cite web|url=http://www.independent.co.uk/news/people/north-korea-denies-reports-kim-jongun-is-to-open-statebacked-restaurant-in-scotland-9972483.html|title=North Korea denies reports Kim Jong-un is to open state-backed restaurant in Scotland|work=The Independent|accessdate=12 May 2015}}</ref><br />
<br />
==Service==<br />
[[File:Women performing at the Pyongyang Restaurant in Phnom Penh.jpg|thumb|[[:en:Koreans|North Korean]] women performing at the Pyongyang Restaurant in Phnom Penh.]]<br />
<br />
The restaurants serve [[Korean cuisine|Korean food]], including [[kimchi]] dishes, Pyongyang "[[Naengmyeon|cold noodle]]", barbecued [[cuttlefish]] and [[dangogi|dog meat]] soup.<ref name="Strangio 2010" /> Patrons may also buy North Korean products such as [[ginseng]] wine and an unlabelled [[aphrodisiac]] claimed to be made from [[bear]]s.<ref name="Strangio 2010" /> The prices are relatively high and in [[US dollar]]s.<ref name="Strangio 2010" /><br />
<br />
The staff are attractive, young [[Koreans|Korean]] women in traditional [[Chosŏn-ot]] dress, who also perform [[karaoke]] as well as song and dance routines in the style of the North Korean [[Mass Games]] for the customers.<ref name="Strangio 2010" /><ref name="Kim 2007" /> Staff from North Korea typically work on 3 year contracts, and are often highly trained graduates of arts colleges.<ref name=bbc-20140607/> Photography is generally not permitted inside.<ref name=bbc-20140607/><ref name="Strangio 2010" /><br />
<br />
The first Western outpost of the restaurant chain was officially opened in [[Osdorp]], a residential neighborhood in the outskirts of Amsterdam in February 2012.<ref>[https://web.archive.org/web/20101012185701/http://www.pyongyangrestaurant.com/ Pyongyang Restaurant], ''[Archived link]''</ref> The menu and policies of this restaurant differ from its Asian counterparts, serving no dog meat or ginseng wine. However, in September, 2012, amid mutual accusations between the Korean staff and the Dutch partner, the restaurant closed.<ref name=AT5>{{cite news|title=Noord-Koreaans restaurant al weer dicht|url=http://www.at5.nl/artikelen/86267/noord-koreaans-restaurant-osdorp-al-weer-dicht|accessdate=September 6, 2012|newspaper=AT5 Nieuws|date=September 5, 2012}}</ref><br />
<br />
==Operation==<br />
According to Swedish journalist [[Bertil Lintner]], the restaurants are one of several overseas business ventures of [[Room 39]], a North Korean government organization dedicated to acquiring and [[money laundering|laundering]] foreign currency for the North Korean leadership.<ref name="Strangio 2010" /><br />
<br />
[[North Korean defectors]] report that the restaurants are run by local middlemen who are required to pay between [[US$]]10,000 and US$30,000 each year to the North Korean government.<ref name="Strangio 2010" /><ref name="Kim 2007">{{cite news|url=http://www.dailynk.com/english/read.php?cataId=nk00100&num=2239|title= North Korean Restaurants in China Send $10,000-30,000 Annually Back to Its Native Country|last=Kim|first=Min Se|date=19 June 2007|work=[[Daily NK]]|accessdate=23 March 2010}}</ref> The North Korean staff, who live on the restaurant premises,<ref name=bbc-20140607/> are said to be thoroughly screened for political loyalty and to be closely watched by on-site North Korean security agents.<ref name="Strangio 2010" /> In the 2000s, according to ''[[Daily NK]]'', several attempted escapes by waitresses in China led to the closure of several restaurants and the repatriation of their staff.<ref name="Kwon 2007">{{cite news|url=http://www.dailynk.com/english/read.php?cataId=nk00100&num=1806|title=North Korean Restaurant in China Shuts Down as Receptionist Escapes|last=Kwon|first=Jeong Hyun|date=21 March 2007|work=[[Daily NK]]|accessdate=23 March 2010}}</ref><ref name="Kim 2006">{{cite news|url=http://www.dailynk.com/english/read.php?cataId=nk01500&num=1438|title=Waitresses Flee North Korean Restaurants in Qingdao China|last=Kim|first=Yong Hun|date=15 December 2006|work=[[Daily NK]]|accessdate=23 March 2010}}</ref> In 2016, [[South Korea]] announced that 13 restaurant workers had defected from a Pyongyang restaurant chain abroad.<ref>{{Cite web|url=http://in.reuters.com/article/north-korea-defectors-idINKCN0X5102|title=North Korean staff at restaurant in third country defect to South|website=Reuters India|language=en-IN|access-date=2016-04-08}}</ref><br />
<br />
==See also==<br />
{{portal|North Korea}}<br />
* [[Okryugwan#Branches outside North Korea|Branches outside North Korea]] of Okryugwan or Okryu Restaurant that is a restaurant in Pyongyang, North Korea, founded in 1960.<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Korean restaurants]]<br />
[[Category:Companies of North Korea]]<br />
[[Category:Restaurants in China]]<br />
[[Category:Restaurant chains]]</div>MorpheusKafkahttps://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174786HackingTeam2015-07-09T02:26:11Z<p>MorpheusKafka: cleanuup</p>
<hr />
<div>'''Hacking Team''' is a [[Milan]]-based IT company that sells offensive intrusion and surveillance capabilities to governments and law enforcement agencies. Its remote control systems enable governments to monitor the communications of internet users, decipher their encrypted files and emails, record [[Skype]] and other Voice over IP communications, and remotely activate microphones and camera on target computers.<ref>{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}</ref> The company has been criticized for providing these capabilities to governments with poor human rights records.<ref>{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's "Untraceable" Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}</ref> Hacking Team states that they have the ability to disable their software if it is used unethically.<ref>{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}</ref><br />
<br />
In June 2014, a report from the University of Toronto detailed the functionality and architecture of Hacking Team’s Remote Control System (RCS) software and operator tradecraft.<ref>{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}</ref><br />
<br />
Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]] and [[Singapore]]. Its products are in use in dozens of countries across six continents.<ref name=Jeffries>{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}</ref><br />
<br />
==Company history==<br />
Hacking Team was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br />
<br />
The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. Hacking Team was born, and became "the first sellers of commercial hacking software to the police."<ref name=Jeffries/><br />
<br />
=== 2015 hacking ===<br />
<br />
On July 5, 2015, the Twitter account of the company was compromised, and over 400 GB of data, including alleged internal e-mails, invoices, and source code were leaked via [[BitTorrent]].<ref>{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}</ref> An announcement of the hack, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.<ref>{{Twitter status|wikileaks|617865712611233792|Inside malware makers "Hacking Team": hundreds of gigabytes of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}</ref><ref name="ibtimes.co.uk">{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}</ref><br />
<br />
Although the material was voluminous, early analysis of the hacked material appeared to reveal that Hacking Team had invoiced the Lebanese Army<ref>{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}}</ref> and [[Sudan]] and that spy tools were also sold to Bahrain and Kazakhstan.<ref name="ibtimes.co.uk"/> Hacking Team had previously claimed they had never done business with Sudan.<ref>{{Cite web|title = Hacking Team hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}</ref><br />
<br />
The leaked data revealed a zero-day cross-platform Flash exploit (CVE number CVE-2015-5119).<ref>{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}</ref> The dump included a demo of this hack by opening [[Calculator (computer program)|Calculator]] from a test webpage.<ref>{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'Hacking Team' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}</ref><ref>{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in Hacking Team Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}</ref> Adobe plans to patch the hole on July 8, 2015.<ref>{{Cite web|title = Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|accessdate = 2015-07-08|last = Adobe Systems (corporate author)}}</ref> Another vulnerability involving Adobe was revealed in the dumps, but this takes advantage of a buffer overflow attack on an Adobe Open Type Manager DLL included with Microsoft Windows. The DLL is run in the kernel mode, so the attack can preform privilege escalation to bypass the sandbox.<ref>{{Cite web|title = A Look at the Open Type Font Manager Vulnerability from the Hacking Team Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29|accessdate = 2015-07-08|first = Jack|last = Tang}}</ref><br />
<br />
It was also revealed in the dumps that the Hacking Team used insecure passwords, including 'P4ssword', 'wolverine', and 'universo'.<ref>{{Cite web|title = Hacking Team used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}</ref><br />
<br />
After a few hours without response from Hacking Team, member Christian Pozzi tweeted that the company was working closely with police and that "what the attackers are claiming regarding our company is not true."<ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}</ref><ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}</ref> He also claimed that the torrented material "contains a virus" and that it constituted "false info".<ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}</ref> Shortly after these tweets, Pozzi's Twitter account itself was apparently hacked.<ref>{{Cite web|title = Christian Pozzi on Twitter: "Uh Oh - my twitter account was also hacked."|url = https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512|date = 2015-07-06|accessdate = 2015-07-06}}</ref><br />
<br />
Responsibility for this attack was claimed by the hacker known as Phineas Fisher on Twitter.<ref>{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}</ref> Phineas has previously attacked spyware manufacturer Gamma, which also sells spyware to governments.<ref>{{Cite web|title = Hacking Team: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}</ref><br />
<br />
<br />
=== Customer List ===<br />
The full list of Hacking Team's customers was leaked in the 2015 hacking. The disclosure documents showed that Hacking Team had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million Euros. <ref>https://ht.transparencytoolkit.org/Amministrazione/01%20-%20CLIENTI/5%20-%20Analisi%20Fatturato/2015/02%20-%20Client%20Overview%202015/Client%20Overview_list_20150603.xlsx</ref> (Note: The following table is from an unofficial leak.It is not necessarily accurate.)<br />
<br />
{| class="wikitable sortable"<br />
|-<br />
! Customer<br />
! Country<br />
! Area<br />
! Agency<br />
! Year First Sale<br />
! Annual Maintenance Fees<br />
! Total Client Revenues<br />
|-<br />
| Polizia Postale||Italy||Europe||LEA||2004||€ 100,000||€ 808,833<br />
|-<br />
| CNI||Spain||Europe||Intelligence||2006||€ 52,000||€ 538,000<br />
|-<br />
| IDA SGP||Singapore||APAC||Intelligence||2008||€ 89,000||€ 1,209,967<br />
|-<br />
| Information Office||Hungary||Europe||Intelligence||2008||€ 41,000||€ 885,000<br />
|-<br />
| CSDN||Morocco||MEA||Intelligence||2009||€ 140,000||€ 1,936,050<br />
|-<br />
| Italy - DA - Rental||Italy||Europe||Other||2009||€ 50,000||€ 628,250<br />
|-<br />
| MACC||Malaysia||APAC||Intelligence||2009||€ 77,000||€ 789,123<br />
|-<br />
| PCM||Italy||Europe||Intelligence||2009||€ 90,000||€ 764,297<br />
|-<br />
| SSNS - Ungheria||Hungary||Europe||Intelligence||2009||€ 64,000||€ 1,011,000<br />
|-<br />
| CC - Italy||Italy||Europe||LEA||2010||€ 50,000||€ 497,349<br />
|-<br />
| GIP Saudi||Saudi||MEA||Intelligence||2010||€ 45,000||€ 600,000<br />
|-<br />
| IR Authorities (Condor)||Luxemburg||Europe||Other||2010||€ 45,000||€ 446,000<br />
|-<br />
| La Dependencia y/o Cisen||Mexico||LATAM||Intelligence||2010||€ 130,000||€ 1,390,000<br />
|-<br />
| UZC ||Czech Rep. ||Europe||LEA||2010||€ 55,000||€ 689,779<br />
|-<br />
| Egypt - MOD||Egypt||MEA||Other||2011||€ 70,000||€ 598,000<br />
|-<br />
| FBI||USA||North America||LEA||2011||€ 100,000||€ 697,710<br />
|-<br />
| Oman - Intelligence||Oman||MEA||Intelligence||2011||€ 30,000||€ 500,000<br />
|-<br />
| President Security ||Panama||LATAM||Intelligence||2011||€ 110,000||€ 750,000<br />
|-<br />
| Turkish National Police||Turkey||Europe||LEA||2011||€ 45,000||€ 440,000<br />
|-<br />
| UAE - MOI||UAE||MEA||LEA||2011||€ 90,000||€ 634,500<br />
|-<br />
| NSS||Uzbekistan||Europe||Intelligence||2011||€ 50,000||€ 917,038<br />
|-<br />
| DOD||USA||North America||LEA||2011||||€ 190,000<br />
|-<br />
| Bayelsa State Government||Nigeria||MEA||Intelligence||2012||€ 75,000||€ 450,000<br />
|-<br />
| Estado del Mexico||Mexico||LATAM||LEA||2012||€ 120,000||€ 783,000<br />
|-<br />
| Information Network Security Agency||Ethiopia||MEA||Intelligence||2012||€ 80,000||€ 750,000<br />
|-<br />
| State security (Falcon)||Luxemburg||Europe||Other||2012||€ 38,000||€ 316,000<br />
|-<br />
| Italy - DA - Rental||Italy||Europe||Other||2012||€ 60,000||€ 496,000<br />
|-<br />
| MAL - MI||Malaysia||APAC||Intelligence||2012||€ 77,000||€ 552,000<br />
|-<br />
| Morocco - DST||Morocco||MEA||Intelligence||2012||€ 160,000||€ 1,237,500<br />
|-<br />
| NISS - National Intelligence and Security Services||Sudan||MEA||Intelligence||2012||€ 76,000||€ 960,000<br />
|-<br />
| Russia - KVANT||Russia||Europe||Intelligence||2012||€ 72,000||€ 451,017<br />
|-<br />
| Saudi - GID||Saudi||MEA||LEA||2012||€ 114,000||€ 1,201,000<br />
|-<br />
| SIS of NSC||Kazakistan||Europe||Intelligence||2012||€ 140,000||€ 1,012,500<br />
|-<br />
| The 5163 Army Division||S. Korea||APAC||Other||2012||€ 67,000||€ 686,400<br />
|-<br />
| UAE - Intelligence||UAE||MEA||Other||2012||€ 150,000||€ 1,200,000<br />
|-<br />
| DEA||USA||North America||Other||2012||€ 70,000||€ 567,984<br />
|-<br />
| CBA Poland||Poland||Europe||LEA||2012||€ 35,000||€ 249,200<br />
|-<br />
| MOD Saudi||Saudi||MEA||Other||2013||€ 220,000||€ 1,108,687<br />
|-<br />
| PMO||Malaysia||APAC||Intelligence||2013||€ 64,500||€ 520,000<br />
|-<br />
| Estado de Qeretaro||Mexico||LATAM||LEA||2013||€ 48,000||€ 234,500<br />
|-<br />
| Azerbajan NS||Adjerbaijan NSS||Europe||Intelligence||2013||€ 32,000||€ 349,000<br />
|-<br />
| Governo de Puebla||Mexico||LATAM||Other||2013||€ 64,000||€ 428,835<br />
|-<br />
| Governo de Campeche||Mexico||LATAM||Other||2013||€ 78,000||€ 386,296<br />
|-<br />
| AC Mongolia||Mongolia||APAC||Intelligence||2013||€ 100,000||€ 799,000<br />
|-<br />
| Dept. of Correction Thai Police ||Thailand||APAC||LEA||2013||€ 52,000||€ 286,482<br />
|-<br />
| SENAIN||Ecuador||LATAM||LEA||2013||€ 75,000||€ 535,000<br />
|-<br />
| DIPOL||Colombia||LATAM||LEA||2013||€ 35,000||€ 335,000<br />
|-<br />
| Guardia di Finanza||Italy||Europe||LEA||2013||€ 80,000||€ 400,000<br />
|-<br />
| Intelligence ||Cyprus||Europe||LEA||2013||€ 40,000||€ 375,625<br />
|-<br />
| Midworld Barhein||Bahrein||MEA||Intelligence||2013||||€ 210,000<br />
|-<br />
| Mexico - pemx||Mexico ||LATAM||LEA ||2013||||€ 321,120<br />
|-<br />
| Malysia K||Malaysia||APAC||LEA||2013||||€ 0<br />
|-<br />
| Honduras||Honduras||LATAM||LEA||2014||||€ 355,000<br />
|-<br />
| Mex Taumalipas||Mexico||LATAM||||2014||||€ 322,900<br />
|-<br />
| Sec. De Planeacion y Finanzas||Mexico||LATAM||LEA||2014||€ 91,000||€ 371,035<br />
|-<br />
| AREA ||Italia||Europe||||2014||||€ 430,000<br />
|-<br />
| Mexico Yucatan||Mexico||LATAM||LEA||2014||||€ 401,788<br />
|-<br />
| Mexico Durango||Mexico||LATAM||LEA||2014||||€ 421,397<br />
|-<br />
| DIE Chile||Chile||LATAM||LEA||2014||||€ 2,289,155<br />
|-<br />
| Jalisco Mexico||Mexico||LATAM||LEA||2014||||€ 748,003<br />
|-<br />
| Royal Thai Army||Thailand||APAC||LEA||2014||||€ 360,000<br />
|-<br />
| Vietnam GD5||Vietnam||APAC||||2014||||€ 281,170<br />
|-<br />
| Kantonspolizei Zurich||Switzerland||Europe||LEA||2014||||€ 486,500<br />
|-<br />
| Vietnam GD1||Vietnam||APAC||LEA||2015||||€ 543,810<br />
|-<br />
| Egypt TRD GNSE||Egypt||MEA||LEA||2015||||€ 137,500<br />
|-<br />
| Lebanon Army Forces||Lebanon||MEA||LEA||2015||||<br />
|-<br />
| Brasil PF||Brasil||LATAM||LEA||2015||||<br />
|}<br />
<br />
==Capabilities==<br />
Hacking Team enables clients to perform remote monitoring functions against citizens via their Remote Control Systems (RCS) including Da Vinci:<br />
<br />
*Covert collection of emails, text message, phone call history and address books<br />
*[[Keystroke logging]]<br />
*Uncover search history data and take screenshots<br />
*record audio from phone calls <br />
*Use phones to collect ambient noise and conversations<br />
*Activate phone or computer cameras <br />
*Hijack telephone GPS systems to monitor target's location<br />
<br />
Hacking team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.<ref>{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}</ref><ref>{{Cite web|title = Hacking Team Tools Allow Governments To Take Full Control of Your Smartphone|url = http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|accessdate = 2015-07-06}}</ref><br />
<br />
==See also==<br />
*[[FinFisher]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Computer security software]]<br />
[[Category:Spyware]]<br />
[[Category:Surveillance]]<br />
[[Category:Trojan horses]]<br />
[[Category:Espionage techniques]]<br />
[[Category:Espionage devices]]<br />
[[Category:Malware toolkits]]<br />
[[Category:Computer access control]]<br />
[[Category:Cyberwarfare]]<br />
[[Category:Espionage scandals and incidents]]<br />
[[Category:Companies based in Milan]]</div>MorpheusKafkahttps://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174781HackingTeam2015-07-09T00:27:59Z<p>MorpheusKafka: fixed CS1 error: missing = sign (thanks to refbot for tellingme)</p>
<hr />
<div>'''Hacking Team''' is a [[Milan]]-based IT company that sells offensive intrusion and surveillance capabilities to governments and law enforcement agencies. Its remote control systems enable governments to monitor the communications of internet users, decipher their encrypted files and emails, record [[Skype]] and other Voice over IP communications, and remotely activate microphones and camera on target computers.<ref>{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}</ref> The company has been criticized for providing these capabilities to governments with poor human rights records.<ref>{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's "Untraceable" Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}</ref> Hacking Team states that they have the ability to disable their software if it is used unethically.<ref>{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}</ref><br />
<br />
In June 2014, a report from the University of Toronto detailed the functionality and architecture of Hacking Team’s Remote Control System (RCS) software and operator tradecraft.<ref>{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}</ref><br />
<br />
Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]] and [[Singapore]]. Its products are in use in dozens of countries across six continents.<ref name=Jeffries>{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}</ref><br />
<br />
==Company history==<br />
Hacking Team was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br />
<br />
The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. Hacking Team was born, and became "the first sellers of commercial hacking software to the police."<ref name=Jeffries/><br />
<br />
=== 2015 hacking ===<br />
<br />
On July 5, 2015, the Twitter account of the company was compromised, and over 400 GB of data, including alleged internal e-mails, invoices, and source code were leaked via [[BitTorrent]].<ref>{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}</ref> An announcement of the hack, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.<ref>{{Twitter status|wikileaks|617865712611233792|Inside malware makers "Hacking Team": hundreds of Gb of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}</ref><ref name="ibtimes.co.uk">{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}</ref><br />
<br />
Although the material was voluminous, early analysis of the hacked material appeared to reveal that Hacking Team had invoiced the Lebanese Army<ref>{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}}</ref> and [[Sudan]] and that spy tools were also sold to Bahrain and Kazakhstan.<ref name="ibtimes.co.uk"/> Hacking Team had previously claimed they had never done business with Sudan.<ref>{{Cite web|title = Hacking Team hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}</ref><br />
<br />
The leaked data revealed a zero-day cross-platform Flash exploit (CVE number CVE-2015-5119).<ref>{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}</ref> The dump included a demo of this hack by opening [[Calculator (computer program)|Calculator]] from a test webpage.<ref>{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'Hacking Team' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}</ref><ref>{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in Hacking Team Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}</ref> Adobe plans to patch the hole on July 8, 2015.<ref>{{Cite web|title = Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|accessdate = 2015-07-08|last = Adobe Systems (corporate author)}}</ref> Another vulnerability involving Adobe was revealed in the dumps, but this takes advantage of a buffer overflow attack on an Adobe Open Type Manager DLL included with Microsoft Windows. The DLL is run in the kernel mode, so the attack can preform privilege escalation to bypass the sandbox.<ref>{{Cite web|title = A Look at the Open Type Font Manager Vulnerability from the Hacking Team Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29|accessdate = 2015-07-08|first = Jack|last = Tang}}</ref><br />
<br />
It was also revealed in the dumps that the Hacking Team used insecure passwords, including 'P4ssword', 'wolverine', and 'universo'.<ref>{{Cite web|title = Hacking Team used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}</ref><br />
<br />
After a few hours without response from Hacking Team, member Christian Pozzi tweeted that the company was working closely with police and that "what the attackers are claiming regarding our company is not true."<ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}</ref><ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}</ref> He also claimed that the torrented material "contains a virus" and that it constituted "false info".<ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}</ref> Shortly after these tweets, Pozzi's Twitter account itself was apparently hacked.<ref>{{Cite web|title = Christian Pozzi on Twitter: "Uh Oh - my twitter account was also hacked."|url = https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512|date = 2015-07-06|accessdate = 2015-07-06}}</ref><br />
<br />
Responsibility for this attack was claimed by the hacker known as Phineas Fisher on Twitter.<ref>{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}</ref> Phineas has previously attacked spyware manufacturer Gamma, which also sells spyware to governments.<ref>{{Cite web|title = Hacking Team: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}</ref><br />
<br />
==Capabilities==<br />
Hacking Team enables clients to perform remote monitoring functions against citizens via their Remote Control Systems (RCS) including Da Vinci:<br />
<br />
*Covert collection of emails, text message, phone call history and address books<br />
*[[Keystroke logging]]<br />
*Uncover search history data and take screenshots<br />
*record audio from phone calls <br />
*Use phones to collect ambient noise and conversations<br />
*Activate phone or computer cameras <br />
*Hijack telephone GPS systems to monitor target's location<br />
<br />
Hacking team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.<ref>{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}</ref><ref>{{Cite web|title = Hacking Team Tools Allow Governments To Take Full Control of Your Smartphone|url = http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|accessdate = 2015-07-06}}</ref><br />
<br />
==See also==<br />
*[[FinFisher]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Computer security software]]<br />
[[Category:Spyware]]<br />
[[Category:Surveillance]]<br />
[[Category:Trojan horses]]<br />
[[Category:Espionage techniques]]<br />
[[Category:Espionage devices]]<br />
[[Category:Malware toolkits]]<br />
[[Category:Computer access control]]<br />
[[Category:Cyberwarfare]]<br />
[[Category:Espionage scandals and incidents]]<br />
[[Category:Companies based in Milan]]</div>MorpheusKafkahttps://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174779HackingTeam2015-07-08T20:47:13Z<p>MorpheusKafka: /* 2015 hacking */ ATMFD.dll exploit</p>
<hr />
<div>'''Hacking Team''' is a [[Milan]]-based IT company that sells offensive intrusion and surveillance capabilities to governments and law enforcement agencies. Its remote control systems enable governments to monitor the communications of internet users, decipher their encrypted files and emails, record [[Skype]] and other Voice over IP communications, and remotely activate microphones and camera on target computers.<ref>{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}</ref> The company has been criticized for providing these capabilities to governments with poor human rights records.<ref>{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's "Untraceable" Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}</ref> Hacking Team states that they have the ability to disable their software if it is used unethically.<ref>{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}</ref><br />
<br />
In June 2014, a report from the University of Toronto detailed the functionality and architecture of Hacking Team’s Remote Control System (RCS) software and operator tradecraft.<ref>{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}</ref><br />
<br />
Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]] and [[Singapore]]. Its products are in use in dozens of countries across six continents.<ref name=Jeffries>{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}</ref><br />
<br />
==Company history==<br />
Hacking Team was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br />
<br />
The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. Hacking Team was born, and became "the first sellers of commercial hacking software to the police."<ref name=Jeffries/><br />
<br />
=== 2015 hacking ===<br />
<br />
On July 5, 2015, the Twitter account of the company was compromised, and over 400 GB of data, including alleged internal e-mails, invoices, and source code were leaked via [[BitTorrent]].<ref>{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}</ref> An announcement of the hack, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.<ref>{{Twitter status|wikileaks|617865712611233792|Inside malware makers "Hacking Team": hundreds of Gb of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}</ref><ref name="ibtimes.co.uk">{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}</ref><br />
<br />
Although the material was voluminous, early analysis of the hacked material appeared to reveal that Hacking Team had invoiced the Lebanese Army<ref>{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}}</ref> and [[Sudan]] and that spy tools were also sold to Bahrain and Kazakhstan.<ref name="ibtimes.co.uk"/> Hacking Team had previously claimed they had never done business with Sudan.<ref>{{Cite web|title = Hacking Team hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}</ref><br />
<br />
The leaked data revealed a zero-day cross-platform Flash exploit (CVE number CVE-2015-5119).<ref>{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}</ref> The dump included a demo of this hack by opening [[Calculator (computer program)|Calculator]] from a test webpage.<ref>{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'Hacking Team' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}</ref><ref>{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in Hacking Team Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}</ref> Adobe plans to patch the hole on July 8, 2015.<ref>{{Cite web|title Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|accessdate = 2015-07-08|last = Adobe Systems (corporate author)}}</ref> Another vulnerability involving Adobe was revealed in the dumps, but this takes advantage of a buffer overflow attack on an Adobe Open Type Manager DLL included with Microsoft Windows. The DLL is run in the kernel mode, so the attack can preform privilege escalation to bypasss the sandbox.<ref>{{Cite web|title = A Look at the Open Type Font Manager Vulnerability from the Hacking Team Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29|accessdate = 2015-07-08|first = Jack|last = Tang}}</ref><br />
<br />
It was also revealed in the dumps that the Hacking Team used insecure passwords, including 'P4ssword', 'wolverine', and 'universo'.<ref>{{Cite web|title = Hacking Team used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}</ref><br />
<br />
After a few hours without response from Hacking Team, member Christian Pozzi tweeted that the company was working closely with police and that "what the attackers are claiming regarding our company is not true."<ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}</ref><ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}</ref> He also claimed that the torrented material "contains a virus" and that it constituted "false info".<ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}</ref> Shortly after these tweets, Pozzi's Twitter account itself was apparently hacked.<ref>{{Cite web|title = Christian Pozzi on Twitter: "Uh Oh - my twitter account was also hacked."|url = https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512|date = 2015-07-06|accessdate = 2015-07-06}}</ref><br />
<br />
Responsibility for this attack was claimed by the hacker known as Phineas Fisher on Twitter.<ref>{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}</ref> Phineas has previously attacked spyware manufacturer Gamma, which also sells spyware to governments.<ref>{{Cite web|title = Hacking Team: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}</ref><br />
<br />
==Capabilities==<br />
Hacking Team enables clients to perform remote monitoring functions against citizens via their Remote Control Systems (RCS) including Da Vinci:<br />
<br />
*Covert collection of emails, text message, phone call history and address books<br />
*[[Keystroke logging]]<br />
*Uncover search history data and take screenshots<br />
*record audio from phone calls <br />
*Use phones to collect ambient noise and conversations<br />
*Activate phone or computer cameras <br />
*Hijack telephone GPS systems to monitor target's location<br />
<br />
Hacking team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.<ref>{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}</ref><ref>{{Cite web|title = Hacking Team Tools Allow Governments To Take Full Control of Your Smartphone|url = http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|accessdate = 2015-07-06}}</ref><br />
<br />
==See also==<br />
*[[FinFisher]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Computer security software]]<br />
[[Category:Spyware]]<br />
[[Category:Surveillance]]<br />
[[Category:Trojan horses]]<br />
[[Category:Espionage techniques]]<br />
[[Category:Espionage devices]]<br />
[[Category:Malware toolkits]]<br />
[[Category:Computer access control]]<br />
[[Category:Cyberwarfare]]<br />
[[Category:Espionage scandals and incidents]]<br />
[[Category:Companies based in Milan]]</div>MorpheusKafkahttps://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174778HackingTeam2015-07-08T20:33:08Z<p>MorpheusKafka: /* 2015 hacking */ minor grammar cleanup</p>
<hr />
<div>'''Hacking Team''' is a [[Milan]]-based IT company that sells offensive intrusion and surveillance capabilities to governments and law enforcement agencies. Its remote control systems enable governments to monitor the communications of internet users, decipher their encrypted files and emails, record [[Skype]] and other Voice over IP communications, and remotely activate microphones and camera on target computers.<ref>{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}</ref> The company has been criticized for providing these capabilities to governments with poor human rights records.<ref>{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's "Untraceable" Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}</ref> Hacking Team states that they have the ability to disable their software if it is used unethically.<ref>{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}</ref><br />
<br />
In June 2014, a report from the University of Toronto detailed the functionality and architecture of Hacking Team’s Remote Control System (RCS) software and operator tradecraft.<ref>{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}</ref><br />
<br />
Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]] and [[Singapore]]. Its products are in use in dozens of countries across six continents.<ref name=Jeffries>{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}</ref><br />
<br />
==Company history==<br />
Hacking Team was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br />
<br />
The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. Hacking Team was born, and became "the first sellers of commercial hacking software to the police."<ref name=Jeffries/><br />
<br />
=== 2015 hacking ===<br />
<br />
On July 5, 2015, the Twitter account of the company was compromised, and over 400 GB of data, including alleged internal e-mails, invoices, and source code were leaked via [[BitTorrent]].<ref>{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}</ref> An announcement of the hack, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.<ref>{{Twitter status|wikileaks|617865712611233792|Inside malware makers "Hacking Team": hundreds of Gb of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}</ref><ref name="ibtimes.co.uk">{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}</ref><br />
<br />
Although the material was voluminous, early analysis of the hacked material appeared to reveal that Hacking Team had invoiced the Lebanese Army<ref>{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}}</ref> and [[Sudan]] and that spy tools were also sold to Bahrain and Kazakhstan.<ref name="ibtimes.co.uk"/> Hacking Team had previously claimed they had never done business with Sudan.<ref>{{Cite web|title = Hacking Team hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}</ref><br />
<br />
The leaked data revealed a zero-day Flash exploit (CVE number CVE-2015-5119).<ref>{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}</ref> The dump included a demo of this hack by opening [[Calculator (computer program)|Calculator]] from a test webpage.<ref>{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'Hacking Team' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}</ref><ref>{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in Hacking Team Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}</ref> Adobe plans to patch the hole on July 8, 2015.<ref>{{Cite web|title Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|accessdate = 2015-07-08|last = Adobe Systems (corporate author)}}</ref><br />
<br />
It was also revealed in the dumps that the Hacking Team used insecure passwords, including 'P4ssword', 'wolverine', and 'universo'.<ref>{{Cite web|title = Hacking Team used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}</ref><br />
<br />
After a few hours without response from Hacking Team, member Christian Pozzi tweeted that the company was working closely with police and that "what the attackers are claiming regarding our company is not true."<ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}</ref><ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}</ref> He also claimed that the torrented material "contains a virus" and that it constituted "false info".<ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}</ref> Shortly after these tweets, Pozzi's Twitter account itself was apparently hacked.<ref>{{Cite web|title = Christian Pozzi on Twitter: "Uh Oh - my twitter account was also hacked."|url = https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512|date = 2015-07-06|accessdate = 2015-07-06}}</ref><br />
<br />
Responsibility for this attack was claimed by the hacker known as Phineas Fisher on Twitter.<ref>{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}</ref> Phineas has previously attacked spyware manufacturer Gamma, which also sells spyware to governments.<ref>{{Cite web|title = Hacking Team: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}</ref><br />
<br />
==Capabilities==<br />
Hacking Team enables clients to perform remote monitoring functions against citizens via their Remote Control Systems (RCS) including Da Vinci:<br />
<br />
*Covert collection of emails, text message, phone call history and address books<br />
*[[Keystroke logging]]<br />
*Uncover search history data and take screenshots<br />
*record audio from phone calls <br />
*Use phones to collect ambient noise and conversations<br />
*Activate phone or computer cameras <br />
*Hijack telephone GPS systems to monitor target's location<br />
<br />
Hacking team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.<ref>{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}</ref><ref>{{Cite web|title = Hacking Team Tools Allow Governments To Take Full Control of Your Smartphone|url = http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|accessdate = 2015-07-06}}</ref><br />
<br />
==See also==<br />
*[[FinFisher]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Computer security software]]<br />
[[Category:Spyware]]<br />
[[Category:Surveillance]]<br />
[[Category:Trojan horses]]<br />
[[Category:Espionage techniques]]<br />
[[Category:Espionage devices]]<br />
[[Category:Malware toolkits]]<br />
[[Category:Computer access control]]<br />
[[Category:Cyberwarfare]]<br />
[[Category:Espionage scandals and incidents]]<br />
[[Category:Companies based in Milan]]</div>MorpheusKafkahttps://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174777HackingTeam2015-07-08T20:32:22Z<p>MorpheusKafka: /* 2015 hacking */ flash patch date && calculator proof (sorry, forgot to cite trend micro)</p>
<hr />
<div>'''Hacking Team''' is a [[Milan]]-based IT company that sells offensive intrusion and surveillance capabilities to governments and law enforcement agencies. Its remote control systems enable governments to monitor the communications of internet users, decipher their encrypted files and emails, record [[Skype]] and other Voice over IP communications, and remotely activate microphones and camera on target computers.<ref>{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}</ref> The company has been criticized for providing these capabilities to governments with poor human rights records.<ref>{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's "Untraceable" Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}</ref> Hacking Team states that they have the ability to disable their software if it is used unethically.<ref>{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}</ref><br />
<br />
In June 2014, a report from the University of Toronto detailed the functionality and architecture of Hacking Team’s Remote Control System (RCS) software and operator tradecraft.<ref>{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}</ref><br />
<br />
Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]] and [[Singapore]]. Its products are in use in dozens of countries across six continents.<ref name=Jeffries>{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}</ref><br />
<br />
==Company history==<br />
Hacking Team was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br />
<br />
The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. Hacking Team was born, and became "the first sellers of commercial hacking software to the police."<ref name=Jeffries/><br />
<br />
=== 2015 hacking ===<br />
<br />
On July 5, 2015, the Twitter account of the company was compromised, and over 400 GB of data, including alleged internal e-mails, invoices, and source code were leaked via [[BitTorrent]].<ref>{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}</ref> An announcement of the hack, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.<ref>{{Twitter status|wikileaks|617865712611233792|Inside malware makers "Hacking Team": hundreds of Gb of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}</ref><ref name="ibtimes.co.uk">{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}</ref><br />
<br />
Although the material was voluminous, early analysis of the hacked material appeared to reveal that Hacking Team had invoiced the Lebanese Army<ref>{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}}</ref> and [[Sudan]] and that spy tools were also sold to Bahrain and Kazakhstan.<ref name="ibtimes.co.uk"/> Hacking Team had previously claimed they had never done business with Sudan.<ref>{{Cite web|title = Hacking Team hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}</ref><br />
<br />
The leaked data revealed a zero-day Flash exploit has CVE number CVE-2015-5119.<ref>{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}</ref> The dump included a demo of this hack by opening [[Calculator (computer program)|Calculator]] from a test webpage.<ref>{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'Hacking Team' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}</ref><ref>{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in Hacking Team Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}</ref> Adobe plans to patch the hole on July 8, 2015.<ref>{{Cite web|title Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|accessdate = 2015-07-08|last = Adobe Systems (corporate author)}}</ref><br />
<br />
It was also revealed in the dumps that the Hacking Team used insecure passwords, including 'P4ssword', 'wolverine', and 'universo'.<ref>{{Cite web|title = Hacking Team used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}</ref><br />
<br />
After a few hours without response from Hacking Team, member Christian Pozzi tweeted that the company was working closely with police and that "what the attackers are claiming regarding our company is not true."<ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}</ref><ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}</ref> He also claimed that the torrented material "contains a virus" and that it constituted "false info".<ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}</ref> Shortly after these tweets, Pozzi's Twitter account itself was apparently hacked.<ref>{{Cite web|title = Christian Pozzi on Twitter: "Uh Oh - my twitter account was also hacked."|url = https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512|date = 2015-07-06|accessdate = 2015-07-06}}</ref><br />
<br />
Responsibility for this attack was claimed by the hacker known as Phineas Fisher on Twitter.<ref>{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}</ref> Phineas has previously attacked spyware manufacturer Gamma, which also sells spyware to governments.<ref>{{Cite web|title = Hacking Team: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}</ref><br />
<br />
==Capabilities==<br />
Hacking Team enables clients to perform remote monitoring functions against citizens via their Remote Control Systems (RCS) including Da Vinci:<br />
<br />
*Covert collection of emails, text message, phone call history and address books<br />
*[[Keystroke logging]]<br />
*Uncover search history data and take screenshots<br />
*record audio from phone calls <br />
*Use phones to collect ambient noise and conversations<br />
*Activate phone or computer cameras <br />
*Hijack telephone GPS systems to monitor target's location<br />
<br />
Hacking team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.<ref>{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}</ref><ref>{{Cite web|title = Hacking Team Tools Allow Governments To Take Full Control of Your Smartphone|url = http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|accessdate = 2015-07-06}}</ref><br />
<br />
==See also==<br />
*[[FinFisher]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Computer security software]]<br />
[[Category:Spyware]]<br />
[[Category:Surveillance]]<br />
[[Category:Trojan horses]]<br />
[[Category:Espionage techniques]]<br />
[[Category:Espionage devices]]<br />
[[Category:Malware toolkits]]<br />
[[Category:Computer access control]]<br />
[[Category:Cyberwarfare]]<br />
[[Category:Espionage scandals and incidents]]<br />
[[Category:Companies based in Milan]]</div>MorpheusKafkahttps://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174769HackingTeam2015-07-07T20:07:15Z<p>MorpheusKafka: /* Hacking Team is itself hacked */ renamed section (unencyclopedic title) && added flash exploit && hackers name && bad passowrds</p>
<hr />
<div>'''Hacking Team''' is a [[Milan]]-based IT company that sells offensive intrusion and surveillance capabilities to governments and law enforcement agencies. Its remote control systems enable governments to monitor the communications of internet users, decipher their encrypted files and emails, record [[Skype]] and other Voice over IP communications, and remotely activate microphones and camera on target computers.<ref>{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}</ref> The company has been criticized for providing these capabilities to governments with poor human rights records.<ref>{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's "Untraceable" Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}</ref> Hacking Team states that they have the ability to disable their software if it is used unethically.<ref>{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}</ref><br />
<br />
In June 2014, a report from the University of Toronto detailed the functionality and architecture of Hacking Team’s Remote Control System (RCS) software and operator tradecraft.<ref>{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}</ref><br />
<br />
Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]] and [[Singapore]]. Its products are in use in dozens of countries across six continents.<ref name=Jeffries>{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}</ref><br />
<br />
==Company history==<br />
Hacking Team was started by two Italian programmers, Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could be used for monitoring and remotely manipulating target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br />
<br />
The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their skype calls, the police contacted Ornaghi and Valleri and asked them for help modifying the program for these purposes. Hacking Team was born, and became "the first sellers of commercial hacking software to the police."<ref name=Jeffries/><br />
<br />
=== 2015 hacking ===<br />
<br />
On July 5, 2015, the Twitter account of the company was compromised, and over 400 GB of data, including alleged internal e-mails, invoices, and source code were leaked via [[BitTorrent]].<ref>{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}</ref> An announcement of the hack, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.<ref>{{Twitter status|wikileaks|617865712611233792|Inside malware makers "Hacking Team": hundreds of Gb of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}</ref><ref name="ibtimes.co.uk">{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}</ref><br />
<br />
Although the material was voluminous, early analysis of the hacked material appeared to reveal that Hacking Team had invoiced the Lebanese Army<ref>{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}}</ref> and [[Sudan]] and that spy tools were also sold to Bahrain and Kazakhstan.<ref name="ibtimes.co.uk"/> Hacking Team had previously claimed they had never done business with Sudan.<ref>{{Cite web|title = Hacking Team hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}</ref><br />
<br />
The leaked data revealed a zero-day Flash exploit that has yet to be assigned a CVE number. The dump included a demo of this hack by opening Calculator from a test webpage.<ref>{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'Hacking Team' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}</ref><br />
<br />
It was also revealed in the dumps that the Hacking Team used insecure passwords, including 'P4ssword', 'wolverine', and 'universo'.<ref>{{Cite web|title = Hacking Team used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}</ref><br />
<br />
After a few hours without response from Hacking Team, member Christian Pozzi tweeted that the company was working closely with police and that "what the attackers are claiming regarding our company is not true."<ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}</ref><ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}</ref> He also claimed that the torrented material "contains a virus" and that it constituted "false info".<ref>{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}</ref> Shortly after these tweets, Pozzi's Twitter account itself was apparently hacked.<ref>{{Cite web|title = Christian Pozzi on Twitter: "Uh Oh - my twitter account was also hacked."|url = https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512|date = 2015-07-06|accessdate = 2015-07-06}}</ref><br />
<br />
Responsibility for this attack was claimed by the hacker known as Phineas Fisher on Twitter. Phineas has previously attacked spyware manufacturer Gamma, which also sells spyware to governments.<ref>{{Cite web|title = Hacking Team: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}</ref><br />
<br />
==Capabilities==<br />
Hacking Team enables clients to perform remote monitoring functions against citizens via their Remote Control Systems (RCS) including Da Vinci:<br />
<br />
*Covert collection of emails, text message, phone call history and address books<br />
*[[Keystroke logging]]<br />
*Uncover search history data and take screenshots<br />
*record audio from phone calls <br />
*Use phones to collect ambient noise and conversations<br />
*Activate phone or computer cameras <br />
*Hijack telephone GPS systems to monitor target's location<br />
<br />
Hacking team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.<ref>{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}</ref><ref>{{Cite web|title = Hacking Team Tools Allow Governments To Take Full Control of Your Smartphone|url = http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|accessdate = 2015-07-06}}</ref><br />
<br />
==See also==<br />
*[[FinFisher]]<br />
<br />
==References==<br />
{{reflist}}<br />
<br />
[[Category:Computer security software]]<br />
[[Category:Spyware]]<br />
[[Category:Surveillance]]<br />
[[Category:Trojan horses]]<br />
[[Category:Espionage techniques]]<br />
[[Category:Espionage devices]]<br />
[[Category:Malware toolkits]]<br />
[[Category:Computer access control]]<br />
[[Category:Cyberwarfare]]<br />
[[Category:Espionage scandals and incidents]]<br />
[[Category:Companies based in Milan]]</div>MorpheusKafka