Advertisement
ArizonaMilitia

Download Hacking Team Torrent Database - Skip Stupid Surveys

Jul 6th, 2015
7,732
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.36 KB | None | 0 0
  1. Download Hacking Team Torrent Database
  2.  
  3. As you might already be aware the Italian ‘security’ company Hacking Team has been hacked and more than 400gb of data has been stolen. So you want to download a dump but you are not able to open a torrent file right?
  4.  
  5. You can use this magnet link to download torrent:
  6.  
  7. magnet:?xt=urn:btih:51603bff88e0a1b3bad3962614978929c9d26955&dn=Hacked%20Team&tr=udp%3A%2F%2Fcoppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2710%2Fannounce&tr=http%3A%2F%2Fmgtracker.org%3A2710%2Fannounce&tr=http%3A%2F%2Fbt.careland.com.cn%3A6969%2Fannounce&tr=udp%3A%2F%2Fopen.demonii.com%3A1337&tr=udp%3A%2F%2Fexodus.desync.com%3A6969&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969&tr=udp%3A%2F%2Ftracker.pomf.se&tr=udp%3A%2F%2Ftracker.blackunicorn.xyz%3A6969
  8.  
  9. http://securityzap.com/how-to-download-hacking-team-torrent-database/
  10.  
  11.  
  12.  
  13. Hacking Team responds to data breach, issues public threats and denials
  14.  
  15. MORE LIKE THIS
  16. hackingteam hacked logo
  17. Hacking Team hacked, attackers claim 400GB in dumped data
  18. godaddy license
  19. GoDaddy accounts vulnerable to social engineering and Photoshop
  20. Extreme Hacks to Be Paranoid About
  21. 10 terrifying extreme hacks
  22. on IDG Answers
  23. How to disable the Windows button on a Microsoft Surface tablet?
  24.  
  25. hackingteam hacked logo
  26. Credit: Steve Ragan / Twitter
  27. Hacking Team is awake, and the first order of business is to promote fear, uncertainty, and doubt
  28.  
  29. CSO | Jul 6, 2015 2:20 AM PT
  30. RELATED TOPICS
  31. Data Breach Vulnerabilities Network Security Hacktivism Cyber Attacks/Espionage Privacy
  32. On Sunday evening, someone hijacked the Hacking Team account on Twitter and used it to announce that the company known for developing hacking tools was itself a victim of a devastating hack.
  33.  
  34. Note: This story is a follow-up to the previous Hacking Team story. You should read both if you want to see things from the beginning.
  35.  
  36. The hackers released a 400GB Torrent file with internal documents, source code, and email communications to the public at large. As researchers started to examine the leaked documents, the story developed and the public got its first real look into the inner workings of an exploit development firm.
  37.  
  38. MORE ON CSO: 10 mistakes companies make after a data breach
  39. Hacking Team is an Italian company that sells intrusion and surveillance tools to governments and law enforcement agencies. However, their business has earned them a black mark from privacy and human rights organizations, as the company has been accused of selling tools and services to nations known for violent oppression.
  40.  
  41. hackingteam 010
  42. Reporters Without Borders has listed the company on its Enemies of the Internet index due largely to Hacking Teams' business practices and their primary surveillance tool Da Vinci.
  43.  
  44. Sunday evening, documents circulating online, and documents shared by @SynAckPwn with Salted Hash, have linked Hacking Team to Egypt, Lebanon, Ethiopia, and Sudan.
  45.  
  46. The link to Sudan is especially newsworthy as the company previously stated they've never done business with the nation. There is a UN arms embargo on the Sudan, which is covered by EU and UK law. If they were doing business with the Sudanese government, Hacking Team could be in hot water.
  47.  
  48.  
  49. amtrak derailment
  50. Business continuity and disaster recovery planning: The basics
  51. Good business continuity plans will keep your company up and running through interruptions of any kind:
  52. READ NOW
  53. In 2014, a Citizen Lab report revealed evidence that Hacking Team's RCS (Remote Control System) was being used by the Sudanese government, something the Italian company flat-out denied.
  54.  
  55. However, on Sunday a contract with Sudan, valued at 480,000 Euro, and dated July 2, 2012, was published as part of the 400GB cache. In addition, a maintenance list named Sudan as a customer, but one that was "not officially supported." Interestingly, Russia has the same designation.
  56.  
  57. -
  58.  
  59. hackingteam 011
  60. -
  61.  
  62. Along with Russia and Sudan, there were other customers exposed by the breach including:
  63.  
  64. Egypt, Ethiopia, Morocco, Nigeria, Chile, Colombia
  65.  
  66. Ecuador, Honduras, Mexico, Panama, United States
  67.  
  68. Azerbaijan, Kazakhstan, Malaysia, Mongolia, Singapore, South Korea
  69.  
  70. Thailand, Uzbekistan, Vietnam, Australia, Cyprus, Czech Republic
  71.  
  72. Germany, Hungary, Italy, Luxemburg, Poland, Spain
  73.  
  74. Switzerland, Bahrain, Oman, Saudi Arabia, UAE
  75.  
  76. POPULAR RESOURCES
  77.  
  78. WHITE PAPER
  79. A New Breed of BI: Self-Service Analytics That Your Business and IT Users Will Love
  80.  
  81. WHITE PAPER
  82. Cloud: Economics
  83. SEE ALL Go
  84. Newly published documents from the cache include invoices for services with Italian law enforcement, Oman, South Korea, UAE, Kazakhstan, Mongolia, Lebanon, Germany, Saudi Arabia, Mexico, Brazil, Singapore, Egypt, and Vietnam. The total value of the invoices is €4,324,350 Euro.
  85.  
  86. The hack went without comment for several hours, until members of Hacking Team woke on Monday morning. One of the company's staffers, Christian Pozzi, offered several comments on the breach, despite his statement that he couldn't comment.
  87.  
  88. "We are awake. The people responsible for this will be arrested. We are working with the police at the moment," Pozzi wrote.
  89.  
  90. "Don't believe everything you see. Most of what the attackers are claiming is simply not true...The attackers are spreading a lot of lies about our company that is simply not true. The torrent contains a virus..."
  91.  
  92. Pozzi took to Twitter to repeat the same message for the most part, the key points being that Hacking Team is working with law enforcement on this matter, that the massive torrent file has malware in it (it doesn't), customers are being notified, and that his company has done nothing illegal:
  93.  
  94. "... We simply provide custom software solutions tailored to our customers needs..."
  95.  
  96. [Pozzi either deleted or disabled his Twitter account. An archive is available here.]
  97.  
  98. It's also worth noting that he threatened security researchers with jail for discussing his poorly selected passwords, which were leaked as part of the 400GB cache. Additional details on that, including examples of the poorly crafted passwords that were exposed, can be found in the previous Hacking Team story.
  99.  
  100. YOU MIGHT ALSO LIKE
  101. threat detection intelligence alert
  102. How to use threat intel to boost mobile security
  103. full disclosure
  104. Hacked Opinions: Vulnerability disclosure – Dave Aitel
  105. gold bullion
  106. Securing the ‘Net – at what price?
  107. One new update is that a list of VPN logins was discovered in the cache, and like the other leaked VPN details, Hacking Team has assigned customers access to accounts in the U.S. and Europe, depending on their location. However, all of those accounts are burned, so they're of little value.
  108.  
  109. The Hacking Team hack is a developing story. Salted Hash will follow it, and provide updates as needed. Stay tuned.
  110.  
  111. Update 1: As this post was being added to the CMS, Christian Pozzi's Twitter account was hacked. It looks as if the hackers who targeted Hacking Team have started to go after the staff too. However, Pozzi's Twitter details, along with other social media accounts were part of the leaked Firefox password store.
  112.  
  113. -
  114.  
  115. hackingteam 017
  116.  
  117. -
  118.  
  119. Update 2: Readers have asked about additional countries under maintenance contract. The list below was leaked along with the rest of the Hacking Team cache on Sunday.
  120.  
  121. http://www.csoonline.com/article/2944333/data-breach/hacking-team-responds-to-data-breach-issues-public-threats-and-denials.html
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement