Hacking Team RCS
Active
 
Backdoor, Trojan, Rootkit
2011
 
Windows, OS X, BlackBerry, Windows Mobile, Android, iOS
2008
 
101-500
TOP TARGETED COUNTRIES:
Russia, China, Italy, Vietnam, USA, Turkey, Iraq, Mexico, Germany, India
  • Bootable CD-ROM
  • USB drives
  • Direct hard disk infection
  • Social engineering
  • Exploits
  • Mobile infections through already infected PCs
  • USB cables
  • Surveillance
  • “Business-to-government” spyware
  • Can monitor any action performed using a personal computer/mobile device.
  • Modules for computers and mobile devices
  • Self-replication via USB flash drive
  • Infection of virtual VMware machines by copying itself into the autorun folder on the virtual drive
  • Ability to self-update
  • Samples are signed by legal authorities
  • local infections via USB cables while synchronizing mobile devices
  • Specific malicious implant for every concrete target
  • At least 39 Apple devices supported by the iOS mobile modules
  • Both jailbroken and non-jailbroken iPhones can be infected: an attacker can conduct a remote jailbreak through already infected computers
  • Activists
  • Journalists
  • Politicians
  • Criminal suspects
  • This program was developed by the Italian company HackingTeam and is intended for sale to government authorities in different countries.
The blog post and research paper are available at Securelist.com (blog post #1, blog post #2)