A security company has released a free tool to users who suspect they may be a victim of Hacking Team's exploit cache.
Hacking Team is a secretive Milan-based firm which specializes in the sale of surveillance tools, malware and exploits to governments, law enforcement and private firms worldwide. The firm hit the spotlight in recent times after becoming the victim of a cyberattack, in which a hacker walked away with over 400GB in stolen corporate data.
The investigation is yet to reveal who is responsible for the data breach -- although suspicions have turned towards the possibility of an insider job.
Among leaked financial reports, customer lists and service presentations, emails detailing zero-day exploits and proof-of-concept examples are being analyzed as researchers dig through the firm's stolen data. Software vendors are racing to patch previously unknown vulnerabilities in their systems.
In the meantime, users are left to wonder if they have been infected with Hacking Team malware, of which some tools are so virulent they stay on a system even after hard disk wipes and removals. Researchers at Rook Security have decided to remedy the lack, and so are offering a new, free tool which detects known Hacking Team exploits.
Dubbed Milano, the free tool looks for files associated with the recent Hacking Team breach through either a quick or deep system scan. In the tool's first form, a total of 93 Windows binaries have been analyzed, and 40 files have been highlighted as likely to be used for malicious use.
Additional files will be added as the 400GB cache scrutiny continues.
"These files have been analyzed by Rook Security, and have been deemed to have the highest likelihood of malicious use," the researchers said. "These files have been analyzed using dynamic, static, and manual analysis. We also compared these files against VirusTotal, Kaspersky Whitelisting, and PaloAlto Firewalls Wildfire. Hosts containing any of the files found in this list should be considered compromised."
At the same time, Facebook has updated its Osquery tool to detect and combat an OS X-based backdoor exploit used by Hacking Team. The social media giant said:
"Attackers continue to develop and deploy Mac OS X backdoors. We've seen this with Flashback, IceFog, Careto, Adwind/Unrecom, and most recently, HackingTeam.
The OS X-attacks pack has queries that identify known variants of malware, ranging from advanced persistent threats (APT) to adware and spyware. If a query in this pack produces results, it means a host in your Mac fleet is compromised with malware. This pack is high signal and should result in close to zero false positives."
In an interview with ZDNet, Hacking Team said it had no plans to "shrivel up and go away" after the debilitating attack.
Read on: Top picks
- How to access Wi-Fi anonymously from miles away
- How to take over the accounts of UK politicians using public Wi-Fi hacks
- Severe iOS bug prompts iCloud password theft
- Hacking Team: We won't 'shrivel up and go away' after cyberattack
- Army exoskeletons train soldiers to shoot
- Hackers control medical pumps to administer fatal doses