Posted on 04/26/2017 9:45:28 AM PDT by bigbob
Since FlexiSpy burnt their entire network driving us out, we think it's time for us to release our HowTo guide for aspiring hackers, about what we did, and how you can do it, too.
This is going out there to help people learn how to hack and how to defend themselves, as is traditional after these types of hacks.
There are lots of articles out there written by other talented hackers that would serve as excellent introductions, but we'd be remiss if we didn't include Phineas Fisher's articles, which are fantastic introductions [1][2][3]. They cover things like how to stay safe and many of the basics, including many techniques we used to compromise FlexiSpy/Vervata/etc. So read them and soak them up.
(Excerpt) Read more at pst.moe ...
The essence of it is this: This group targeted a company called Flexispy that provides what it considers to be "creepy stalkerware" that allows parents, spouses, employers, etc to eavesdrop on a computer, smartphone, or tablet. It does this by installing spyware that makes it possible to remotely intercept texts, emails, websites, phone calls, and even to turn on the microphone to listen-in on what is happening in a room without anyone knowing they are being monitored.
Whether this is moral or legal is a separate discussion - the hackers decided it was evil and thus targeted the company and it's IT resources, with devastating results as even a non-technical person can gather from this write-up. This includes not only trashing the company's website and servers but stealing and distributing the source code for their monitoring "spyware" products which of course is a violation of their intellectual property rights. And of course they have no regrets, in fact they conclude with a promise to to more.
Say what you will but these are smart and capable individuals - think of how they compare against those who are part of cyber espionage and exploitaton groups who are backed by governmental resources.
As the old saying goes, "invent a better lock and you will motivate a new breed of lock-picker".
It doesn’t interest me, and here’s why:
1. The Chinese hack and theft of federal OPM data. They got everything of mine, back to the day I graduated high school in 1970, including fingerprints.
2. The Yahoo hack and theft. There went the rest of it.
If the federal government could not protect it’s own sensitive information, and a private communications business of the day could not, the rest is a moot point.
Thank you for such a logical and coherent reply.
Ping 4 l8R
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.