Android Hacking Toolkit : The hacking Team
The underground software market has a tool named Galileo that can spy the devices running on iOS, Android, Windows Mobile , BlackBerry, as well as Mac and Windows PC .
The Italian Hacking Team reported about the release of Galileo.
Hackers from Italy, known as Hacking Team, which has been into the news a lot lately due to being hacked by a group of hackers announced the release of this spyware capable to hack smartphones running iOS, Android, Windows Phone and BlackBerry.
The developers also claimed that the tool is able to hack computers running Windows and OS X.
The FBI is aid to have spent $775K on Hacking Team’s Android Hacking Spy Tools since 2011 according to several spreadsheets within the hacked archive of the Hacking Team, which contain a list of Hacking Team’s customers.
These documents indicate that the FBI first purchased the company’s “RCS”, the Android Hacking Toolkit in 2011. RCS stands for “Remote Control Service,” otherwise known as “Galileo,” Hacking Team’s premiere spy product.
RCS is a simple piece of hacking software and has been used previously by the Ethiopian regime to target journalists based in Washington DC among various other attacks .
Further into the RCS aka Galileo begin to transmits voice and text messages, emails, files, web-surfing history to the hackers in “invisible” mode, and can also provide remote access to camera and microphone. Further, all the data are transmitted to a secure RCS-server.
According to hackers that hacked the hacking Team, it is said that the Hacking Team sell their software only to the government departments of developing countries as Mexico, Colombia, Kazakhstan, Uzbekistan, Morocco, Sudan, Malaysia, Ethiopia and many more .
For a long time its known that law enforcement and intelligence agencies worldwide use Hacking Team’s tools to spy on computer and mobile phone users—including, in some countries, to spy on political dissidents, journalists and human rights advocates.
This is however, the first time that the modules used in the spyware on mobile phone users have been uncovered in the wild and reverse-engineered .