Names | Remote Control System RCS Crisis | |
Category | Malware | |
Type | Backdoor, Info stealer | |
Description | The capabilities of Hacking Team's flagship product, the Remote Control System (RCS), include extracting files from a targeted device, intercepting emails and instant messaging, as well as remotely activating a device’s webcam and microphone. The company has been criticized for selling these capabilities to authoritarian governments – an allegation it has consistently denied. | |
Information | <https://www.virusbulletin.com/virusbulletin/2019/01/vb2018-paper-hacking-team-hacked-team/> <https://www.f-secure.com/documents/996508/1030745/callisto-group> <https://www.welivesecurity.com/2018/03/09/new-traces-hacking-team-wild/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.rcs> |
Last change to this tool card: 14 May 2020
Download this tool card in JSON format
Previous: Remote CMD/PowerShell terminal
Next: Remote Desktop PassView
Changed | Name | Country | Observed | ||
APT groups | |||||
DustSquad, Golden Falcon | 2014-2020 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |