company and expose them for involvement is something more severe than selling spying software.
Further exploration led to the identification of this damaging information. The significant data was found in an unsecured iSCSI server that contained backup VMware .vmdk files and other beneficial information. Eventually, administrative level password hashes were dumped from the backups. Many of the administrative password hashes were successfully cracked. These passwords allowed access to other systems including an email server. PowerShell was used to access and download current emails. More than 1 million emails were downloaded.
In total, Phineas Fisher was in the Hacking Team network for about six weeks and spent about hours moving and stealing data. The attack was primarily politically motivated.
This example is almost identical to that of a Red Team engagement.
An intelligent actor analyzed a target to determine the best path forward,
crafted a custom attack,
elevated privileges, identified information, and stole sensitive data.
Additional References.
How Hacking Team got hacked, http://arstechnica.com/security/2016/04/how- hacking-team-got-hacked-phineas-phisher/.
2. The Vigilante Who Hacked Hacking Team Explains How He Did It,
http://motherboard.vice.com/read/the-vigilante-who-hacked-hacking-team- explains-how-he-did-it.
Analyzing the TTPs described in the Hacking Team attack is a great way to understand how areal threat attacks a target. Analysis can be used to validate TTPs plans or to learn new techniques that can be applied to future engagements. Although this was an illegal attack against a company, it provided useful insights into how a threat thinks and acts.
A simple threat profile can be developed to provide a general description
of the threat using the