Netragard, a Hacking Team vendor, says the breach was a blessing in disguise In the aftermath of the Hacking Team incident, Netragard, a security firm in Acton, MA, called it a blessing in disguise after emails between the two companies were indexed and published by WikiLeaks.The Netragard core service is anti-hacking services, but they are perhaps better known for their Exploit Acquisition Program (EAP). Netragard, with their EAP, acts as a middleman for developers and researchers that want to be paid for their exploit work.In an email archived by WikiLeaks, Netragard CEO Adriel Desautels and Hacking Team’s Giancarlo Russo discussed the sale of a Flash exploit that worked against Internet Explorer, Firefox, and Chrome, on all supported versions of Windows.At one point Desautels asked: “Do you have PGP by the way? We really do need to encrypt these emails.” As it turns out, the request for PGP was somewhat prophetic. However, Netragard doesn’t see the email leak or the Hacking Team incident as a bad thing.Quite the opposite, as the tone of a recent blog post by the company makes it look as if they’re pleased it happened. In a blog post that starts by stating that the EAP was founded with ethics in mind, Netragard says that their rules for only dealing with buyers in the U.S. were altered to include Hacking Team.“In mid 2014 we modified those controls and made an exception when Hacking Team was introduced to us by a trusted US based partner. It was our mutual understanding that this buyer maintained the same code of ethics as our own. Unfortunately we were very, very wrong.“The breach of Hacking Team is a blessing in disguise. The breach exposed their customer list which contained a variety of questionable countries known for human rights violations.“Their customers are the very same customers that we’ve worked so hard to avoid. It goes without saying that our relationship with them is over and we’ve tightened our vendor vetting process.“The breach also exposed the one exploit that we sold them (as is evidenced by their leaked emails). Interestingly enough, that exposure makes us quite happy because it means that the exploit useless to Hacking Team’s questionable customers.”The post goes on to leverage the Hacking Team incident for political and business points, citing it as a perfect example for regulating the exploit marketplace. Though, in their own way, they do make a valid point:“…regulations should provide a framework for the legitimate sale of 0-day exploits…”Netragard is just one vendor in the email cache published by WikiLeaks, which now extends to more than one million Hacking Team communications.However, they’re the first vendor – or customer for that matter – to express glee in the incident and publicly distance themselves from the company.Perhaps more will follow? The full Hacking Team archive published by WikiLeaks is available on their website. Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe