Il Blog di Michele Pinassi – Telegram
Il Blog di Michele Pinassi
312 subscribers
371 photos
17 videos
119 files
8.3K links
Parliamo di tecnologia, politica e cybersecurity.

Post automatici e rassegna personale.
Download Telegram
Siem Srl
Ransomware group called spacebears claims attack for Siem Srl. The target comes from Italy. We identify this attack with following hash code: cbd02bda7b8740df6d4f61dc08d97324adf903536aafdc286e8669bc0212778f (ID: 29686)Target victim website: www.siem.it

by RansomFeed - https://r.zerozone.it/post/bAT1628SDbv4brecc
1
Analisi di phishing adattivo. Spoofing e esfiltrazione tramite Telegram
L’analisi tecnica evidenzia l’uso combinato di due tecniche semplici ma efficaci. Spoofing del dominio mittente e allegato HTML attivo per la sottrazione di credenziali. Nel campione analizzato, l’allegato simula una pagina di autenticazione e tenta di inviare le credenziali a un canale controllato dall’attaccante tramite la Telegram Bot API.

by CERT-AgID - https://r.zerozone.it/post/0MD82MwUcj3VPaYu1
A.T.I di Zuinisi srl
Ransomware group called nightspire claims attack for A.T.I di Zuinisi srl. The target comes from Italy. We identify this attack with following hash code: 8ade252e9bfac8db02a378d54c8693266ffa0fe2d0057aef29a446d385bfb6b4 (ID: 29740)Target victim website: www.ati-italia.com/en

by RansomFeed - https://r.zerozone.it/post/T5K9e97Sgk6bae7Ax
Bitgo
Ransomware group called incransom claims attack for Bitgo. The target comes from Italy. We identify this attack with following hash code: d31d2ea544289a35137409747e887dc7afc2a7c79470e9c3337f027d0798b70e (ID: 29747)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/ebAffsX3NghGHJY1b
iSMA CONTROLLI
Ransomware group called akira claims attack for iSMA CONTROLLI. The target comes from Italy. We identify this attack with following hash code: e361609153c96d24498441a710bf54b4be7a4c96eede7394b36094cde4bf83ce (ID: 29770)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/WgTKng0pkH45DBuX4
wiproferretto.com
Ransomware group called dragonforce claims attack for wiproferretto.com. The target comes from Italy. We identify this attack with following hash code: 7babb3e57a9a668c0ccec4a46ffa1526a904066f7f0f21757bf519e2984ef137 (ID: 29767)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/yFFb79SuFRvQUx26W
Icat Food SpA
Ransomware group called akira claims attack for Icat Food SpA. The target comes from Italy. We identify this attack with following hash code: 88ba18df286775760c2a953ce5fb41d3432090c7c7a778f10ff161834b936207 (ID: 29763)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/DwUefCq4qPsp3V7D8
Casartigiani
Ransomware group called qilin claims attack for Casartigiani. The target comes from Italy. We identify this attack with following hash code: eae870f7617b614731ea48d46b76a601dda7dc44a65a9012e0d03104e74a504a (ID: 29773)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/yWujqzn22W4XzB0p8
Può sembrare strano, ma i programmatori COBOL sono particolarmente ricercati: ancora moltissimi applicativi, soprattutto in ambito bancario, girano sotto questo linguaggio di programmazione degli anni 60.