Il Blog di Michele Pinassi – Telegram
Il Blog di Michele Pinassi
312 subscribers
371 photos
17 videos
119 files
8.3K links
Parliamo di tecnologia, politica e cybersecurity.

Post automatici e rassegna personale.
Download Telegram
Analisi di phishing adattivo. Spoofing e esfiltrazione tramite Telegram
L’analisi tecnica evidenzia l’uso combinato di due tecniche semplici ma efficaci. Spoofing del dominio mittente e allegato HTML attivo per la sottrazione di credenziali. Nel campione analizzato, l’allegato simula una pagina di autenticazione e tenta di inviare le credenziali a un canale controllato dall’attaccante tramite la Telegram Bot API.

by CERT-AgID - https://r.zerozone.it/post/0MD82MwUcj3VPaYu1
A.T.I di Zuinisi srl
Ransomware group called nightspire claims attack for A.T.I di Zuinisi srl. The target comes from Italy. We identify this attack with following hash code: 8ade252e9bfac8db02a378d54c8693266ffa0fe2d0057aef29a446d385bfb6b4 (ID: 29740)Target victim website: www.ati-italia.com/en

by RansomFeed - https://r.zerozone.it/post/T5K9e97Sgk6bae7Ax
Bitgo
Ransomware group called incransom claims attack for Bitgo. The target comes from Italy. We identify this attack with following hash code: d31d2ea544289a35137409747e887dc7afc2a7c79470e9c3337f027d0798b70e (ID: 29747)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/ebAffsX3NghGHJY1b
iSMA CONTROLLI
Ransomware group called akira claims attack for iSMA CONTROLLI. The target comes from Italy. We identify this attack with following hash code: e361609153c96d24498441a710bf54b4be7a4c96eede7394b36094cde4bf83ce (ID: 29770)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/WgTKng0pkH45DBuX4
wiproferretto.com
Ransomware group called dragonforce claims attack for wiproferretto.com. The target comes from Italy. We identify this attack with following hash code: 7babb3e57a9a668c0ccec4a46ffa1526a904066f7f0f21757bf519e2984ef137 (ID: 29767)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/yFFb79SuFRvQUx26W
Icat Food SpA
Ransomware group called akira claims attack for Icat Food SpA. The target comes from Italy. We identify this attack with following hash code: 88ba18df286775760c2a953ce5fb41d3432090c7c7a778f10ff161834b936207 (ID: 29763)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/DwUefCq4qPsp3V7D8
Casartigiani
Ransomware group called qilin claims attack for Casartigiani. The target comes from Italy. We identify this attack with following hash code: eae870f7617b614731ea48d46b76a601dda7dc44a65a9012e0d03104e74a504a (ID: 29773)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/yWujqzn22W4XzB0p8
Può sembrare strano, ma i programmatori COBOL sono particolarmente ricercati: ancora moltissimi applicativi, soprattutto in ambito bancario, girano sotto questo linguaggio di programmazione degli anni 60.
Ooops! 😅
Elgon Cosmetic
Ransomware group called spacebears claims attack for Elgon Cosmetic. The target comes from Italy. We identify this attack with following hash code: a7492b060eb0df7e329487a95ff37ba0b846e16f5bdb7a244b41c9c827f77b1c (ID: 29827)Target victim website: elgoncosmetic.com

by RansomFeed - https://r.zerozone.it/post/zyP2Tur2DvA1nFVVt
femar.it
Ransomware group called tengu claims attack for femar.it. The target comes from Italy. We identify this attack with following hash code: 1f56d69a2e8edbde779f5637b7e8ed2202eb7750262d367dd2147ec0f6c1b15e (ID: 29820)Target victim website: femar.it

by RansomFeed - https://r.zerozone.it/post/rQ8BeKzdjM6279qF2