Il Blog di Michele Pinassi
307 subscribers
380 photos
17 videos
120 files
8.46K links
Parliamo di tecnologia, politica e cybersecurity.

Post automatici e rassegna personale.
Download Telegram
Studio Marchi - Studio Professionale Associato
Ransomware group called everest claims attack for Studio Marchi - Studio Professionale Associato. The target comes from Italy. We identify this attack with following hash code: f2c5eab48776082c6a02ecb4457b59aa5b58cbc71d0f6528e6e1a690f3eba40b (ID: 31949)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/dnykPhxs7DQgKXc4u
zonaovest.to.it
Ransomware group called safepay claims attack for zonaovest.to.it. The target comes from Italy. We identify this attack with following hash code: d5fb10384e45f3cd060e416728b5d288d05c5f3ba7b9be8af51b739ffdff3274 (ID: 31944)Target victim website: zonaovest.to.it

by RansomFeed - https://r.zerozone.it/post/E7GHxb1df5D9afdZh
SIT Group / Robusta
Ransomware group called medusalocker claims attack for SIT Group / Robusta. The target comes from Italy. We identify this attack with following hash code: 2e34ff1f53bc7984f0e78bb211bc6aa133222fd404cabb87f56cd68f7d6b210e (ID: 31978)Target victim website: sitgroup.it

by RansomFeed - https://r.zerozone.it/post/cqwuzDCX9udw2EbkV
Mediaplex
Ransomware group called thegentlemen claims attack for Mediaplex. The target comes from Italy. We identify this attack with following hash code: e75343218a679c1c9b882d8074a5b80d2716f0d25632c3a9dce42931eea8760c (ID: 32009)Target victim website: mediaplexcnc.com

by RansomFeed - https://r.zerozone.it/post/Mq7WJ0xgtdFDQaPXK
Media Consulting
Ransomware group called thegentlemen claims attack for Media Consulting. The target comes from Italy. We identify this attack with following hash code: b3b0565cbdc7b500c30dfe5c7ab723a620efeee78396220444d3f36b6a3c0e51 (ID: 32020)Target victim website: mconweb.it

by RansomFeed - https://r.zerozone.it/post/20a1MpcVb8kxgtYNR
...e poi c'è chi aggiorna il firmware del coltello da cucina...
Complastex.com
Ransomware group called qilin claims attack for Complastex.com. The target comes from Italy. We identify this attack with following hash code: a4f0209b6b59e00e9c3b6dc45b499f7cc9145998f243c2b387f07e41e5cf9d15 (ID: 32059)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/DCQEcGtdQcGu9fskh
DATAMATIC
Ransomware group called thegentlemen claims attack for DATAMATIC. The target comes from Italy. We identify this attack with following hash code: 2fefde65716548e65d31ba851382a47d396c145349b2a499abd1cc41e65c212c (ID: 32045)Target victim website: datamatic.it

by RansomFeed - https://r.zerozone.it/post/NTqjRCa9RCAfxMMJZ
soavegel.it
Ransomware group called safepay claims attack for soavegel.it. The target comes from Italy. We identify this attack with following hash code: b688810c86214ed300e842f81f0594428763d27b520a0dc1cc11f06873c47dd5 (ID: 32060)Target victim website: soavegel.it

by RansomFeed - https://r.zerozone.it/post/U0ZYnPB603MpHBm1f
Inox Market Service SpA
Ransomware group called qilin claims attack for Inox Market Service SpA. The target comes from Italy. We identify this attack with following hash code: 24ffc57334f58e8b1877dc7b85a3e26fa7844bb77dd2a0ec91e83f1d5cfeba14 (ID: 32056)Target victim website: N/D

by RansomFeed - https://r.zerozone.it/post/q2KD2En6ERMgHcJ5c
studioubertazzi.it
Ransomware group called safepay claims attack for studioubertazzi.it. The target comes from Italy. We identify this attack with following hash code: f674f31b197cb5f82b9efdc05d3885a563a1989283a23d81d6a738690ba9f573 (ID: 32062)Target victim website: studioubertazzi.it

by RansomFeed - https://r.zerozone.it/post/4WjBMTHcKmErXp7rt
IPE
Ransomware group called thegentlemen claims attack for IPE. The target comes from Italy. We identify this attack with following hash code: aab5463d309ca6c8ac5ef74480461d800019f2841d70747855b3424db4143d8f (ID: 32047)Target victim website: ipesrl.com

by RansomFeed - https://r.zerozone.it/post/7pXcn8ZQ2Mz4YM16v
Linux 内核提权 Dirty Frag
Linux Kernel 是当前服务器与云主机最广泛使用的开源操作系统内核,承载企业核心业务、容器底座、虚拟化平台等关键负载。其优势在于开源透明、社区维护活跃、生态完善,被绝大多数 Linux 发行版(Ubuntu、Red Hat Enterprise Linux、CentOS、Fedora、openSUSE 等)采用作为底层内核。 近期,Linux Kernel 中被披露存在一个名为 "Dirty Frag" 的本地权限提升漏洞。 该漏洞由内核中两个独立的页缓存写入漏洞组合而成: xfrm-ESP(esp4 / esp6)模块漏洞:影响范围自 2017 年起的内核版本(commit cac2661c53f3 之后),覆盖范围广,但在部分发行版(如 Ubuntu)受 AppArmor 策略限制无法直接触发 RxRPC(rxrpc)模块漏洞:无需命名空间权限即可触发,但 rxrpc 内核模块并非所有发行版默认加载。

by SeeBug - https://r.zerozone.it/post/Vxfcm2tz8VVusC7b5
Sintesi riepilogativa delle campagne malevole nella settimana del 2 – 8 maggio
In questa settimana, il CERT-AGID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento un totale di 116 campagne malevole, di cui 78 con obiettivi italiani e 38 generiche che hanno comunque interessato l’Italia, mettendo a disposizione dei suoi enti accreditati i relativi 854 indicatori di compromissione (IoC) individuati.

by CERT-AgID - https://r.zerozone.it/post/dQdYcBQqHwFRXSWPc