www.exploitone.com Open in urlscan Pro
45.33.53.57  Public Scan

URL: https://www.exploitone.com/cyber-security/ermenegildo-zegna-confirms-ransomware-attack-interrupted-systems-and-stolen-data/
Submission: On April 18 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://www.exploitone.com/

<form method="get" class="searchform" action="https://www.exploitone.com/"><label for="s" class="screen-reader-text">Search</label><i class="fas fa-search"></i><input type="text" class="searchtext" name="s" placeholder="Type Search Term …"
    value=""><input type="submit" class="submit forcehide" name="submit" value="Search"><span class="js-search-placeholder"></span></form>

Text Content

Skip to content
Click Here
TOP 7 Techniques to Steal NFT
Secondary Navigation Menu
Menu
 * Home
 * Cyber Security
 * Mobile Security
 * Technology
 * Vulnerabilities
 * Forensics
 * Data Breach
 * Virus
 * Tutorials

 * 
 * 
 * 
 * 

Search



ERMENEGILDO ZEGNA CONFIRMS RANSOMWARE ATTACK; INTERRUPTED SYSTEMS AND STOLEN
DATA


Share this...

Facebook
Pinterest
Twitter
Linkedin
Reddit

The prestigious Italian fashion house Ermenegildo Zegna has confirmed that it
was the victim of a ransomware attack that severely affected its operations and
could be fixed without paying a single dollar to hackers.

The incident occurred in August 2021, although at the time the company only
mentioned one security incident without providing further details. It wasn’t
until this week that, filing a U.S. Securities and Exchange Commission (SEC)
Form 424B3, Ermenegildo Zegna described the incident as a ransomware attack that
affected most of his systems, prompting the leaking of some internal documents.



This was already a known fact, since the RansomExx ransomware group claimed
responsibility for the attack just days after the incident, publishing on
hacking forums data obtained from the company’s systems. In its report, the
company assures that at no time was it shown any intention to cooperate with the
attackers: “We refused to participate in discussions related to the payment of
the ransom, so the responsible parties published certain accounting materials
extracted from our systems.” Zegna ensures that the information exposed does not
pose a risk to its customers, employees and operations.



After the attack, Zegna began restoring its IT systems from backups, trying to
rescue multiple servers, third-party cloud providers, and all sorts of software
implementations without negotiating with hackers. In addition, the company
ensures that periodic security assessments were implemented, which has
significantly decreased its exposure to the most common cyberattack variants.

Thousands of companies have chosen to pay hackers after a ransomware attack in
order to get back up and running as quickly as possible. Law enforcement
agencies and security firms around the world recommend against doing so, as this
only contributes to funding other attacks and there is no guarantee that hackers
will keep their end of the bargain.

Faced with this, hacking groups began to use the tactic of double extortion,
which consists of extracting information before encrypting the affected systems,
threatening victims with leaking this data in hacking forums in case they refuse
to pay the ransom.

To learn more about information security risks, malware variants,
vulnerabilities and information technologies, feel free to access the
International Institute of Cyber Security (IICS) websites.

Atul Narula

He is a cyber security and malware researcher. He studied Computer Science and
started working as a cyber security analyst in 2006. He is actively working as
an cyber security investigator. He also worked for different security companies.
His everyday job includes researching about new cyber security incidents. Also
he has deep level of knowledge in enterprise security implementation.


Share this...

Facebook
Pinterest
Twitter
Linkedin
Reddit
2022-04-13
On: April 13, 2022
In: Cyber Security
Tagged: Cyberattack, cybercrime, cybersecurity, Ermenegildo Zegna, Hacking,
incidents, Information Security, malware, RansomExx ransomware, ransomware,
Securities and Exchange Commission (SEC), security flaws



POPULAR POSTS:

 * Got warning “Unusual Instagram login attempt from…
 * Instashell: Free tool to hack Instagram accounts
 * How to hack Twitter accounts with just 10 commands…
 * How to hack WiFi routers from your smartphone with…
 * How to hack via smartphone like Mr. Robot using Termux
 * New scam and WhatsApp virus: The free Coca Cola fridge
 * Using TermGuard free antivirus in Termux to protect…
 * Encrochat, the encrypted phone used by cartels and…
 * Create your own wordlist to brute force a website,…
 * USE TELEGRAM TO HACK AND CONTROL YOUR WINDOWS 10 MACHINE





VULNERABILITIES

CRITICAL VULNERABILITIES AFFECTING CITRIX STOREFRONT, SD WAN, XENMOBILE SERVER,
AND GATEWAY PLUG-IN



ZERO-DAY VULNERABILITY IN LDAP REFERENCE IN NGINX



CRITICAL REMOTE CODE EXECUTION VULNERABILITY IN RUBY LIBRARY
ASCIIDOCTOR-INCLUDE-EX. SECURE YOUR APPLICATIONS



6 CRITICAL VULNERABILITIES IN VMWARE WORKSPACE ONE ACCESS, IDENTITY MANAGER, AND
OTHER PRODUCTS



CRITICAL VULNERABILITY IN PHP ALLOWS EASY DOS ATTACK ON MILLIONS OF WEBSITES



View All


DATA BREACH

FOX NEWS LEAKS 58 GB OF CONFIDENTIAL DATA CONTAINING CONTENT MANAGEMENT DETAILS
AND EMPLOYEES’ PERSONAL INFORMATION



PERSONAL DATA OF 120,000 RUSSIAN SOLDIERS HACKED AND LEAKED ON THE INTERNET



THE LAPSUS$ HACKING GROUP WAS NOT COMPLETELY TAKEN DOWN AND HAS ATTACKED AGAIN



PERSONAL DATA OF 120,000 RUSSIAN SOLDIERS LEAKED BY HACKERS



HACKERS LEAKS BRITAIN’S POLICE CONFIDENTIAL DATA AFTER RANSOMWARE NEGOTIATION
FAILED



HACKER LEAKS HOME ADDRESSES AND OTHER DETAILS OF INDONESIAN POLICE OFFICERS
AFTER BREAKING INTO SERVERS



MASSIVE DATA BREACH IN STRIPCHAT, A WELL-KNOWN ADULT WEBCAM PLATFORM



View All


TUTORIALS

COMPREHENSIVE MARYHAM FRAMEWORK TUTORIAL: OSINT TOOLS TO INCREASE YOUR
EMPLOYEES’ INFORMATION SECURITY AWARENESS



HOW TO HACK ANYONE USING JUST A QR CODE?



HOW TO USE LEAKIX, THE NEW SEARCH ENGINE FOR CYBERSECURITY PROFESSIONALS THAT
MAKES IT EASIER TO DETECT VULNERABLE DEVICES



HOW HACKERS CREATE AN ANDROID SMARTPHONE VIRUS USING AHMYTH RAT AND SPY ON
ANYONE?



TOP 5 TECHNIQUES USED TO HACK INTO BLUETOOTH DEVICES



THE BEST HACKING TOOLS FOR CYBERSECURITY PROFESSIONALS



7 EASY STEPS TO INSTALL A VIRTUAL IMAGE ON ANDROID PHONE TO SURF DARKNET AND
PROTECT YOUR IDENTITY



HOW TO FIND LOCATION OF A PHONE WITH JUST THE PHONE NUMBER FREE OF COST?



TUTORIAL TO INSTALL KALI HACKING TOOLS IN YOUR SMARTPHONE WITHOUT ROOTING IT.
HACKING ON THE GO



10 BEST HACKING APPLICATIONS FOR ANDROID MOBILE PHONES



HOW CYBER CRIMINALS INSERT RANSOMWARE OR MALWARE IN IMAGE WITH JUST 5 COMMANDS &
HACK WITH?



L0PHTCRACK: THE SECURITY TOOL TO RECOVER WINDOWS PASSWORDS THROUGH USING
DIFFERENT ATTACKS



REMOTELY HACKING AND CONTROLLING COMPUTERS USING ONE THE BEST NJRAT REMOTE
ACCESS TROJAN TOOL



TOP 10 CYBER SECURITY AND HACKING TOOLS USED AT BLACK HAT CONFERENCES



TOP 5 FREE VULNERABILITY ASSESSMENT TOOLS. DETECTING AND FIXING VULNERABILITIES
IN 2021



View All


VIRUS

GODADDY MANAGED WORDPRESS HOSTING WEBSITES ARE GETTING INFECTED WITH MALWARE.
SECURE YOUR SITE



UNPATCHED MICROSOFT EXCHANGE SERVER LET TWO RANSOMWARE ACTORS ATTACK A CANADIAN
HEALTHCARE COMPANY; KARMA JUST STOLE DATA, WHILE CONTI ENCRYPTED IT



ANALYZING TRICKBOT MALWARE IS IMPOSSIBLE? NEW ANTI-REVERSE ENGINEERING WILL SHUT
DOWN WINDOWS



NEW RANSOMWARE DELETES ALL DATA FROM AFFECTED SYSTEMS VIA MASTER BOOT RECORD
(MBR) MALWARE



NEW MALWARE MONITORS VICTIMS’ ACTIVITY FOR MONTHS BEFORE PERFORMING FINANCIAL
TRANSACTIONS FROM STOLEN DATA



View All
 * 
 * 
 * 
 * 
 * 

© 2022 All Rights Reserved
info@iicybersecurity.com


Posting....
We use cookies to ensure that we give you the best experience on our website. If
you continue to use this site we will assume that you are happy with it.Ok