www.exploitone.com
Open in
urlscan Pro
45.33.53.57
Public Scan
URL:
https://www.exploitone.com/cyber-security/ermenegildo-zegna-confirms-ransomware-attack-interrupted-systems-and-stolen-data/
Submission: On April 18 via api from US — Scanned from DE
Submission: On April 18 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMGET https://www.exploitone.com/
<form method="get" class="searchform" action="https://www.exploitone.com/"><label for="s" class="screen-reader-text">Search</label><i class="fas fa-search"></i><input type="text" class="searchtext" name="s" placeholder="Type Search Term …"
value=""><input type="submit" class="submit forcehide" name="submit" value="Search"><span class="js-search-placeholder"></span></form>
Text Content
Skip to content Click Here TOP 7 Techniques to Steal NFT Secondary Navigation Menu Menu * Home * Cyber Security * Mobile Security * Technology * Vulnerabilities * Forensics * Data Breach * Virus * Tutorials * * * * Search ERMENEGILDO ZEGNA CONFIRMS RANSOMWARE ATTACK; INTERRUPTED SYSTEMS AND STOLEN DATA Share this... Facebook Pinterest Twitter Linkedin Reddit The prestigious Italian fashion house Ermenegildo Zegna has confirmed that it was the victim of a ransomware attack that severely affected its operations and could be fixed without paying a single dollar to hackers. The incident occurred in August 2021, although at the time the company only mentioned one security incident without providing further details. It wasn’t until this week that, filing a U.S. Securities and Exchange Commission (SEC) Form 424B3, Ermenegildo Zegna described the incident as a ransomware attack that affected most of his systems, prompting the leaking of some internal documents. This was already a known fact, since the RansomExx ransomware group claimed responsibility for the attack just days after the incident, publishing on hacking forums data obtained from the company’s systems. In its report, the company assures that at no time was it shown any intention to cooperate with the attackers: “We refused to participate in discussions related to the payment of the ransom, so the responsible parties published certain accounting materials extracted from our systems.” Zegna ensures that the information exposed does not pose a risk to its customers, employees and operations. After the attack, Zegna began restoring its IT systems from backups, trying to rescue multiple servers, third-party cloud providers, and all sorts of software implementations without negotiating with hackers. In addition, the company ensures that periodic security assessments were implemented, which has significantly decreased its exposure to the most common cyberattack variants. Thousands of companies have chosen to pay hackers after a ransomware attack in order to get back up and running as quickly as possible. Law enforcement agencies and security firms around the world recommend against doing so, as this only contributes to funding other attacks and there is no guarantee that hackers will keep their end of the bargain. Faced with this, hacking groups began to use the tactic of double extortion, which consists of extracting information before encrypting the affected systems, threatening victims with leaking this data in hacking forums in case they refuse to pay the ransom. To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites. Atul Narula He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation. Share this... Facebook Pinterest Twitter Linkedin Reddit 2022-04-13 On: April 13, 2022 In: Cyber Security Tagged: Cyberattack, cybercrime, cybersecurity, Ermenegildo Zegna, Hacking, incidents, Information Security, malware, RansomExx ransomware, ransomware, Securities and Exchange Commission (SEC), security flaws POPULAR POSTS: * Got warning “Unusual Instagram login attempt from… * Instashell: Free tool to hack Instagram accounts * How to hack Twitter accounts with just 10 commands… * How to hack WiFi routers from your smartphone with… * How to hack via smartphone like Mr. Robot using Termux * New scam and WhatsApp virus: The free Coca Cola fridge * Using TermGuard free antivirus in Termux to protect… * Encrochat, the encrypted phone used by cartels and… * Create your own wordlist to brute force a website,… * USE TELEGRAM TO HACK AND CONTROL YOUR WINDOWS 10 MACHINE VULNERABILITIES CRITICAL VULNERABILITIES AFFECTING CITRIX STOREFRONT, SD WAN, XENMOBILE SERVER, AND GATEWAY PLUG-IN ZERO-DAY VULNERABILITY IN LDAP REFERENCE IN NGINX CRITICAL REMOTE CODE EXECUTION VULNERABILITY IN RUBY LIBRARY ASCIIDOCTOR-INCLUDE-EX. SECURE YOUR APPLICATIONS 6 CRITICAL VULNERABILITIES IN VMWARE WORKSPACE ONE ACCESS, IDENTITY MANAGER, AND OTHER PRODUCTS CRITICAL VULNERABILITY IN PHP ALLOWS EASY DOS ATTACK ON MILLIONS OF WEBSITES View All DATA BREACH FOX NEWS LEAKS 58 GB OF CONFIDENTIAL DATA CONTAINING CONTENT MANAGEMENT DETAILS AND EMPLOYEES’ PERSONAL INFORMATION PERSONAL DATA OF 120,000 RUSSIAN SOLDIERS HACKED AND LEAKED ON THE INTERNET THE LAPSUS$ HACKING GROUP WAS NOT COMPLETELY TAKEN DOWN AND HAS ATTACKED AGAIN PERSONAL DATA OF 120,000 RUSSIAN SOLDIERS LEAKED BY HACKERS HACKERS LEAKS BRITAIN’S POLICE CONFIDENTIAL DATA AFTER RANSOMWARE NEGOTIATION FAILED HACKER LEAKS HOME ADDRESSES AND OTHER DETAILS OF INDONESIAN POLICE OFFICERS AFTER BREAKING INTO SERVERS MASSIVE DATA BREACH IN STRIPCHAT, A WELL-KNOWN ADULT WEBCAM PLATFORM View All TUTORIALS COMPREHENSIVE MARYHAM FRAMEWORK TUTORIAL: OSINT TOOLS TO INCREASE YOUR EMPLOYEES’ INFORMATION SECURITY AWARENESS HOW TO HACK ANYONE USING JUST A QR CODE? HOW TO USE LEAKIX, THE NEW SEARCH ENGINE FOR CYBERSECURITY PROFESSIONALS THAT MAKES IT EASIER TO DETECT VULNERABLE DEVICES HOW HACKERS CREATE AN ANDROID SMARTPHONE VIRUS USING AHMYTH RAT AND SPY ON ANYONE? TOP 5 TECHNIQUES USED TO HACK INTO BLUETOOTH DEVICES THE BEST HACKING TOOLS FOR CYBERSECURITY PROFESSIONALS 7 EASY STEPS TO INSTALL A VIRTUAL IMAGE ON ANDROID PHONE TO SURF DARKNET AND PROTECT YOUR IDENTITY HOW TO FIND LOCATION OF A PHONE WITH JUST THE PHONE NUMBER FREE OF COST? TUTORIAL TO INSTALL KALI HACKING TOOLS IN YOUR SMARTPHONE WITHOUT ROOTING IT. HACKING ON THE GO 10 BEST HACKING APPLICATIONS FOR ANDROID MOBILE PHONES HOW CYBER CRIMINALS INSERT RANSOMWARE OR MALWARE IN IMAGE WITH JUST 5 COMMANDS & HACK WITH? L0PHTCRACK: THE SECURITY TOOL TO RECOVER WINDOWS PASSWORDS THROUGH USING DIFFERENT ATTACKS REMOTELY HACKING AND CONTROLLING COMPUTERS USING ONE THE BEST NJRAT REMOTE ACCESS TROJAN TOOL TOP 10 CYBER SECURITY AND HACKING TOOLS USED AT BLACK HAT CONFERENCES TOP 5 FREE VULNERABILITY ASSESSMENT TOOLS. DETECTING AND FIXING VULNERABILITIES IN 2021 View All VIRUS GODADDY MANAGED WORDPRESS HOSTING WEBSITES ARE GETTING INFECTED WITH MALWARE. SECURE YOUR SITE UNPATCHED MICROSOFT EXCHANGE SERVER LET TWO RANSOMWARE ACTORS ATTACK A CANADIAN HEALTHCARE COMPANY; KARMA JUST STOLE DATA, WHILE CONTI ENCRYPTED IT ANALYZING TRICKBOT MALWARE IS IMPOSSIBLE? NEW ANTI-REVERSE ENGINEERING WILL SHUT DOWN WINDOWS NEW RANSOMWARE DELETES ALL DATA FROM AFFECTED SYSTEMS VIA MASTER BOOT RECORD (MBR) MALWARE NEW MALWARE MONITORS VICTIMS’ ACTIVITY FOR MONTHS BEFORE PERFORMING FINANCIAL TRANSACTIONS FROM STOLEN DATA View All * * * * * © 2022 All Rights Reserved info@iicybersecurity.com Posting.... We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok