{"id":1834,"date":"2022-12-26T16:27:21","date_gmt":"2022-12-26T16:27:21","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1284"},"modified":"2022-12-26T16:27:21","modified_gmt":"2022-12-26T16:27:21","slug":"ransomware","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/it\/attacchi-informatici\/ransomware\/","title":{"rendered":"Ransomware: Cos'\u00e8 e come proteggersi"},"content":{"rendered":"<p>Ransomware is a type of malicious software or malware that virtually holds your data hostage, locking up your computer and threatening to keep it locked until you pay the attacker\u2019s ransom. The International Business Machines Corporation (IBM) reports that in 2021, ransomware attacks accounted for 21% of all cyberattacks and resulted in a staggering USD 20 billion loss.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-ransomware\">Che cos'\u00e8 il ransomware?<\/h2>\n\n\n<p>In the past, ransomware attacks were aimed solely at locking a person\u2019s data or device until they paid money to unlock it.&nbsp;<\/p>\n\n\n\n<p>Nowadays, however, cybercriminals are taking matters to a whole new level. The 2022 X-Force Threat Intelligence Index revealed that virtually all ransomware attacks have now adopted the \u2018double extortion\u2019 strategy, which not only locks data but also expects a ransom payment to prevent theft. In addition, these malicious cybercriminals are introducing an additional threat in their repertoire \u2013 triple extortion campaigns involving Distributed Denial of Service (DDoS) assaults \u2013 and they are becoming increasingly common.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-and-malware\">Ransomware e malware <\/h2>\n\n\n<p>Per comprendere meglio il ransomware, dobbiamo prima esaminare cos'\u00e8 il malware (software dannoso) e le sue implicazioni.<\/p>\n\n\n\n<p>Malware \u2013 a term that prompts more questions than answers. Is the malicious software, or is it simply being used for nefarious purposes? As with many aspects of cybersecurity, there\u2019s no single answer to this question; instead, it\u2019s an intricate and complex area in which we must consider multiple factors. The software can be malevolent in its own right; however, the human who operates said software is ultimately responsible for determining whether and how malicious it will be.<\/p>\n\n\n\n<p>Cyber threats are broad, from destructive viruses to crafty Trojans. But there\u2019s a unique strain even more dangerous than these \u2013 ransomware. Uncover the mystery behind this malicious software, and learn how to protect yourself from it!<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-does-ransomware-work\">Come funziona il ransomware?<\/h2>\n\n\n<p>Ransomware is designed to lock access and all content within the target computer or network until its attacker receives payment. Even more sophisticated attacks may initiate disk-level encryption with such intensity that, without paying the ransom, it would be impossible to decrypt any files. From 2013 to 2020, the FBI\u2019s Internet Crime Complaint Center noticed a dramatic surge of 243% in reported ransomware occurrences.<\/p>\n\n\n\n<p>A differenza di altre forme di crimine informatico, il ransomware richiede che le sue vittime collaborino con il criminale per avere successo.<\/p>\n\n\n\n<p>Come dichiarato sul loro sito web, l'FBI sconsiglia di pagare un riscatto se un individuo o un'azienda viene attaccata con ransomware. Pagando il riscatto, non vi \u00e8 alcuna garanzia che un'organizzazione o una vittima riacquisti l'accesso ai propri dati, rendendola una soluzione rischiosa e inaffidabile. Purtroppo, in alcuni casi in cui le vittime hanno pagato il denaro richiesto dai criminali, non ricevono mai una chiave di decrittazione legittima per sbloccare i propri dati. Anche se ne ottengono una, \u00e8 possibile che non tutti i file siano recuperabili. Pagando il riscatto, non solo si forniscono incentivi ai criminali per continuare a eseguire attacchi ransomware su organizzazioni e individui, ma si rende anche pi\u00f9 attraente per altri potenziali criminali informatici.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"popular-ransomware-variations\"><strong>Varianti popolari di ransomware<\/strong><\/h3>\n\n\n<p>With numerous ransomware varieties existing, it is no wonder that some are more successful than others. In fact, there are a select few who have risen above the rest in terms of effectiveness and popularity \u2013 making them stand out from their counterparts.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"1-ryuk\"><strong>1. Ryuk<\/strong><\/h3>\n\n\n<p>Ryuk is a type of ransomware that targets a specific type of user. It is usually delivered through an email or someone\u2019s login information to get into a system. Once the system is infected, Ryuk encrypts some files and then asks for money to give them back.<\/p>\n\n\n\n<p>Ryuk \u00e8 noto per essere una delle variet\u00e0 di ransomware pi\u00f9 costose, con richieste di riscatto medie che superano 1 milione di dollari. Per questo motivo, i criminali informatici legati a Ryuk prendono regolarmente di mira aziende con accesso a risorse finanziarie sufficienti per soddisfare questi pagamenti esorbitanti.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"2revilnbspsodinokibi\"><strong>2. REvil (Sodinokibi)<\/strong><\/h3>\n\n\n<p>REvil (noto anche come Sodinokibi) \u00e8 un ceppo di ransomware dannoso che colpisce prevalentemente le grandi aziende.<\/p>\n\n\n\n<p>Infamous REvil ransomware, operated by the Russian-speaking group since 2019, is one of the most notorious cyber threats on the internet today. For example, they have been held responsible for significant breaches such as \u2018Kaseya\u2019 and \u2018JBS\u2019, making them a serious threat to businesses across numerous industries.<\/p>\n\n\n\n<p>Negli ultimi anni, REvil si \u00e8 scontrato con Ryuk per il titolo di ransomware pi\u00f9 costoso. Sono emerse segnalazioni che questo software dannoso ha richiesto pagamenti di riscatto fino a 800.000 dollari.<\/p>\n\n\n\n<p>Initially, REvil was just another traditional ransomware variant, yet it has since progressed. Presently, they use the Double Extortion technique \u2013 not only encrypting files but also stealing data from businesses. This means that apart from requesting a ransom to decrypt data, attackers will threaten to publicly expose the stolen information if an additional payment is not rendered.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"3nbspmaze\"><strong>3. Maze<\/strong><\/h3>\n\n\n<p>The Maze ransomware has gained notoriety for its innovative approach to extortion. It not only encrypts files but also steals sensitive data from the victim\u2019s computer and threatens to make it public or sell it if a ransom is not paid. This menacing strategy puts targets in an even more difficult situation \u2013 either pay up or face much higher costs due to an expensive data breach.<\/p>\n\n\n\n<p>Although the Maze ransomware group has disbanded, this does not signify that ransomware threats are now obsolete. Several former affiliates of Maze have shifted to using Egregor ransomware instead, and it is widely speculated that these three variants \u2013 Sekhmet being the third \u2013 share an identical originator.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"4-dearcry\"><strong>4. DearCry<\/strong><\/h3>\n\n\n<p>A marzo 2021, Microsoft ha rilasciato aggiornamenti critici per quattro vulnerabilit\u00e0 nei loro server Exchange, ma prima che tutti potessero applicare le correzioni per proteggersi da potenziali danni, DearCry \u00e8 intervenuto con una nuova variante di ransomware progettata specificamente per sfruttare queste debolezze.<\/p>\n\n\n\n<p>Il ransomware DearCry pu\u00f2 bloccare molti file, lasciando agli utenti una nota di riscatto sui loro computer che li istruisce a contattare i suoi operatori per sapere come ripristinare l'accesso.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"5-lapsus\"><strong>5. Lapsus$<\/strong><\/h3>\n\n\n<p>The South American ransomware gang, Lapsus$, has been linked to cyberattacks on noteworthy targets worldwide. With intimidation and the potential for sensitive data exposure, the cyber gang has established a name for itself by extorting its victims unless their demands are met. They have bragged about penetrating Nvidia, Samsung, and Ubisoft, amongst other global organizations.\u00a0This group utilises pilfered source code to make malicious files appear as legitimate software.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"6-lockbit\"><strong>6. Lockbit<\/strong><\/h3>\n\n\n<p>LockBit \u00e8 un software creato per impedire alle persone di accedere ai dati. Esiste dal settembre 2019. Recentemente, \u00e8 diventato un Ransomware-as-a-Service (RaaS). Ci\u00f2 significa che le persone possono pagare per usarlo per impedire ad altri di accedere ai loro dati.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-costly-consequencesnbsp\">Conseguenze costose del ransomware <\/h2>\n\n\n<p>People dealing with ransomware are often reticent to admit the amount of ransom they have paid. As outlined in the report Definitive Guide to Ransomware 2022, ransom demands have increased drastically; what used to comprise only single-digit payments has now expanded into seven and eight-digit figures. In the most extreme instances, companies may need to pay a hefty ransom of USD 40-80 million for their data to be returned. Yet these payments aren\u2019t the only cost associated with ransomware attacks; other direct and indirect costs can compound an organization\u2019s financial burden. As reported in IBM\u2019s Cost of Data Breach 2021 study, the standard cost of ransomware attacks without including ransom payments amounted to a staggering USD 4.62 million on average.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-dch-hospitals-case\">Il caso degli ospedali DCH<\/h3>\n\n\n<p>Il DCH \u00e8 un centro medico regionale a Tuscaloosa, Alabama, operativo dal 1923.<\/p>\n\n\n\n<p>On October 1st, 2019, DCH Hospitals got attacked by ransomware. Everything electronic was down. They couldn\u2019t take any new patients and had to use all paper for everything.<\/p>\n\n\n\n<p>Un rappresentante del DCH ha rivelato che il sistema \u00e8 stato compromesso quando qualcuno ha aperto e interagito con un allegato email corrotto. Fortunatamente, nessuna informazione sui pazienti \u00e8 stata compromessa.<\/p>\n\n\n\n<p>Il sistema ospedaliero DCH vanta tre grandi ospedali \u2014 DCH Regional Medical Center, Northport Medical Center e Fayette Medical Center \u2014 che servono una grande parte dell'Alabama occidentale. Queste tre strutture mediche offrono oltre 850 posti letto e accolgono pi\u00f9 di 32.000 pazienti all'anno.<\/p>\n\n\n\n<p>Sabato 5 ottobre, per ripristinare rapidamente l'accesso ai loro sistemi, gli ospedali DCH hanno deciso di pagare il riscatto e ottenere una chiave di decrittazione dagli attaccanti. Tuttavia, hanno deciso di non divulgare quanto hanno pagato. Poich\u00e9 i sistemi sanitari sono critici e sensibili, diventano facili bersagli per gli attacchi ransomware. Spesso, queste organizzazioni trovano pi\u00f9 vantaggioso pagare il riscatto piuttosto che affrontare potenziali perdite di dati o interruzioni. Le informazioni riservate memorizzate nei loro sistemi sono troppo preziose per essere perse. Il ransomware dannoso utilizzato per violare la sicurezza dell'ospedale DCH \u00e8 stato inconsapevolmente facilitato da un dipendente che ha aperto un'email di phishing contenente un allegato contaminato. Ci\u00f2 ha permesso al malware di ottenere l'accesso e successivamente infettare la loro rete informatica.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"5-steps-to-prevent-becoming-a-ransomware-victim\">5 passaggi per prevenire di diventare una vittima del ransomware<\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"1-train-your-employees-about-cybersecurity-threatsnbsp\">1. Formare i propri dipendenti sulle minacce informatiche. <\/h3>\n\n\n<p>Per proteggerci dagli attacchi informatici e per essere in grado di identificarne l'occorrenza sul posto di lavoro, dobbiamo riconoscere la nostra responsabilit\u00e0 individuale per la sicurezza informatica. Ogni dipendente dovrebbe ricevere una formazione specializzata sull'identificazione e la prevenzione delle minacce informatiche. Ma spetta infine a ciascun individuo prendere le informazioni ricevute per valutare accuratamente i potenziali rischi nella propria vita quotidiana. L'incidente agli ospedali DCH \u00e8 un esempio importante di quanto possa essere prezioso possedere una comprensione personale della sicurezza informatica.<\/p>\n\n\n\n<p>The company must inform the employee of the potential risks of opening email attachments from unknown senders, particularly in a work environment. When in doubt, it\u2019s always best to consult someone with experience before opening any messages, links or attachments. Many businesses have an in-house IT department that will take any reports concerning a phishing attempt to confirm if it is legitimate to the employee. If the message comes from a reliable source like your bank account provider or acquaintances you know personally, contact them directly and confirm that they sent the message and its contents before clicking on any links provided. This way, you can protect yourself from potential cyber-attacks.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"2-back-up-your-files\">2. Eseguire il backup dei propri file.<\/h3>\n\n\n<p>If you\u2019re ever targeted by ransomware or have some data lost in an attack and don\u2019t want to pay the ransom, having a secure backup of your most valuable information is essential.<\/p>\n\n\n\n<p>Per ridurre al minimo le conseguenze di un attacco dannoso, gli ospedali DCH avrebbero dovuto adottare misure preventive e eseguire il backup dei loro file essenziali prima dell'incidente. Un backup avrebbe permesso loro di rimanere aperti e continuare le operazioni senza interruzioni a causa del ransomware.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"3-keep-your-software-updated\">3. Mantenere aggiornato il proprio software.<\/h3>\n\n\n<p>I criminali informatici spesso sfruttano le debolezze esistenti per introdurre software dannoso in un dispositivo o sistema. Le vulnerabilit\u00e0 di sicurezza non corrette, o zero-day, possono essere pericolose poich\u00e9 non sono ancora conosciute dall'industria della sicurezza digitale o identificate ma non affrontate. \u00c8 stato osservato che alcuni gruppi di ransomware acquistano informazioni sulle vulnerabilit\u00e0 zero-day da criminali informatici, che utilizzano per le loro operazioni dannose. \u00c8 anche noto che gli hacker possono utilizzare vulnerabilit\u00e0 di sicurezza corrette per accedere ai sistemi e lanciare attacchi.&nbsp;<\/p>\n\n\n\n<p>\u00c8 essenziale applicare regolarmente le patch per proteggersi dagli attacchi ransomware che prendono di mira le vulnerabilit\u00e0 del software e del sistema operativo.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"4-install-and-update-cybersecurity-tools\">4. Installare e aggiornare gli strumenti di sicurezza informatica<\/h3>\n\n\n<p>It\u2019s essential to upgrade cybersecurity tools \u2013 anti-malware and antivirus software, firewalls, secure web gateways, as well as enterprise solutions such as endpoint detection and response (EDR), extended detection and response (XDR), which can help security teams detect malicious activity in real-time.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"5-implement-access-control-policies\">5. Implementare politiche di controllo degli accessi<\/h3>\n\n\n<p>Le organizzazioni dovrebbero implementare l'autenticazione a pi\u00f9 fattori, l'architettura zero-trust, la segmentazione della rete e le relative misure di sicurezza per proteggere i dati vulnerabili e fermare i crypto-worms dal transitare su altre macchine della rete.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-targets-individuals-as-well\">Il ransomware prende di mira anche gli individui.<\/h2>\n\n\n<p>Generally, ransomware stories focus on the aftermath of corporate or healthcare system hacks; however, it is essential to recognize that individuals are not immune from these attacks. In fact, they occur more often than you may think. Individuals must be aware of ransomware\u2019s genuine danger when using the internet, as it could risk their safety and security.<\/p>\n\n\n\n<p>I criminali informatici utilizzano due metodi principali quando distribuiscono ransomware: crittografia e blocco dello schermo.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"encryption-ransomware\">Ransomware di crittografia<\/h3>\n\n\n<p>I criminali informatici prendono principalmente di mira file specifici salvati localmente sui dispositivi tramite ransomware di crittografia. Per selezionare questi documenti, l'attaccante utilizza trucchi di phishing o altre forme di software dannoso per indagare sul proprio obiettivo. Una volta che i file sono crittografati, la vittima richieder\u00e0 un riscatto per ricevere la chiave di decrittazione necessaria per accedere ai propri dati. Gli hacker utilizzano tipicamente questa strategia per accedere a informazioni riservate o sensibili che le aziende stanno cercando di proteggere con forza. Questo approccio \u00e8 diventato popolare tra le parti dannose, rendendo le aziende e le organizzazioni un obiettivo comune.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"lock-screen-ransomware\">Ransomware di blocco dello schermo<\/h3>\n\n\n<p>Conversely, lock screen ransomware encrypts specific files and renders a user\u2019s device completely inoperable. Locking-screen ransomware will lock up your device and display a full-screen message that is unmovable and unminimizable. You\u2019ll be asked to pay a ransom to unlock the system or retrieve lost data or files.<\/p>\n\n\n\n<p>These programs often employ fear tactics to pressure you into making payments, such as a ticking clock that warns it will delete all your files if time runs out. Cyber attackers often attempt to intimidate individuals by fabricating stories about their devices being linked with illegal activities or inappropriate material and threatening to report them to the authorities if the victim doesn\u2019t pay. To further coerce victims into paying the ransom, some ransomware developers leverage pornographic imagery and threaten that the victim cannot remove it without payment.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ultimately\">In definitiva<\/h2>\n\n\n<p>Implementare misure di sicurezza informatica efficaci, come aggiornare regolarmente il proprio software e gli strumenti di sicurezza, applicare politiche di controllo degli accessi e essere consapevoli delle varie tattiche utilizzate da questi programmi dannosi per proteggere la propria attivit\u00e0 dagli attacchi ransomware. Inoltre, gli individui dovrebbero adottare misure proattive per proteggere i propri dispositivi dagli attacchi ransomware, inclusa la cautela quando si aprono email o si clicca su link da fonti sconosciute. Con consapevolezza e pratiche prudenti, possiamo tutti contribuire a ridurre la minaccia del ransomware nel nostro mondo digitale.<\/p>","protected":false},"excerpt":{"rendered":"<p>Il ransomware \u00e8 un tipo di software dannoso o malware che tiene virtualmente in ostaggio i vostri dati, bloccando il vostro computer e minacciando di tenerlo bloccato finch\u00e9 non... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/it\/attacchi-informatici\/ransomware\/\">Continue reading <span class=\"screen-reader-text\">Ransomware: Cos'\u00e8 e come proteggersi<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1286,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-1834","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware: What it is And How To Protect Yourself<\/title>\n<meta name=\"description\" content=\"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/it\/attacchi-informatici\/ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: What it is And How To Protect Yourself\" \/>\n<meta property=\"og:description\" content=\"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/it\/attacchi-informatici\/ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-26T16:27:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"626\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Ransomware: What it is And How To Protect Yourself\",\"datePublished\":\"2022-12-26T16:27:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\"},\"wordCount\":2305,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"articleSection\":[\"Cyber Attacks\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\",\"name\":\"Ransomware: What it is And How To Protect Yourself\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"datePublished\":\"2022-12-26T16:27:21+00:00\",\"description\":\"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"width\":1000,\"height\":626,\"caption\":\"Ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware: What it is And How To Protect Yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/it\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware: Cos'\u00e8 e come proteggersi","description":"Scopri tutto ci\u00f2 che devi sapere sul ransomware, come proteggerti e cosa fare se ne diventi vittima.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/it\/attacchi-informatici\/ransomware\/","og_locale":"it_IT","og_type":"article","og_title":"Ransomware: What it is And How To Protect Yourself","og_description":"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.","og_url":"https:\/\/securitybriefing.net\/it\/attacchi-informatici\/ransomware\/","og_site_name":"Security Briefing","article_published_time":"2022-12-26T16:27:21+00:00","og_image":[{"width":1000,"height":626,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"security","Tempo di lettura stimato":"11 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Ransomware: What it is And How To Protect Yourself","datePublished":"2022-12-26T16:27:21+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/"},"wordCount":2305,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","articleSection":["Cyber Attacks"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/","name":"Ransomware: Cos'\u00e8 e come proteggersi","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","datePublished":"2022-12-26T16:27:21+00:00","description":"Scopri tutto ci\u00f2 che devi sapere sul ransomware, come proteggerti e cosa fare se ne diventi vittima.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","width":1000,"height":626,"caption":"Ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Ransomware: What it is And How To Protect Yourself"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Briefing sulla sicurezza","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Briefing sulla sicurezza","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"sicurezza","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin \u00e8 una redattrice senior per Government Technology. In precedenza ha scritto per PYMNTS e The Bay State Banner e ha conseguito una laurea in scrittura creativa alla Carnegie Mellon. Risiede fuori Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/it\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts\/1834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/comments?post=1834"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts\/1834\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/media\/1286"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/media?parent=1834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/categories?post=1834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/tags?post=1834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}