{"id":397,"date":"2015-08-06T09:46:47","date_gmt":"2015-08-06T07:46:47","guid":{"rendered":"http:\/\/carlogasparrini.altervista.org\/Rossano\/?p=397"},"modified":"2016-03-17T16:16:17","modified_gmt":"2016-03-17T15:16:17","slug":"unesempio-di-come-si-puo-essere-infettati-da-virus-informatici-malware","status":"publish","type":"post","link":"https:\/\/www.digital-evidence.it\/?p=397","title":{"rendered":"Esempio di come possiamo essere infettati da Virus"},"content":{"rendered":"<p style=\"text-align: justify;\"><a href=\"http:\/\/www.digital-evidence.it\/wp-content\/uploads\/2015\/08\/adobe-flash-player-hacked-405x405.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-404 aligncenter\" src=\"http:\/\/www.digital-evidence.it\/wp-content\/uploads\/2015\/08\/adobe-flash-player-hacked-405x405-300x300.jpg\" alt=\"\" width=\"178\" height=\"178\" srcset=\"https:\/\/www.digital-evidence.it\/wp-content\/uploads\/2015\/08\/adobe-flash-player-hacked-405x405-300x300.jpg 300w, https:\/\/www.digital-evidence.it\/wp-content\/uploads\/2015\/08\/adobe-flash-player-hacked-405x405-150x150.jpg 150w, https:\/\/www.digital-evidence.it\/wp-content\/uploads\/2015\/08\/adobe-flash-player-hacked-405x405.jpg 405w\" sizes=\"auto, (max-width: 178px) 100vw, 178px\" \/><\/a><\/p>\n<p><span style=\"color: #ffffff;\">.<\/span><\/p>\n<p style=\"text-align: justify;\">Un gruppo di <span id=\"ouHighlight__42_48TO47_52\" class=\"\">hackers <\/span><span id=\"noHighlight_0.5071512300847687\">sono riusciti a sfruttare i network <\/span><span id=\"noHighlight_0.4656139509538444\"><\/span><span id=\"noHighlight_0.4997980782299939\"><\/span><span id=\"ouHighlight__67_68TO76_88\">pubblicitari<\/span><span id=\"noHighlight_0.5943051496770773\"> <\/span><span id=\"ouHighlight__60_65TO90_95\">online<\/span><span id=\"noHighlight_0.6629548672901913\"> <\/span><span id=\"ouHighlight__79_80TO97_99\">per<\/span><span id=\"noHighlight_0.20156221046259726\"> <\/span><span id=\"ouHighlight__82_91TO101_111\" class=\"\">veicolare nuove forme di malware<\/span><span id=\"noHighlight_0.42314905075669407\"> (<\/span><span id=\"ouHighlight__93_99TO113_119\" class=\"\">virus informtici)<\/span><span id=\"noHighlight_0.5722565098607156\"> <\/span><span id=\"ouHighlight__101_104TO121_122\" class=\"\">in<\/span><span id=\"noHighlight_0.3887453230289454\"> <\/span><span id=\"ouHighlight__106_112TO124_128\" class=\"\">molti<\/span><span id=\"noHighlight_0.6609234601949544\"> <\/span><span id=\"ouHighlight__114_115TO130_132\" class=\"\">dei<\/span><span id=\"noHighlight_0.36166458951739644\"> <\/span><span id=\"ouHighlight__125_132TO134_141\">siti Web<\/span><span id=\"noHighlight_0.5257172734790575\"> <\/span><span id=\"ouHighlight__117_123TO143_150\" class=\"\">di Yahoo<\/span><span id=\"noHighlight_0.481248993953867\">.<\/span><span id=\"noHighlight_0.42973217953174636\"> <\/span><span id=\"ouHighlight__139_144TO153_161\">L&#8217;attacco \u00e8 iniziato <\/span><span id=\"noHighlight_0.8681749575696007\">il <\/span><span id=\"noHighlight_0.6337138088379343\"><\/span><span id=\"noHighlight_0.5823892851292306\"> <\/span><span id=\"ouHighlight__169_170TO182_183\">28<\/span><span id=\"noHighlight_0.3372184651550434\"> <\/span><span id=\"ouHighlight__164_167TO185_190\">luglio<\/span><span id=\"noHighlight_0.5388780240642485\"> <\/span><span id=\"ouHighlight__173_175TO192_193\">e si \u00e8 concluso<\/span><span id=\"noHighlight_0.8003312894069726\"> il<\/span><span id=\"noHighlight_0.8042716208364439\"><\/span><span id=\"noHighlight_0.7449003628461293\"> <\/span><span id=\"ouHighlight__209_210TO221_221\" class=\"\">3<\/span><span id=\"noHighlight_0.7819151728188646\"> <\/span><span id=\"ouHighlight__202_207TO223_228\" class=\"\">agosto<\/span><span id=\"noHighlight_0.8132467205116991\">.<\/span><span id=\"noHighlight_0.4636633669424022\"> <\/span><span id=\"ouHighlight__212_213TO231_233\" class=\"\">L&#8217;attacco \u00e8 stato <\/span><span id=\"noHighlight_0.5818228580799961\"><\/span><span id=\"ouHighlight__219_226TO239_245\">rivolto<\/span><span id=\"noHighlight_0.703852534683491\"> <\/span><span id=\"ouHighlight__228_229TO247_247\">a vari<\/span><span id=\"noHighlight_0.1387135548472881\"> <\/span><span id=\"ouHighlight__281_285TO273_276\">siti di Yahoo, come sport e finanza.<\/span><span id=\"noHighlight_0.11576949230465461\"> L&#8217;attacco \u00e8 stato condotto grazie ad una vulnerabilit\u00e0 di Adobe Flash. L&#8217;attacco prevedeva che dopo essere stati colpiti, si viene reindirizzati verso sistemi denominati\u00a0<span id=\"ouHighlight__389_394TO428_435\">Angler<\/span><span id=\"noHighlight_0.27090622239618145\"> <\/span><span id=\"ouHighlight__396_402TO437_443\">Exploit<\/span><span id=\"noHighlight_0.49325183048414245\"> <\/span><span id=\"ouHighlight__404_406TO445_447\">Kit<\/span> che permettono all&#8217;attaccante di cercare computer e dispositivi mobile vulnerabili e di infettarli subito dopo.\u00a0\u00a0<\/span><span id=\"noHighlight_0.24126232502906308\"> <\/span><\/p>\n<p style=\"text-align: justify;\">Questa tipologia di attacco \u00e8 in aumento, come affermano anche i ricercatori. Yahoo ha confermato l&#8217;attacco.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>. Un gruppo di hackers sono riusciti a sfruttare i network pubblicitari online per veicolare nuove forme di malware (virus informtici) in molti dei siti&#8230;<\/p>\n<p class=\"readmore\"><a class=\"more-btn\" href=\"https:\/\/www.digital-evidence.it\/?p=397\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,7,13,14],"tags":[10],"class_list":["post-397","post","type-post","status-publish","format-standard","hentry","category-malware","category-sicurezza-informatica","category-vulnerabilita-flash","category-yahoo","tag-malware"],"_links":{"self":[{"href":"https:\/\/www.digital-evidence.it\/index.php?rest_route=\/wp\/v2\/posts\/397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digital-evidence.it\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digital-evidence.it\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digital-evidence.it\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digital-evidence.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=397"}],"version-history":[{"count":19,"href":"https:\/\/www.digital-evidence.it\/index.php?rest_route=\/wp\/v2\/posts\/397\/revisions"}],"predecessor-version":[{"id":548,"href":"https:\/\/www.digital-evidence.it\/index.php?rest_route=\/wp\/v2\/posts\/397\/revisions\/548"}],"wp:attachment":[{"href":"https:\/\/www.digital-evidence.it\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digital-evidence.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digital-evidence.it\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}