{"id":49466,"date":"2015-03-09T23:00:00","date_gmt":"2015-03-09T22:00:00","guid":{"rendered":"http:\/\/smeupnew.it\/magazine\/blog\/come_difendersi_dal_crypto_virus\/"},"modified":"2025-08-07T13:19:11","modified_gmt":"2025-08-07T11:19:11","slug":"come_difendersi_dal_crypto_virus","status":"publish","type":"post","link":"https:\/\/www.smeup.com\/magazine\/blog\/come_difendersi_dal_crypto_virus\/","title":{"rendered":"Come difendersi dal CryptoVirus?"},"content":{"rendered":"<p><span style=\"font-size: small\">Difendersi dai danni di una delle minacce pi\u00f9 serie che colpisce una grande quantit\u00e0 di utenti, oggi non solo \u00e8 possibile ma \u00e8 <strong>fortemente consigliato<\/strong>.<\/span><\/p>\n<p><span style=\"font-size: small\"><strong><span style=\"color: #d51224\">Cosa e&#8217; un CryptoVirus?<\/span><\/strong><\/span><br \/><span style=\"font-size: small\">Il <strong>Cryptovirus<\/strong> \u00e8 un esempio di APT (minaccia persistente avanzata), cio\u00e8 un programma malevole <strong>progettato per estorcere denaro<\/strong> una volta che ha preso possesso dell\u2019host\u00a0vittima.<\/span><\/p>\n<p><span style=\"color: #d51224;font-size: small\"><strong>Come funziona?<\/strong><\/span><\/p>\n<p><span style=\"font-size: small\">Il virus\/malware <strong>\u00e8 finalizzato ad estorcere dati sensibili e\/o a \u201ccriptare\u201d gli stessi con una chiave<\/strong> per poi richiedere un copioso riscatto per poter riaccedere a file e cartelle.<br \/>Quando il virus entra in funzione, inizia a crittografare in modo irreversibile i file sia del PC che del server rendendoli inutilizzabili. La diffusione di questo virus <strong>potrebbe avvenire attraverso un\u2019email ricevuta (posta elettronica tradizionale o PEC)<\/strong> apparentemente inoffensiva che sembra provenire da istituzioni o mittenti legittimi (Es. corrieri espressi, banche, carte di credito, ecc\u2026) spesso riconoscibile in quanto scritta in un italiano non corretto.<br \/>Le ultime infezioni rilevate<strong> simulano comunicazioni inviate da Equitalia <\/strong>come segnalato sul sito ufficiale (<span style=\"text-decoration: underline\"><span style=\"color: #d51224\"><strong>Clicca qui<\/strong><\/span><\/span> per leggere l&#8217;articolo). I link inseriti nel finto messaggio di Equitalia portano all&#8217;attivazione del virus, in grado di diffondersi su tutta la rete aziendale e di criptare tutti i backup e le repliche.<br \/>L&#8217;infezione del virus va ben oltre al solo pc locale: se il pc \u00e8 collegato ad una rete aziendale e a risorse di rete condivise, \u00e8 <strong>facile che si propaghi a tutti i pc e server, infettando e criptando tutti i documenti<\/strong>.<br \/>Pertanto \u00e8 importante prestare la massima attenzione e in caso di dubbi Vi invitiamo a contattarci prima di aprire eventuali mail sospette.\u00a0<\/span><br \/><span style=\"font-size: small\"><strong style=\"color: #d51224\">\u00a0<\/strong><\/span><\/p>\n<p><span style=\"font-size: small\"><strong style=\"color: #d51224\">Sei sicuro che il tuo IT sia sufficientemente protetto da questo tipo di minacce?<\/strong><\/span><\/p>\n<p><span style=\"font-size: small\">Difendersi dai <\/span><strong style=\"font-size: small\">CryptoVirus <\/strong><span style=\"font-size: small\">\u00e8 oggi possibile con l\u2019implementazione delle soluzioni <\/span><strong style=\"font-size: small\">WatchGuard APT Blocker<\/strong><span style=\"font-size: small\"> una protezione dalle minacce in tempo reale, in pochi minuti, che sottopone i file sospetti che si intende analizzare ad una sandbox di nuova generazione, basata su Cloud. Il sistema di analisi affida alla tecnologia Lastline, in linea con quella che \u00e8 la strategia \u201cBest of breed\u201d.\u00a0<\/span><\/p>\n<p><span style=\"font-size: small\">L\u2019emulazione \u00e8 infatti la chiave di volta nel contrasto a questo nuovo tipo di minacce. <\/span><br \/><span style=\"font-size: small\">Queste minacce non solo \u00a0vengono \u201cimpacchettate\u201d in uno specifico modo, valido a massimizzare la penetrazione e la successiva diffusione all\u2019interno del target prescelto, ma fanno anche largo uso di tecniche di encryption e hiding che rendono il pacchetto \u201cesclusivo\u201d, unico e non classificabile globalmente.<\/span><br \/><span style=\"font-size: small\">Quindi il sandboxing diventa tecnica intelligente e affidabile: \u201cesegue\u201d il pacchetto in un ambiente chiuso, che emula un sistema operativo serve ad analizzare runtime le operazioni che quel pacchetto compie sul sistema, andando a rilevare alterazioni nelle componenti chiave, installazione di processi residenti, accesso alle funzioni dello stack di rete, operazioni di lock e molto altro.<\/span><\/p>\n<p><span style=\"font-size: small\"><strong>E\u2019 la tecnologia corretta che offre maggiore affidabilit\u00e0, velocit\u00e0 di analisi e poco impatto sulle performance del firewall<\/strong>, a patto, naturalmente, di poter ispezionare sull\u2019apparato tutti i possibili flussi (es. uso della HTTPs Deep Inspection) dai quali l\u2019APT pu\u00f2 giungere sul sistema.<\/span><br \/><span style=\"font-size: small\">In questo modo, <strong>WatchGuard APT Blocker<\/strong> \u00e8 in grado di ispezionare e valutare file compressi, Office file come doc\/ppt\/xls\/visio, PDF, tutti gli eseguibili Windows e anche i pacchetti .apk delle applicazioni per Android!<\/span><br \/><span style=\"color: #d51224;font-size: small\"><strong>\u00a0<\/strong><\/span><\/p>\n<p><span style=\"font-size: small\"><strong style=\"color: #d51224\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27400%27%20height%3D%27189%27%20viewBox%3D%270%200%20400%20189%27%3E%3Crect%20width%3D%27400%27%20height%3D%27189%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"\/wp-content\/uploads\/2017\/05\/WatchGuard.png\" alt=\"WatchGuard APT Blocker\" width=\"400\" height=\"189\" \/><\/strong><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-size: small\"><strong style=\"color: #d51224\">Come si configura WatchGuard APT Blocker<\/strong><\/span><\/p>\n<p><span style=\"font-size: small\">I firewall Firebox XTM di WatchGuard sono progettati per semplificare il processo di configurazione: gli utenti possono implementare questa sofisticata tecnologia in un paio di click!<\/span><br \/><span style=\"font-size: small\">Disponibile dalla versione Fireware OS 11.9, <strong>WatchGuard APT Blocker <\/strong>\u00e8 un servizio a sottoscrizione aggiuntivo che lavora assieme al Gateway AntiVirus a bordo del firewall.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Per difendersi dal cryptovirus (come il CryptoLocker), \u00e8 fondamentale comprendere come si diffonde e implementare soluzioni di sicurezza informatica avanzate come WatchGuard APT Blocker.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-49466","post","type-post","status-publish","format-standard","hentry","category-news-da-smeup"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Come difendersi dal CryptoVirus? - Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.smeup.com\/magazine\/blog\/come_difendersi_dal_crypto_virus\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Come difendersi dal CryptoVirus? - Magazine\" \/>\n<meta property=\"og:description\" content=\"Per difendersi dal cryptovirus (come il CryptoLocker), \u00e8 fondamentale comprendere come si diffonde e implementare soluzioni di sicurezza informatica avanzate come WatchGuard APT Blocker.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.smeup.com\/magazine\/blog\/come_difendersi_dal_crypto_virus\/\" \/>\n<meta property=\"og:site_name\" content=\"Magazine\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-09T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-07T11:19:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/04\/homepage-sito-smeup_seo-social.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"smeup\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"smeup\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/come_difendersi_dal_crypto_virus\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/come_difendersi_dal_crypto_virus\\\/\"},\"author\":{\"name\":\"smeup\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/194a55d96e7e52223a84ff78468bf5c7\"},\"headline\":\"Come difendersi dal CryptoVirus?\",\"datePublished\":\"2015-03-09T22:00:00+00:00\",\"dateModified\":\"2025-08-07T11:19:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/come_difendersi_dal_crypto_virus\\\/\"},\"wordCount\":591,\"commentCount\":0,\"articleSection\":[\"News da smeup\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/come_difendersi_dal_crypto_virus\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/come_difendersi_dal_crypto_virus\\\/\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/come_difendersi_dal_crypto_virus\\\/\",\"name\":\"Come difendersi dal CryptoVirus? - Magazine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#website\"},\"datePublished\":\"2015-03-09T22:00:00+00:00\",\"dateModified\":\"2025-08-07T11:19:11+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/194a55d96e7e52223a84ff78468bf5c7\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/come_difendersi_dal_crypto_virus\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/come_difendersi_dal_crypto_virus\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/come_difendersi_dal_crypto_virus\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Come difendersi dal CryptoVirus?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#website\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/\",\"name\":\"Magazine\",\"description\":\"smeup\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/194a55d96e7e52223a84ff78468bf5c7\",\"name\":\"smeup\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g\",\"caption\":\"smeup\"},\"sameAs\":[\"https:\\\/\\\/www.smeup.com\"],\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Come difendersi dal CryptoVirus? - Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.smeup.com\/magazine\/blog\/come_difendersi_dal_crypto_virus\/","og_locale":"it_IT","og_type":"article","og_title":"Come difendersi dal CryptoVirus? - Magazine","og_description":"Per difendersi dal cryptovirus (come il CryptoLocker), \u00e8 fondamentale comprendere come si diffonde e implementare soluzioni di sicurezza informatica avanzate come WatchGuard APT Blocker.","og_url":"https:\/\/www.smeup.com\/magazine\/blog\/come_difendersi_dal_crypto_virus\/","og_site_name":"Magazine","article_published_time":"2015-03-09T22:00:00+00:00","article_modified_time":"2025-08-07T11:19:11+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/04\/homepage-sito-smeup_seo-social.png","type":"image\/png"}],"author":"smeup","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"smeup","Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.smeup.com\/magazine\/blog\/come_difendersi_dal_crypto_virus\/#article","isPartOf":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/come_difendersi_dal_crypto_virus\/"},"author":{"name":"smeup","@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/194a55d96e7e52223a84ff78468bf5c7"},"headline":"Come difendersi dal CryptoVirus?","datePublished":"2015-03-09T22:00:00+00:00","dateModified":"2025-08-07T11:19:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/come_difendersi_dal_crypto_virus\/"},"wordCount":591,"commentCount":0,"articleSection":["News da smeup"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.smeup.com\/magazine\/blog\/come_difendersi_dal_crypto_virus\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.smeup.com\/magazine\/blog\/come_difendersi_dal_crypto_virus\/","url":"https:\/\/www.smeup.com\/magazine\/blog\/come_difendersi_dal_crypto_virus\/","name":"Come difendersi dal CryptoVirus? - Magazine","isPartOf":{"@id":"https:\/\/www.smeup.com\/magazine\/#website"},"datePublished":"2015-03-09T22:00:00+00:00","dateModified":"2025-08-07T11:19:11+00:00","author":{"@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/194a55d96e7e52223a84ff78468bf5c7"},"breadcrumb":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/come_difendersi_dal_crypto_virus\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.smeup.com\/magazine\/blog\/come_difendersi_dal_crypto_virus\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.smeup.com\/magazine\/blog\/come_difendersi_dal_crypto_virus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.smeup.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Come difendersi dal CryptoVirus?"}]},{"@type":"WebSite","@id":"https:\/\/www.smeup.com\/magazine\/#website","url":"https:\/\/www.smeup.com\/magazine\/","name":"Magazine","description":"smeup","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.smeup.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/194a55d96e7e52223a84ff78468bf5c7","name":"smeup","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g","caption":"smeup"},"sameAs":["https:\/\/www.smeup.com"],"url":"https:\/\/www.smeup.com\/magazine\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/49466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/comments?post=49466"}],"version-history":[{"count":2,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/49466\/revisions"}],"predecessor-version":[{"id":58336,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/49466\/revisions\/58336"}],"wp:attachment":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/media?parent=49466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/categories?post=49466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/tags?post=49466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}