Pietro Melillo : 24 June 2024 14:41
Recently, Handala, a malicious actor, posted on a well-known dark web forum, claiming a cyber attack against Zerto, a subsidiary of Hewlett Packard Enterprise (HPE). Zerto is renowned for its advanced solutions for disaster recovery, ransomware resilience, and workload mobility, specifically designed for virtualized infrastructures and cloud environments.
Handala (threat actor) attacked Zerto (one of the largest Zionist cybersecurity companies in the world).
Zerto, a Hewlett Packard Enterprise company, enables customers to manage always-on business by simplifying the protection, recovery, and mobility of on-premises and cloud applications. Zerto’s cloud data management and protection platform eliminates the risks and complexity of modernization and cloud adoption through private, public, and hybrid implementations.
The software-only platform uses continuous data protection at scale to converge disaster recovery, backup, and data mobility. Zerto is trusted by over 9,500 customers globally and powers offerings for Microsoft Azure, IBM Cloud, AWS, Google Cloud, Oracle Cloud, and more than 350 managed service providers. Zerto provides backup and recovery for SaaS applications like Microsoft 365, Dynamics 365, Azure Active Directory, Salesforce, Google Workspace, and more. This company has over $300 million in revenue!
These foolish Zionists can’t even provide their own cybersecurity; do you really think they can provide it to you? It’s ridiculous! 51 TB of data downloaded and deleted! Some emails sent…
Corso sulla NIS2
La direttiva NIS2 rappresenta una delle novità più importanti per la sicurezza informatica in Europa, imponendo nuovi obblighi alle aziende e alle infrastrutture critiche per migliorare la resilienza contro le cyber minacce. Con scadenze stringenti e penalità elevate per chi non si adegua, comprendere i requisiti della NIS2 è essenziale per garantire la compliance e proteggere la tua organizzazione.
Accedi alla pagina del corso condotto dall'Avv. Andrea Capelli sulla nostra Academy e segui l'anteprima gratuita.
Per un periodo limitato, potrai utilizzare il COUPON NIS-84726 che ti darà diritto ad uno sconto del 20% sul prezzo di copertina del corso
Per ulteriori informazioni, scrivici ad [email protected] oppure scrivici su Whatsapp al 379 163 8765
Supporta RHC attraverso:
Ti piacciono gli articoli di Red Hot Cyber? Non aspettare oltre, iscriviti alla newsletter settimanale per non perdere nessun articolo.
Handala is a pro-Palestinian hacker group known for its targeted attacks against Israeli entities and their allies. This group has gained notoriety for several high-profile operations, including sending threatening messages to Israeli citizens and claiming to have compromised Israel’s radar systems and Iron Dome missile defense. Handala’s attacks are often politically motivated, aimed at spreading political messages and destabilizing critical infrastructures.
Recently, Handala claimed an attack on the messaging app Viber, stating they had stolen 740 GB of data, including source code and other sensitive information. The group also demanded a ransom of 8 Bitcoin, equivalent to approximately $583,000, for the release of the stolen data.
Handala uses various advanced attack techniques, including phishing and SQL injection, to compromise their victims. Their activities are primarily motivated by support for the Palestinian cause, and they continue to target various sectors, including infrastructure, technology companies, and Israeli defense systems.
The malicious actor stated that the attack was not carried out for financial gain or industrial espionage but for political reasons.
“These foolish Zionists can’t even provide their own cybersecurity; do you really think they can provide it to you? It’s ridiculous!”
This statement highlights a growing trend of cyber attacks motivated by ideological causes rather than economic interests.
The malicious actor’s post claims that 51 terabytes (TB) of data were stolen and subsequently deleted. This volume of data represents a significant amount of information, which could include:
The malicious actor shared a Telegram channel in the post, likely used to disseminate further details about the attack and possibly coordinate further actions. The inclusion of an image related to the attack adds an additional layer of credibility to the claim.
The attack on Zerto serves as a severe warning to all companies operating in the cybersecurity and cloud computing sectors. The political motivation behind the attack adds a complex dimension to cybersecurity, requiring more sophisticated defense strategies and greater awareness of threats.