{"id":3203,"date":"2026-01-19T17:15:58","date_gmt":"2026-01-19T16:15:58","guid":{"rendered":"https:\/\/cyberoperations.hu\/?p=3203"},"modified":"2026-01-19T17:15:58","modified_gmt":"2026-01-19T16:15:58","slug":"amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol","status":"publish","type":"post","link":"https:\/\/cyberoperations.hu\/it\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/","title":{"rendered":"Quando BitLocker diventa un&#039;arma: lezioni dall&#039;attacco ransomware all&#039;autorit\u00e0 idrica rumena"},"content":{"rendered":"<p data-start=\"150\" data-end=\"597\">Questa settimana \u00e8 venuto alla luce un incidente di sicurezza informatica particolarmente istruttivo e allarmante: <strong data-start=\"249\" data-end=\"310\">L&#039;Autorit\u00e0 nazionale idrica rumena colpita da un attacco ransomware<\/strong>, cio\u00e8 il <strong data-start=\"320\" data-end=\"361\"><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Administra\u021bia Na\u021bional\u0103 Apele Rom\u00e2ne<\/span><\/span><\/strong> organizzazione. L&#039;attacco \u00e8 stato effettuato utilizzando un metodo basato su BitLocker e, sebbene i sistemi OT che controllano l&#039;infrastruttura idrica non siano stati compromessi, il danno all&#039;ambiente IT rappresenta di per s\u00e9 un grave rischio operativo e normativo.<\/p>\n<p data-start=\"599\" data-end=\"1068\">Secondo le informazioni disponibili, circa <strong data-start=\"650\" data-end=\"671\">1000 postazioni di lavoro<\/strong> \u00e8 diventato inutilizzabile, e <strong data-start=\"699\" data-end=\"742\">Sono stati colpiti 10 uffici regionali su 11<\/strong>. Sistemi GIS, database, servizi di posta elettronica e server web erano inattivi mentre gli aggressori chiedevano un riscatto. Questo incidente ha dimostrato ancora una volta che per un&#039;organizzazione che gestisce infrastrutture critiche, il solo guasto dei sistemi IT \u00e8 sufficiente a compromettere l&#039;esecuzione delle attivit\u00e0 di base.<\/p>\n<p data-start=\"1070\" data-end=\"1609\">Tuttavia, una delle lezioni pi\u00f9 importanti della storia non \u00e8 il fatto dell&#039;attacco in s\u00e9, ma <strong data-start=\"1150\" data-end=\"1176\">il modo in cui \u00e8 successo<\/strong>. Gli aggressori non hanno utilizzato un ransomware classico e facilmente riconoscibile, ma hanno utilizzato come arma una funzione di sistema legittima, la crittografia delle unit\u00e0 BitLocker. Dopo l&#039;infiltrazione, si sono spostati lateralmente nella rete e hanno attivato la crittografia localmente. Le soluzioni antivirus ed EDR tradizionali sono praticamente impotenti in questa situazione: non &quot;vedono&quot; il vero malware, poich\u00e9 \u00e8 in esecuzione una funzione integrata di Windows.<\/p>\n<p data-start=\"1611\" data-end=\"2020\">Questo \u00e8 esattamente lo scenario che il <strong data-start=\"1652\" data-end=\"1707\">la protezione reattiva basata sulla firma non \u00e8 preparata<\/strong>. Quando l&#039;EDR emette l&#039;avviso, i dati sono gi\u00e0 crittografati, le operazioni aziendali sono state interrotte e l&#039;organizzazione si trova di fronte a una scelta: pagare o avviare un lungo processo di ripristino. Nel caso di un&#039;istituzione che gestisce un&#039;infrastruttura critica in base allo standard NIS2, si tratta di un problema non solo tecnico, ma anche <strong data-start=\"1978\" data-end=\"2016\">questione normativa e di responsabilit\u00e0<\/strong> Anche.<\/p>\n<p data-start=\"2022\" data-end=\"2580\">Ed ecco che arriva la vera domanda &quot;cosa succederebbe se&quot;. A <strong data-start=\"2074\" data-end=\"2120\">protezione degli endpoint realmente preventiva e basata sull&#039;intelligenza artificiale<\/strong> in questo caso sarebbe intervenuto molto prima. <strong data-start=\"2178\" data-end=\"2219\"><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Istinto profondo<\/span><\/span><\/strong> Ad esempio, la sua tecnologia di apprendimento profondo non prende decisioni basate su modelli comportamentali o firme note, ma piuttosto analizza le caratteristiche matematiche del codice e <strong data-start=\"2361\" data-end=\"2409\">blocca l&#039;attacco prima che venga eseguito<\/strong>. Ci\u00f2 significa che i ransomware sconosciuti di tipo 0-day, compresi gli attacchi che sfruttano BitLocker, semplicemente non arriveranno al punto di causare danni.<\/p>\n<p data-start=\"2582\" data-end=\"2973\">Un altro vantaggio della soluzione \u00e8 che <strong data-start=\"2614\" data-end=\"2636\">NGAV ed EDR in uno<\/strong>, con un tasso di falsi allarmi estremamente basso che non sovraccarica i team SOC ed \u00e8 in grado di prendere decisioni anche in ambienti offline. Se fai tutto questo in un <strong data-start=\"2784\" data-end=\"2825\"><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Cyber Stellare<\/span><\/span><\/strong> Se lo integriamo con una piattaforma XDR basata sul Web, otterremo un quadro completo dei tentativi di attacco non solo sugli endpoint, ma anche sul lato rete e server.<\/p>\n<p data-start=\"2975\" data-end=\"3268\">Il caso dell&#039;autorit\u00e0 idrica rumena \u00e8 un perfetto esempio di come <strong data-start=\"3035\" data-end=\"3082\">se BitLocker sta gi\u00e0 crittografando, \u00e8 troppo tardi<\/strong>. In questo caso, non ci sono dati, non c&#039;\u00e8 sistema, non c&#039;\u00e8 operazione: solo gestione della crisi. Con un approccio preventivo, tuttavia, non si verificano perdite di dati, riscatti o arresti forzati.<\/p>\n<p data-start=\"3270\" data-end=\"3505\" data-is-last-node=\"\" data-is-only-node=\"\">La questione oggi non \u00e8 pi\u00f9 se un&#039;organizzazione \u00e8 sotto attacco. La questione \u00e8 se <strong data-start=\"3347\" data-end=\"3396\">Ce ne accorgeremo in tempo o non accadr\u00e0 affatto?<\/strong>. Per le infrastrutture critiche e le organizzazioni interessate da NIS2, questo non \u00e8 un lusso tecnologico, ma un requisito fondamentale.<\/p>","protected":false},"excerpt":{"rendered":"<p>A h\u00e9ten egy k\u00fcl\u00f6n\u00f6sen tanuls\u00e1gos \u2013 \u00e9s egyben riaszt\u00f3 \u2013 kiberbiztons\u00e1gi incidens l\u00e1tott napvil\u00e1got: ransomware t\u00e1mad\u00e1s \u00e9rte a rom\u00e1n Nemzeti [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":3204,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3203","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-egyeb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Amikor a BitLocker v\u00e1lik fegyverr\u00e9 \u2013 tanuls\u00e1gok a rom\u00e1n v\u00edz\u00fcgyi hat\u00f3s\u00e1g elleni ransomware t\u00e1mad\u00e1sb\u00f3l - Cyber Operations Group Kft.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberoperations.hu\/it\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Amikor a BitLocker v\u00e1lik fegyverr\u00e9 \u2013 tanuls\u00e1gok a rom\u00e1n v\u00edz\u00fcgyi hat\u00f3s\u00e1g elleni ransomware t\u00e1mad\u00e1sb\u00f3l\" \/>\n<meta property=\"og:description\" content=\"A h\u00e9ten egy k\u00fcl\u00f6n\u00f6sen tanuls\u00e1gos \u2013 \u00e9s egyben riaszt\u00f3 \u2013 kiberbiztons\u00e1gi incidens l\u00e1tott napvil\u00e1got: ransomware t\u00e1mad\u00e1s \u00e9rte a rom\u00e1n Nemzeti [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberoperations.hu\/it\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Operations Group Kft.\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-19T16:15:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2026\/01\/Vizugy_hacker_tamadas-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sales Cyberoperations\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sales Cyberoperations\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\\\/\"},\"author\":{\"name\":\"Sales Cyberoperations\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/person\\\/ca194f8232fedc6dfea84a20e83bebbe\"},\"headline\":\"Amikor a BitLocker v\u00e1lik fegyverr\u00e9 \u2013 tanuls\u00e1gok a rom\u00e1n v\u00edz\u00fcgyi hat\u00f3s\u00e1g elleni ransomware t\u00e1mad\u00e1sb\u00f3l\",\"datePublished\":\"2026-01-19T16:15:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\\\/\"},\"wordCount\":700,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Vizugy_hacker_tamadas.png\",\"articleSection\":[\"Egy\u00e9b\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\\\/\",\"name\":\"Amikor a BitLocker v\u00e1lik fegyverr\u00e9 \u2013 tanuls\u00e1gok a rom\u00e1n v\u00edz\u00fcgyi hat\u00f3s\u00e1g elleni ransomware t\u00e1mad\u00e1sb\u00f3l - Cyber Operations Group Kft.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Vizugy_hacker_tamadas.png\",\"datePublished\":\"2026-01-19T16:15:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Vizugy_hacker_tamadas.png\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Vizugy_hacker_tamadas.png\",\"width\":2240,\"height\":1260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Kezd\u0151lap\",\"item\":\"https:\\\/\\\/cyberoperations.hu\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Amikor a BitLocker v\u00e1lik fegyverr\u00e9 \u2013 tanuls\u00e1gok a rom\u00e1n v\u00edz\u00fcgyi hat\u00f3s\u00e1g elleni ransomware t\u00e1mad\u00e1sb\u00f3l\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"name\":\"Cyber Operations Group Kft.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberoperations.hu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\",\"name\":\"Cyber Operations Group Kft.\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"width\":1500,\"height\":400,\"caption\":\"Cyber Operations Group Kft.\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/person\\\/ca194f8232fedc6dfea84a20e83bebbe\",\"name\":\"Sales Cyberoperations\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/it\\\/author\\\/sales\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Quando BitLocker diventa un&#039;arma: lezioni dall&#039;attacco ransomware all&#039;autorit\u00e0 idrica rumena - Cyber Operations Group Kft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberoperations.hu\/it\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/","og_locale":"it_IT","og_type":"article","og_title":"Amikor a BitLocker v\u00e1lik fegyverr\u00e9 \u2013 tanuls\u00e1gok a rom\u00e1n v\u00edz\u00fcgyi hat\u00f3s\u00e1g elleni ransomware t\u00e1mad\u00e1sb\u00f3l","og_description":"A h\u00e9ten egy k\u00fcl\u00f6n\u00f6sen tanuls\u00e1gos \u2013 \u00e9s egyben riaszt\u00f3 \u2013 kiberbiztons\u00e1gi incidens l\u00e1tott napvil\u00e1got: ransomware t\u00e1mad\u00e1s \u00e9rte a rom\u00e1n Nemzeti [&hellip;]","og_url":"https:\/\/cyberoperations.hu\/it\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/","og_site_name":"Cyber Operations Group Kft.","article_published_time":"2026-01-19T16:15:58+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2026\/01\/Vizugy_hacker_tamadas-1024x576.png","type":"image\/png"}],"author":"Sales Cyberoperations","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Sales Cyberoperations","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberoperations.hu\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/#article","isPartOf":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/"},"author":{"name":"Sales Cyberoperations","@id":"https:\/\/cyberoperations.hu\/#\/schema\/person\/ca194f8232fedc6dfea84a20e83bebbe"},"headline":"Amikor a BitLocker v\u00e1lik fegyverr\u00e9 \u2013 tanuls\u00e1gok a rom\u00e1n v\u00edz\u00fcgyi hat\u00f3s\u00e1g elleni ransomware t\u00e1mad\u00e1sb\u00f3l","datePublished":"2026-01-19T16:15:58+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/"},"wordCount":700,"commentCount":0,"publisher":{"@id":"https:\/\/cyberoperations.hu\/#organization"},"image":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2026\/01\/Vizugy_hacker_tamadas.png","articleSection":["Egy\u00e9b"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cyberoperations.hu\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cyberoperations.hu\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/","url":"https:\/\/cyberoperations.hu\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/","name":"Quando BitLocker diventa un&#039;arma: lezioni dall&#039;attacco ransomware all&#039;autorit\u00e0 idrica rumena - Cyber Operations Group Kft.","isPartOf":{"@id":"https:\/\/cyberoperations.hu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/#primaryimage"},"image":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2026\/01\/Vizugy_hacker_tamadas.png","datePublished":"2026-01-19T16:15:58+00:00","breadcrumb":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberoperations.hu\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/cyberoperations.hu\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/#primaryimage","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2026\/01\/Vizugy_hacker_tamadas.png","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2026\/01\/Vizugy_hacker_tamadas.png","width":2240,"height":1260},{"@type":"BreadcrumbList","@id":"https:\/\/cyberoperations.hu\/amikor-a-bitlocker-valik-fegyverre-tanulsagok-a-roman-vizugyi-hatosag-elleni-ransomware-tamadasbol\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Kezd\u0151lap","item":"https:\/\/cyberoperations.hu\/"},{"@type":"ListItem","position":2,"name":"Amikor a BitLocker v\u00e1lik fegyverr\u00e9 \u2013 tanuls\u00e1gok a rom\u00e1n v\u00edz\u00fcgyi hat\u00f3s\u00e1g elleni ransomware t\u00e1mad\u00e1sb\u00f3l"}]},{"@type":"WebSite","@id":"https:\/\/cyberoperations.hu\/#website","url":"https:\/\/cyberoperations.hu\/","name":"Cyber Operations Group Ltd.","description":"","publisher":{"@id":"https:\/\/cyberoperations.hu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberoperations.hu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/cyberoperations.hu\/#organization","name":"Cyber Operations Group Ltd.","url":"https:\/\/cyberoperations.hu\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","width":1500,"height":400,"caption":"Cyber Operations Group Kft."},"image":{"@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cyberoperations.hu\/#\/schema\/person\/ca194f8232fedc6dfea84a20e83bebbe","name":"Vendite Cyberoperations","url":"https:\/\/cyberoperations.hu\/it\/author\/sales\/"}]}},"_links":{"self":[{"href":"https:\/\/cyberoperations.hu\/it\/wp-json\/wp\/v2\/posts\/3203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberoperations.hu\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberoperations.hu\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/it\/wp-json\/wp\/v2\/comments?post=3203"}],"version-history":[{"count":0,"href":"https:\/\/cyberoperations.hu\/it\/wp-json\/wp\/v2\/posts\/3203\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/it\/wp-json\/wp\/v2\/media\/3204"}],"wp:attachment":[{"href":"https:\/\/cyberoperations.hu\/it\/wp-json\/wp\/v2\/media?parent=3203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberoperations.hu\/it\/wp-json\/wp\/v2\/categories?post=3203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberoperations.hu\/it\/wp-json\/wp\/v2\/tags?post=3203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}