Financial highlights
Last trade 63.20€
Variation -1.65%
19/03/2026 - 05:37 PM
data source: Investis Digital
Financial highlights
Last trade 63.20€
Variation -1.65%
19/03/2026 - 05:37 PM
data source: Investis Digital
Financial Results & Reports
Press releases
The latest report issued by the Leonardo Security Operation Centre (SOC) on the principal cyber threats between April and June 2022 is now online. The Ukraine conflict is still a key focus, along with the emergence of new attack techniques and malware.
The new Cyber Threats Snapshot Report analyses the most significant threat actors, vulnerabilities and cybercrime activities in Q2 2022. The report, issued by Leonardo’s Cyber Threat Intelligence experts, focuses on various trends prevalent during the period:
Pro-Russian and pro-Ukrainian threat actors: the battle in cyberspace continues
Since the beginning of the conflict, between April and June 2022 pro-Russian threat actors have continued to perpetrate malicious activities against countries that support Ukraine. The most common action was the DDoS (Distributed Denial of Service) attack, which disrupts the regular operation of a website or system by sending continuous requests that saturate its resources. Attacks on critical infrastructure and organisations operating in the airport, banking, military, government and public administration sectors also affected private and public Italian companies. Pro-Ukrainian threat actors countered the activities of their pro-Russian counterparts with similar actions and targets.
In this hybrid war there are new, specially-designed artefacts, like the Acid Rain wiper. This malware seeks to erase data and programmes on devices, rendering them unusable. In this case, it targeted a satellite communication service, leaving users in Ukraine and other European countries without internet services for several days. Many other attacks also damaged ICS and SCADA systems used to control and supervise industrial plants.
Exploiting trust to scam the user
A novel Browsing-in-the-Browser (BITB) attack technique appeared in Q2 2022. It comes under the heading of phishing – a technique through which an attacker tries to scam the victim into providing personal information, financial data or access codes by pretending to be a trustworthy party in a digital exchange. This technique is used to simulate single sign-on access windows and to replicate legitimate domains in an attempt to obtain access credentials.
Familiar techniques such as web skimming and Hertzbleed were also very prevalent. The former involves malicious activities designed to collect the payment details of visitors to a website during check-out. By exploiting vulnerabilities in e-commerce platforms, attackers can exfiltrate victims’ credentials and bank account or credit card information.
The second technique involves a side-channel attack, i.e. an attack aimed at a device with the objective of collecting information that can be used to hack the same. This allows a malicious user to obtain complete cryptographic keys from remote servers regarded as trustworthy.
New malware: from embryonic to modular
The quarterly report identifies a variety of new forms of malware:
For further information: cyberandsecurity@leonardo.com
Follow our Twitter, LinkedIn and Instagram social media channels to keep up to date on Leonardo initiatives.
2026-03-19T18:40:45Z
cookie_disclaimer:true
page_disclaimer :false