{"version":"1.0","provider_name":"Tinexta Defence","provider_url":"https:\/\/tinextadefence.it\/en","title":"Mimic Ransomware\u00a0- Malware Analysis Report\u00a0 - Tinexta Defence","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"5XXShDnanq\"><a href=\"https:\/\/tinextadefence.it\/en\/mimic-ransomware-malware-analysis-report\/\">Mimic Ransomware - Malware Analysis Report\u00a0<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/tinextadefence.it\/en\/mimic-ransomware-malware-analysis-report\/embed\/#?secret=5XXShDnanq\" width=\"600\" height=\"338\" title=\"&#8220;Mimic Ransomware\u00a0&#8211; Malware Analysis Report\u00a0&#8221; &#8212; Tinexta Defence\" data-secret=\"5XXShDnanq\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/tinextadefence.it\/wp-includes\/js\/wp-embed.min.js\n<\/script>","thumbnail_url":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg","thumbnail_width":1200,"thumbnail_height":640,"description":"Questa settimana, il nostro Malware Lab ha preso in esame una macchina gi\u00e0 infettata da un campione che, dopo approfondite ricerche, abbiamo scoperto essere una versione 4.3 di Mimic Ransomware.\u00a0 Si tratta di una famiglia rara, ma che riesce ad essere comunque molto efficace e imprevedibile, dato che implementa molte tecniche dannose e offre supporto [&hellip;]"}