{"id":34755,"date":"2023-12-22T09:55:00","date_gmt":"2023-12-22T09:55:00","guid":{"rendered":"https:\/\/www.cyberguru.it\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/"},"modified":"2024-01-05T13:12:02","modified_gmt":"2024-01-05T13:12:02","slug":"bec-attack-on-the-italian-state-mint-e3-million-theft-foiled","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/","title":{"rendered":"BEC attack on the Italian State Mint: \u20ac3 million theft foiled"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-the-human-factor-is-at-the-heart-of-the-incident-there-is-still-a-lot-to-do-on-the-training-front\"><em>The human factor is at the heart of the incident. There is still a lot to do on the training front<\/em><\/h2>\n\n\n\n<p><strong>The <a href=\"https:\/\/www.ipzs.it\/ext\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">Italian State Mint<\/a> was caught out because of a typical Business Email Compromise (BEC) attack. <br><\/strong>Some skilled scammer managed to wangle 3 million euros from the symbolic coin production institution. Fortunately, the story had a happy ending and the money was returned to the sender. The experience, however, not only led the victims who fell into the trap to suffer several sleepless nights but, in addition to causing damage to the image of a large company that works for the State, it highlighted how <strong>the risk of cyberattacks is always lurking just around the corner and depends for the most part on distraction, superficiality, naivety, emotionality, and lack of the necessary checks: in short, on the human factor.<\/strong>.. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-dynamics-of-theft\"><strong>The dynamics of theft<\/strong><\/h3>\n\n\n\n<p>The story began last May when hackers posed as a rebar supplier, communicating a change of IBAN and asking them to make future payments to this new account instead of the previous one. Of course, the hackers had already long since infiltrated the exchanges between the Italian State Mint and the supplier and were aware of the order.<\/p>\n\n\n\n<p>Therefore, the State Mint fell into the trap by making a payment of 3 million euros to the current account of the Hungarian credit institution MBH provided in the fraudulent email.<strong> One million left for Budapest on 15 May, and the other two million on the 26th<\/strong>.<\/p>\n\n\n\n<p>The same day at the Mint, they realised they had been scammed, and it was not a pleasant realisation.<\/p>\n\n\n\n<p>As soon as the alarm was triggered, the postal police intervened on time and 2 million euros were blocked before reaching Budapest.<\/p>\n\n\n\n<p>However, the million euros that had left first and in the name of the names associated with the hackers had already been transferred. In addition to the Postal Police, Interpol and the Italian Foreign Exchange Office (Ufficio Italiano dei Cambi \u2013 Uif) of the Bank of Italy were thus involved, which limited the damage as much as possible.<\/p>\n\n\n\n<p>Only 50,000 euros were irretrievably lost, while the remaining 950,000 euros were frozen and will soon be returned to the State Mint.<\/p>\n\n\n\n<p>Usually, the hackers&#8217; accomplices withdraw as much money as possible to drain the account. In this case, fortunately, they were not so quick.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-bec-scams\"><strong><a href=\"https:\/\/www.cyberguru.it\/2021\/12\/20\/bec-a-volte-non-fidarsi-e-meglio-anche-se-a-chiedercelo-e-il-grande-capo\/\" target=\"_blank\" rel=\"noreferrer noopener\">BEC scams<\/a><\/strong><\/h3>\n\n\n\n<p>This type of scam falls under the category of so-called &#8220;<strong>Business Email Compromise&#8221; (BEC). <\/strong> <br>These are attacks that have a particular target: employees and managers within a company can move money, either because it is requested directly from a superior or because they have direct relationships with the various suppliers.<\/p>\n\n\n\n<p>This is how hackers can pretend to be managers or suppliers, mainly through <strong>false emails<\/strong> (hence the name of the scam) but also through the use of <strong>deepfake<\/strong> techniques that reproduce human voices with extreme accuracy. In this way, they can ask victims, through emails or phone calls, to make transfers to current accounts belonging to criminal organisations.<\/p>\n\n\n\n<p>In addition, thanks to sophisticated social engineering techniques, criminals can obtain the information about potential victims, necessary to optimise criminal activities.<\/p>\n\n\n\n<p>The success of BEC scams requires, in fact, in addition to the fake email account, detailed knowledge of the identity of the officials to be contacted, the tone and phrasing of the purchase order and the communication jargon, as well as knowledge of the supplies to be ordered.<strong><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-latest-data-on-bec-attacks\"><strong>The latest data on BEC attacks<\/strong><\/h3>\n\n\n\n<p>The risks arising from this type of attack result in significant data loss, breach of cybersecurity systems and considerable economic damage.<\/p>\n\n\n\n<p>Last year, companies lost more than $2.7 billion to these scams, according to the most recent <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2022_IC3Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Internet Crime Report<\/a> from the <strong><a href=\"https:\/\/www.ic3.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">FBI&#8217;s Internet Crime Complaint Center (IC3)<\/a><\/strong>. That&#8217;s $300 million more than in 2021.<\/p>\n\n\n\n<p>These are <strong>losses up to 80 times greater<\/strong> than those caused by ransomware. <br><strong>According to the FBI&#8217;s IC3, <a href=\"https:\/\/www.proofpoint.com\/it\/threat-reference\/business-email-compromise\" target=\"_blank\" rel=\"noreferrer noopener\">BEC scams<\/a> accounted for as much as 27% of all financial losses caused by cybercrime in 2022<\/strong>. In addition, <strong>the average cost of an accident increased from $120,000 in 2021 to $124,000 in 2022<\/strong>.<\/p>\n\n\n\n<p>Although fewer complaints were filed with the FBI&#8217;s IC3 in 2022 <strong>(800,944 vs. 847,376<\/strong>), overall losses increased from <strong>$6.9 billion to over $10.2 billion<\/strong>, an increase of 48% over the previous year.<\/p>\n\n\n\n<p><strong>BEC attacks cause fewer victims than phishing, but the financial losses are much higher<\/strong>. These are highly targeted scams and therefore involve higher financial losses, even if their volume is low.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-defend-against-bec-attacks\"><strong>How to defend against <strong>BEC attacks<\/strong>?<\/strong><\/h2>\n\n\n\n<p>Criminals are becoming more and more cunning and their techniques more and more refined. However, this should not discourage us, because there are solutions to defend ourselves. It&#8217;s a matter of taking the right steps. First of all, we must keep in mind that these days, it is better not to trust anyone, even if it is our boss or the most loyal of our suppliers who are writing to us. Also, never lose focus and awareness of your actions online, and never act in a hurry or when distracted. <strong>These human &#8220;weaknesses&#8221; are, in fact, the cracks that cybercriminals slip through to launch their most vicious attacks<\/strong>. In addition, before making any payment, it is essential to always carry out all the necessary checks. <br><strong>Above all, however, you should never stop training in and practising cybersecurity<\/strong>. <br>It is a body of knowledge that must be kept continuously updated and that above all must be exercised through specific quality training programmes, which can be seamlessly tailored to the skills of each student and adapted to the characteristics of the organisation for which they work.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The human factor is at the heart of the incident. There is still a lot to do on the training front The Italian State Mint was caught out because of a typical Business Email Compromise (BEC) attack. Some skilled scammer managed to wangle 3 million euros from the symbolic coin production institution. Fortunately, the story [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":34684,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[422],"tags":[762,487,468,470],"class_list":["post-34755","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","tag-bec-en","tag-cyber-awareness-en-2","tag-cyber-security-en-2","tag-cyber-security-awareness-en-3"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>BEC attack on the Italian State Mint: \u20ac3 million theft foiled<\/title>\n<meta name=\"description\" content=\"The Italian State Mint was caught out because of a typical Business Email Compromise (BEC) attack\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BEC attack on the Italian State Mint: \u20ac3 million theft foiled\" \/>\n<meta property=\"og:description\" content=\"The Italian State Mint was caught out because of a typical Business Email Compromise (BEC) attack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-22T09:55:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-05T13:12:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/Imagoeconomica_1322309-scaled-1170x550-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"simona derubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"simona derubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/12\\\/22\\\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/12\\\/22\\\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\\\/\"},\"author\":{\"name\":\"simona derubis\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"headline\":\"BEC attack on the Italian State Mint: \u20ac3 million theft foiled\",\"datePublished\":\"2023-12-22T09:55:00+00:00\",\"dateModified\":\"2024-01-05T13:12:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/12\\\/22\\\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\\\/\"},\"wordCount\":925,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/12\\\/22\\\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Imagoeconomica_1322309-scaled-1170x550-1.jpg\",\"keywords\":[\"BEC\",\"Cyber Awareness\",\"Cyber Security\",\"Cyber Security Awareness\"],\"articleSection\":[\"Security Awareness\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/12\\\/22\\\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/12\\\/22\\\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/12\\\/22\\\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\\\/\",\"name\":\"BEC attack on the Italian State Mint: \u20ac3 million theft foiled\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/12\\\/22\\\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/12\\\/22\\\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Imagoeconomica_1322309-scaled-1170x550-1.jpg\",\"datePublished\":\"2023-12-22T09:55:00+00:00\",\"dateModified\":\"2024-01-05T13:12:02+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"description\":\"The Italian State Mint was caught out because of a typical Business Email Compromise (BEC) attack\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/12\\\/22\\\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/12\\\/22\\\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/12\\\/22\\\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Imagoeconomica_1322309-scaled-1170x550-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Imagoeconomica_1322309-scaled-1170x550-1.jpg\",\"width\":1170,\"height\":550,\"caption\":\"ISTITUTO POLIGRAFICO E ZECCA DELLO STATO DI ROMA ESTERNI\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/12\\\/22\\\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BEC attack on the Italian State Mint: \u20ac3 million theft foiled\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\",\"name\":\"simona derubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"caption\":\"simona derubis\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/simona-derubis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"BEC attack on the Italian State Mint: \u20ac3 million theft foiled","description":"The Italian State Mint was caught out because of a typical Business Email Compromise (BEC) attack","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/","og_locale":"en_US","og_type":"article","og_title":"BEC attack on the Italian State Mint: \u20ac3 million theft foiled","og_description":"The Italian State Mint was caught out because of a typical Business Email Compromise (BEC) attack","og_url":"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2023-12-22T09:55:00+00:00","article_modified_time":"2024-01-05T13:12:02+00:00","og_image":[{"width":1170,"height":550,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/Imagoeconomica_1322309-scaled-1170x550-1.jpg","type":"image\/jpeg"}],"author":"simona derubis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"simona derubis","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/"},"author":{"name":"simona derubis","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"headline":"BEC attack on the Italian State Mint: \u20ac3 million theft foiled","datePublished":"2023-12-22T09:55:00+00:00","dateModified":"2024-01-05T13:12:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/"},"wordCount":925,"commentCount":0,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/Imagoeconomica_1322309-scaled-1170x550-1.jpg","keywords":["BEC","Cyber Awareness","Cyber Security","Cyber Security Awareness"],"articleSection":["Security Awareness"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/","url":"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/","name":"BEC attack on the Italian State Mint: \u20ac3 million theft foiled","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/Imagoeconomica_1322309-scaled-1170x550-1.jpg","datePublished":"2023-12-22T09:55:00+00:00","dateModified":"2024-01-05T13:12:02+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"description":"The Italian State Mint was caught out because of a typical Business Email Compromise (BEC) attack","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/Imagoeconomica_1322309-scaled-1170x550-1.jpg","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/Imagoeconomica_1322309-scaled-1170x550-1.jpg","width":1170,"height":550,"caption":"ISTITUTO POLIGRAFICO E ZECCA DELLO STATO DI ROMA ESTERNI"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2023\/12\/22\/bec-attack-on-the-italian-state-mint-e3-million-theft-foiled\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"BEC attack on the Italian State Mint: \u20ac3 million theft foiled"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484","name":"simona derubis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","caption":"simona derubis"},"url":"https:\/\/www.cyberguru.it\/en\/author\/simona-derubis\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/34755","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=34755"}],"version-history":[{"count":2,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/34755\/revisions"}],"predecessor-version":[{"id":34785,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/34755\/revisions\/34785"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/34684"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=34755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=34755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=34755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}