• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

 | 

Wing FTP Server flaw actively exploited shortly after technical details were made public

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

 | 

Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

McDonald’s job app exposes data of 64 Million applicants

 | 

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 

Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

 | 

U.S. CISA adds MRLG, PHPMailer, Rails Ruby on Rails, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

 | 

IT Worker arrested for selling access in $100M PIX cyber heist

 | 

New Batavia spyware targets Russian industrial enterprises

 | 

Taiwan flags security risks in popular Chinese apps after official probe

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Cyber Crime
  • Hacking
  • The ransomware attack on Westpole is disrupting digital services for Italian public administration

The ransomware attack on Westpole is disrupting digital services for Italian public administration

Pierluigi Paganini December 19, 2023

An alleged Lockbit 3.0 ransomware attack on the Italian cloud service provider Westpole disrupted multiple services of local and government organizations and municipalities.

A cyber attack hit on December 8, 2023 the Italian cloud service provider Westpole, which is specialized in digital services for public administration. The incident impacted a Westpole’s customer company named PA Digitale which offers its services to various local and government organizations that rely on its platform Urbi. PA Digitale provides its service to 1300 public administrations, including 540 municipalities.

The company notified the privacy regulator Garante della Privacy and the Italian police, which are investigating the cyber attack,

According to people with knowledge on the matter, Westpole was the victim of a ransomware attack. Threat actors employed the Lockbit 3.0 variant, however, at the time of this writing the company is not listed on the Tor leak site of the Lockbit gang.

The attackers employed Lockbit ransomware to target PA Digitale and the security incident paralyzed the services of the many public administrations and municipalities. Several municipalities were forced to return to manual operations to provide certain services. The Italian cybersecurity agency “Agenzia per la Cybersicurezza Nazionale (ACN)” is currently working to recover data for the impacted entities.

During the last hours, some of the Italian media reported that the attack could interfere with the payments of December salaries to the employees at some of the impacted government organizations.

The ACN provided the following statement:

“The activity carried out allowed the recovery of the data subject to the attack for more than 700 of the national and local public entities linked to the supply chain of PA Digitale S.p.A”. reported the ACN.

“For the remaining Administrations – there are approximately 1,000 public entities contractually linked to PA Digitale S.p.A. for the provision of management services of various kinds – the need remains to recover data dating back to the 3 days preceding the attack, which occurred on 8 December”.

“It should also be specified, as confirmed by the PA Digitale company itself, that the activity carried out allows us to avoid the feared failure to pay December salaries and the thirteenth salary to the employees of some indirectly affected local administrations”.

The extent of damage resulting from the ransomware attack is difficult to assess. According to the Italian media outlet La Repubblica, Westpole has only managed to restore 50% of its systems. The ACN indicates a slow and challenging recovery process, raising uncertainty about the company’s ability to fully restore the impacted systems. Experts caution that affected public administrations may struggle to fulfill certain services and obligations to their employees.

Immediately following the revelation of the Westpole attack, the cloud service provider asserted that no data was exfiltrated from its systems. However, if the ransomware attack is confirmed, it’s challenging to believe that a sophisticated group like Lockbit 3.0 refrained from exfiltrating any data.

The only certainty at the moment is that the attack on Westpole is the most serious suffered by the Italian public administration to date.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, ransomware)


facebook linkedin twitter

Hacking hacking news information security news IT Information Security Italy Lockbit Pierluigi Paganini ransomware Security Affairs Security News Westpole

you might also like

Pierluigi Paganini July 13, 2025
Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb
Read more
Pierluigi Paganini July 13, 2025
Wing FTP Server flaw actively exploited shortly after technical details were made public
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

    Security / July 13, 2025

    Wing FTP Server flaw actively exploited shortly after technical details were made public

    Hacking / July 13, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

    Breaking News / July 13, 2025

    Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

    Breaking News / July 13, 2025

    McDonald’s job app exposes data of 64 Million applicants

    Hacking / July 12, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT