In late April 2026, Sistemi Informativi, an Italian IT services company and a wholly-owned subsidiary of IBM Italy, suffered a major cyberattack. The company is a critical supplier, managing IT infrastructure for a wide range of public sector agencies and private companies across Italy. The incident has been contained, according to IBM, but intelligence sources suggest it was the work of Salt Typhoon, a sophisticated cyber espionage group attributed to China. This threat actor is known for targeting critical infrastructure providers, including telecommunications and government entities, often using exploits against network appliances rather than phishing. The attack on Sistemi Informativi represents a significant supply chain risk and is considered one of the most serious attacks on Italy's digital infrastructure in recent years.
The attack on Sistemi Informativi was confirmed by IBM on May 3, 2026. While details from the company are scarce, the nature of the target—a centralized IT provider for government and private industry—strongly suggests the motive was espionage and potential disruption of critical services. The incident was severe enough to prompt an immediate response from internal and external cybersecurity experts.
Attribution points towards Salt Typhoon, a Chinese state-sponsored APT group active since at least 2019. This group's modus operandi aligns with the profile of the attack. Salt Typhoon typically avoids common social engineering tactics like phishing, instead focusing on exploiting vulnerabilities in internet-facing network infrastructure, such as devices from Citrix and Cisco. By compromising a managed service provider (MSP) like Sistemi Informativi, the threat actor can gain access to a multitude of downstream client networks, making this a highly efficient supply chain attack.
While specific technical details of the Sistemi Informativi breach have not been publicly released, the known TTPs of the suspected threat actor, Salt Typhoon, provide a likely framework for the attack.
T1190 - Exploit Public-Facing Application: Salt Typhoon is known to exploit zero-day and n-day vulnerabilities in network appliances like Citrix ADCs and Cisco routers to gain initial access.T1078 - Valid Accounts: After initial access, the group focuses on stealing and using legitimate credentials to move through the network, a technique known as living-off-the-land (LotL). This allows their activity to blend in with normal administrative traffic.A compromise of a major MSP and government IT contractor like Sistemi Informativi has cascading and potentially severe consequences. The immediate impact is on the company itself, but the far greater risk lies with its extensive client base. The attackers could have gained access to sensitive data belonging to numerous Italian government agencies and private corporations. This could include citizen data, state secrets, intellectual property, and critical operational information. The attack serves as a stark reminder of the systemic risk posed by supply chain vulnerabilities, where the compromise of a single trusted provider can lead to the widespread breach of many other organizations. The incident has likely triggered a massive investigative and remediation effort across Italy's public and private sectors.
No specific indicators of compromise were provided in the source articles.
Based on the suspected actor (Salt Typhoon), security teams at organizations that were customers of Sistemi Informativi should hunt for the following:
log_sourceVPN/Firewall/ADC Logscommand_line_patternnetwork_traffic_patternuser_account_patternD3-SFA - System File Analysis.D3-OTF - Outbound Traffic Filtering) to detect any C2 communications from potentially compromised internal systems.Mitigating supply chain risk requires a multi-faceted approach.
M1030 - Network Segmentation.M1051 - Update Software.Aggressively patch internet-facing network devices like Citrix and Cisco appliances to close the vulnerabilities commonly exploited by Salt Typhoon.
Mapped D3FEND Techniques:
Implement a Zero Trust architecture that does not implicitly trust connections from third-party providers. Segment networks to limit the blast radius if a provider is compromised.
Mapped D3FEND Techniques:
Continuously scan for vulnerabilities on perimeter devices to identify and remediate weaknesses before they can be exploited.
To defend against actors like Salt Typhoon, who are known to exploit N-day and zero-day vulnerabilities, organizations must maintain an aggressive and comprehensive patch management program. This is especially critical for internet-facing network appliances such as Citrix ADCs, Cisco routers, and VPN concentrators. A 'patch Tuesday' mindset is insufficient; security teams must subscribe to vendor security advisories and be prepared to apply critical, out-of-band patches within hours or days of release, not weeks. Automating the patching process where possible and having a clear, tested emergency patching procedure is essential. For the customers of Sistemi Informativi, this means ensuring their own perimeter devices are fully patched, as the threat actor may use similar TTPs to target them directly.
Given that Salt Typhoon leverages legitimate credentials post-compromise, robust account monitoring is crucial. Organizations, particularly those connected to Sistemi Informativi, should implement enhanced monitoring of all accounts, especially privileged and service accounts. This includes baselining normal activity for these accounts and alerting on any deviations. For example, an alert should be triggered if an administrative account associated with the MSP logs in from an unexpected IP address, at an unusual time, or performs actions outside its normal scope. Ingesting authentication logs from Active Directory, VPNs, and network devices into a SIEM allows for the creation of correlation rules to detect such anomalies. This helps to identify the 'living-off-the-land' activity characteristic of this APT group before they can achieve their objectives.
The attack on Sistemi Informativi underscores the failure of implicit trust in supply chain partners. To mitigate this, organizations must adopt a Zero Trust approach, using network isolation and segmentation to limit the access of third-party providers. Connections from Sistemi Informativi or any other MSP should not grant broad access to the internal network. Instead, access should be restricted to only the specific systems and ports required for the provider to perform their duties. This can be enforced with firewall rules and network access control (NAC). By segmenting the network, an organization can contain a breach originating from a compromised partner, preventing the threat actor from moving laterally to high-value assets. This 'trust but verify' model is essential for resilience against supply chain attacks.
Sistemi Informativi was targeted by a significant cyberattack in late April 2026.
IBM confirmed the breach, stating the incident had been identified and contained.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.