{"version":"1.0","provider_name":"Blog KoDDoS","provider_url":"https:\/\/fr.koddos.net\/blog","author_name":"KoDDoS","author_url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/","title":"LES ROUTEURS D-LINK PIRAT\u00c9S PAR LES HACKERS - Blog KoDDoS","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"QqnI8wKQow\"><a href=\"https:\/\/fr.koddos.net\/blog\/les-routeurs-d-link-pirates-par-les-hackers\/\">LES ROUTEURS D-LINK PIRAT\u00c9S PAR LES HACKERS<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/fr.koddos.net\/blog\/les-routeurs-d-link-pirates-par-les-hackers\/embed\/#?secret=QqnI8wKQow\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0LES ROUTEURS D-LINK PIRAT\u00c9S PAR LES HACKERS\u00a0\u00bb &#8212; Blog KoDDoS\" data-secret=\"QqnI8wKQow\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/fr.koddos.net\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/04\/Cyber-Criminals-Hacked-Over-200000-Brazilian-Routers-to-Mine-Crypto.jpg?fit=739%2C484&ssl=1","thumbnail_width":739,"thumbnail_height":484,"description":"Les hackers utilisent depuis trois mois des routeurs D-Link pour pirater le trafic DNS, les attaques \u00e9tant toujours en cours. Les hackers ont utilis\u00e9 des exploits bien connus du microprogramme de routeur pour acc\u00e9der \u00e0 des p\u00e9riph\u00e9riques vuln\u00e9rables. Ils ont ensuite proc\u00e9d\u00e9 \u00e0 la modification des configurations DNS dans ces routeurs. Ces changements ont \u00e9t\u00e9 &hellip; Continue reading"}