{"id":1118,"date":"2019-08-12T15:31:07","date_gmt":"2019-08-12T13:31:07","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=1118"},"modified":"2019-08-13T15:38:47","modified_gmt":"2019-08-13T13:38:47","slug":"le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/","title":{"rendered":"LE C\u00c2BLE O.MG PERMET AUX HACKERS DE PIRATER UN MAC"},"content":{"rendered":"\n<p>Les appareils Android ne sont pas les seuls \u00e0 risquer de\nsubir des cyberattaques.Il s&rsquo;av\u00e8re que les utilisateurs d&rsquo;Apple peuvent \u00eatre\nvictimes de man\u0153uvres malveillants par des moyens apparemment inoffensifs,\nnotamment le c\u00e2ble d&rsquo;\u00e9clairage fourni avec les <strong><a href=\"https:\/\/koddos.net\/blog\/cryptomining-malware-attacks-on-iphones-grew-by-400\/\">iPhones<\/a><\/strong>,\nm\u00eame avec le tout dernier iPhone XS et AirPods. <\/p>\n\n\n\n<p>Les hackers utilisent une version modifi\u00e9e du c\u00e2ble susmentionn\u00e9\npour vuln\u00e9rabiliser les syst\u00e8mes de s\u00e9curit\u00e9 et \u00ab\u00a0pirater\u00a0\u00bb les\nordinateurs Mac, en faisant r\u00e9gner la terreur dans le milieu de la\ncybers\u00e9curit\u00e9.<\/p>\n\n\n\n<p><strong>Une version modifi\u00e9e d&rsquo;un c\u00e2ble iPhone<\/strong><\/p>\n\n\n\n<p>Vice rapporte que MG, qui est un chercheur connu dans le domaine\nde la s\u00e9curit\u00e9, a r\u00e9cemment pr\u00e9sent\u00e9 une version modifi\u00e9e du fameux c\u00e2ble\nLigthning, qui a la capacit\u00e9 de prendre le contr\u00f4le de l&rsquo;appareil des\nutilisateurs na\u00effs et de fournir au hackers les outils dont il a besoin pour\nacc\u00e9der \u00e0 distance \u00e0 l&rsquo;ordinateur, notamment toutes les donn\u00e9es et informations\npertinentes dans les unit\u00e9s de stockage.<\/p>\n\n\n\n<p>L&rsquo;annonce faite par MG est intervenue lors de la r\u00e9union\nannuelle de piratage <strong><a href=\"https:\/\/koddos.net\/blog\/darpa-to-expose-its-new-voting-system-security-to-hackers-at-this-years-def-con\/\">Def\nCon<\/a><\/strong>, o\u00f9 il a expliqu\u00e9 plus de d\u00e9tails sur le c\u00e2ble qui a\ninqui\u00e9t\u00e9 et a alarm\u00e9 chaque utilisateur d&rsquo;iPhone et de Mac.MG a appel\u00e9 le petit\naccessoire \u00abc\u00e2ble O.MG\u00bb, un jeu de mots intelligent.<\/p>\n\n\n\n<p>L&rsquo;expert a fait remarquer que, bien qu&rsquo;il ressemble bien \u00e0\nun c\u00e2ble, en \u00e9tat de marche et pleinement fonctionnel, ce n&rsquo;est pas du tout le\ncas en r\u00e9alit\u00e9.Il a \u00e9galement d\u00e9clar\u00e9 que m\u00eame l&rsquo;ordinateur ne ferait pas la\ndiff\u00e9rence entre un c\u00e2ble O.MG et un c\u00e2ble l\u00e9gitime jusqu&rsquo;\u00e0 ce que le hacker en\nprenne le contr\u00f4le.<\/p>\n\n\n\n<p>MG a \u00e9galement expliqu\u00e9 ce qu&rsquo;un hacker pourrait faire pour\nexploiter les failles du syst\u00e8me de la victime tout en utilisant le c\u00e2ble.Il a\nd\u00e9clar\u00e9 qu&rsquo;il serait simple de changer de c\u00e2ble avec le c\u00e2ble O.MG pour prendre\nle contr\u00f4le de l&rsquo;ordinateur de la victime.<\/p>\n\n\n\n<p>Par exemple, MG sugg\u00e8re que le c\u00e2ble malveillant pourrait\n\u00eatre donn\u00e9 \u00e0 la victime comme un cadeau, \u00e9tant donn\u00e9 qu&rsquo;il est si difficile\nd&rsquo;identifier les diff\u00e9rences entre la vraie et la version modifi\u00e9e et\nmalveillante de celle-ci.<\/p>\n\n\n\n<p><strong>Le c\u00e2ble ressemble exactement \u00e0 celui d&rsquo;IPhone<\/strong><\/p>\n\n\n\n<p>L&rsquo;une des situations les plus dangereuses pour les victimes\npotentielles est que le c\u00e2ble O.MG ressemble presque exactement \u00e0 un c\u00e2ble\nl\u00e9gitime, m\u00eame avec le petit papier collant qui tient tout ensemble que les\ncordons des g\u00e9ants de la technologie fournissent.<\/p>\n\n\n\n<p>Le \u00abplaisir\u00bb (pour l&rsquo;attaquant, du moins, pas pour la\nvictime) commence lorsque l&rsquo;individu cibl\u00e9 branche la version modifi\u00e9e et\nmalveillante du c\u00e2ble sur son ordinateur.\u00c0 ce moment, le <strong><a href=\"https:\/\/koddos.net\/blog\/a-hacker-performing-ddos-attacks-is-threatening-mortal-kombats-online-league\/\">hacker\n<\/a><\/strong>&nbsp;pourra \u00e9crire l&rsquo;adresse\nIP du c\u00e2ble dans le navigateur d&rsquo;un t\u00e9l\u00e9phone.En y \u00e9tant, l&rsquo;attaquant aura\nplusieurs options pour infliger des d\u00e9g\u00e2ts, l&rsquo;acc\u00e8s au terminal \u00e9tant la plus\nimportante.<\/p>\n\n\n\n<p>Une fois dans le terminal, l\u2019attaquant aura la possibilit\u00e9\nd\u2019ex\u00e9cuter des applications et de contr\u00f4ler d\u2019autres outils sur l&rsquo;ordinateur de\nla victime.Tout cela a \u00e9t\u00e9 r\u00e9alis\u00e9 avec un c\u00e2ble qui ressemble \u00e0 un vrai, mais\nne l\u2019est pas.<\/p>\n\n\n\n<p>L&rsquo;histoire du c\u00e2ble a \u00e9t\u00e9 publi\u00e9e dans le compte Twitter de\nCybersolutions, qui expliquait que le c\u00e2ble \u00e9tait utilis\u00e9 et branch\u00e9 comme un\nvrai c\u00e2ble et avait des r\u00e9sultats normaux : apr\u00e8s l&rsquo;avoir connect\u00e9 \u00e0 un iPod et\nun Mac, le t\u00e9l\u00e9phone a commenc\u00e9 \u00e0 se charger, les iTunes l&rsquo;ont d\u00e9tect\u00e9 et\nl&rsquo;iPod a demand\u00e9 si on pouvait lui faire confiance ou pas.<\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer &#8211; <br><br>I plugged the Apple lightning cable into my iPod and connected it to my Mac, just as I normally would. My iPod started charging, iTunes detected the device, and my iPod produced &#8230;<a href=\"https:\/\/t.co\/vmbpT9PXOo\">https:\/\/t.co\/vmbpT9PXOo<\/a> <a href=\"https:\/\/t.co\/pw57FOMwzL\">pic.twitter.com\/pw57FOMwzL<\/a><\/p>&mdash; Cyberlutions\u00ae (@Cyberlutions) <a href=\"https:\/\/twitter.com\/Cyberlutions\/status\/1160459315142189057?ref_src=twsrc%5Etfw\">August 11, 2019<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p><strong>Juste comme \u00eatre devant le Mac de la victime<\/strong><\/p>\n\n\n\n<p>Selon la MG, la situation permet \u00e0 l&rsquo;attaquant d&rsquo;utiliser\nl&rsquo;ordinateur de la victime comme si celui-ci \u00e9tait assis devant, sans \u00eatre\nphysiquement pr\u00e9sent.Il a \u00e9galement d\u00e9clar\u00e9 que les accessoires sont faites par\nlui \u00e0 la main, via un processus minutieux qui consiste \u00e0 changer les vrais\nc\u00e2bles Apple pour y ajouter sa \u00abmagie\u00bb.<\/p>\n\n\n\n<p>Il a dit qu&rsquo;il a cr\u00e9\u00e9 chaque \u00e9l\u00e9ment de l&rsquo;implant dans sa\ncuisine, o\u00f9 il les a tous fusionn\u00e9s en un c\u00e2ble.Les c\u00e2bles O.MG sont vendus \u00e0\nun prix de 200 $ et, selon leur cr\u00e9ateur, le hacker peut \u00eatre \u00e0 une distance\nmaximale de 90 m\u00e8tres du dispositif de la victime avec un smartphone et il sera\ncapable de se connecter directement. Une antenne permettrait d&rsquo;atteindre de\nplus grandes distances.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les appareils Android ne sont pas les seuls \u00e0 risquer de subir des cyberattaques.Il s&rsquo;av\u00e8re que les utilisateurs d&rsquo;Apple peuvent \u00eatre victimes de man\u0153uvres malveillants par des moyens apparemment inoffensifs, notamment le c\u00e2ble d&rsquo;\u00e9clairage fourni avec les iPhones, m\u00eame avec le tout dernier iPhone XS et AirPods. Les hackers utilisent une version modifi\u00e9e du c\u00e2ble &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LE C\u00c2BLE O.MG PERMET AUX HACKERS DE PIRATER UN MAC<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":1119,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-1118","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LE C\u00c2BLE O.MG PERMET AUX HACKERS DE PIRATER UN MAC - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LE C\u00c2BLE O.MG PERMET AUX HACKERS DE PIRATER UN MAC - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Les appareils Android ne sont pas les seuls \u00e0 risquer de subir des cyberattaques.Il s&rsquo;av\u00e8re que les utilisateurs d&rsquo;Apple peuvent \u00eatre victimes de man\u0153uvres malveillants par des moyens apparemment inoffensifs, notamment le c\u00e2ble d&rsquo;\u00e9clairage fourni avec les iPhones, m\u00eame avec le tout dernier iPhone XS et AirPods. Les hackers utilisent une version modifi\u00e9e du c\u00e2ble &hellip; Continue reading LE C\u00c2BLE O.MG PERMET AUX HACKERS DE PIRATER UN MAC\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-12T13:31:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-13T13:38:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/New-Zero-Day-Flaw-in-MacOS-Puts-User-Data-At-Risk.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LE C\u00c2BLE O.MG PERMET AUX HACKERS DE PIRATER UN MAC\",\"datePublished\":\"2019-08-12T13:31:07+00:00\",\"dateModified\":\"2019-08-13T13:38:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\\\/\"},\"wordCount\":831,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/New-Zero-Day-Flaw-in-MacOS-Puts-User-Data-At-Risk.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\\\/\",\"name\":\"LE C\u00c2BLE O.MG PERMET AUX HACKERS DE PIRATER UN MAC - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/New-Zero-Day-Flaw-in-MacOS-Puts-User-Data-At-Risk.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2019-08-12T13:31:07+00:00\",\"dateModified\":\"2019-08-13T13:38:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/New-Zero-Day-Flaw-in-MacOS-Puts-User-Data-At-Risk.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/New-Zero-Day-Flaw-in-MacOS-Puts-User-Data-At-Risk.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LE C\u00c2BLE O.MG PERMET AUX HACKERS DE PIRATER UN MAC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LE C\u00c2BLE O.MG PERMET AUX HACKERS DE PIRATER UN MAC - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/","og_locale":"fr_FR","og_type":"article","og_title":"LE C\u00c2BLE O.MG PERMET AUX HACKERS DE PIRATER UN MAC - Blog KoDDoS","og_description":"Les appareils Android ne sont pas les seuls \u00e0 risquer de subir des cyberattaques.Il s&rsquo;av\u00e8re que les utilisateurs d&rsquo;Apple peuvent \u00eatre victimes de man\u0153uvres malveillants par des moyens apparemment inoffensifs, notamment le c\u00e2ble d&rsquo;\u00e9clairage fourni avec les iPhones, m\u00eame avec le tout dernier iPhone XS et AirPods. Les hackers utilisent une version modifi\u00e9e du c\u00e2ble &hellip; Continue reading LE C\u00c2BLE O.MG PERMET AUX HACKERS DE PIRATER UN MAC","og_url":"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2019-08-12T13:31:07+00:00","article_modified_time":"2019-08-13T13:38:47+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/New-Zero-Day-Flaw-in-MacOS-Puts-User-Data-At-Risk.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LE C\u00c2BLE O.MG PERMET AUX HACKERS DE PIRATER UN MAC","datePublished":"2019-08-12T13:31:07+00:00","dateModified":"2019-08-13T13:38:47+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/"},"wordCount":831,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/New-Zero-Day-Flaw-in-MacOS-Puts-User-Data-At-Risk.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/","url":"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/","name":"LE C\u00c2BLE O.MG PERMET AUX HACKERS DE PIRATER UN MAC - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/New-Zero-Day-Flaw-in-MacOS-Puts-User-Data-At-Risk.jpg?fit=825%2C510&ssl=1","datePublished":"2019-08-12T13:31:07+00:00","dateModified":"2019-08-13T13:38:47+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/New-Zero-Day-Flaw-in-MacOS-Puts-User-Data-At-Risk.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/New-Zero-Day-Flaw-in-MacOS-Puts-User-Data-At-Risk.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/le-cable-o-mg-permet-aux-hackers-de-pirater-un-mac\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LE C\u00c2BLE O.MG PERMET AUX HACKERS DE PIRATER UN MAC"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/New-Zero-Day-Flaw-in-MacOS-Puts-User-Data-At-Risk.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-i2","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=1118"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1118\/revisions"}],"predecessor-version":[{"id":1121,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1118\/revisions\/1121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/1119"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=1118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=1118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=1118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}