{"id":1190,"date":"2019-09-05T20:50:34","date_gmt":"2019-09-05T18:50:34","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=1190"},"modified":"2019-09-05T20:58:18","modified_gmt":"2019-09-05T18:58:18","slug":"une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/","title":{"rendered":"UNE ATTAQUE DE PIRATAGE AU MOYEN DE PLUGINS WORDPRESS CIBLE DES SITES WEB VULN\u00c9RABLES"},"content":{"rendered":"\n<p>Si\nvous acc\u00e9dez \u00e0 votre plateforme de traitement de texte en ligne, vous ne pensez\npas qu&rsquo;elle puisse vous rendre vuln\u00e9rable \u00e0 une <strong><a href=\"https:\/\/koddos.net\/blog\/300-million-people-vulnerable-to-hacking-attacks-due-to-ea-origin-bug\/\">attaque\nde piratage<\/a><\/strong>. Malheureusement, les cybercriminels ciblent\nd\u00e9sormais des pages Web qui utilisent l\u2019un des espaces d\u2019h\u00e9bergement Web les\nplus populaires, WordPress.<\/p>\n\n\n\n<p>Le\nprotocole de la derni\u00e8re attaque a permis \u00e0 ces pirates d&rsquo;infecter certains\nplugins courants. Les chercheurs de Wordfence ont not\u00e9 que le piratage du\nplugin WordPress peut affecter jusqu&rsquo;\u00e0 neuf plugins diff\u00e9rents.<\/p>\n\n\n\n<p>Le\nfait que tant de plugins peuvent \u00eatre vuln\u00e9rables aux attaques a conduit les\ncybercriminels \u00e0 jouer avec le syst\u00e8me et \u00e0 cr\u00e9er de faux comptes\nd&rsquo;administrateur sur des pages Web sp\u00e9cifiques tout en mettant ces plugins en\n\u0153uvre.<\/p>\n\n\n\n<p><strong>La\nplupart des attaques proviennent d&rsquo;une seule adresse IP<\/strong><\/p>\n\n\n\n<p>Un\nchercheur expert de Wordfence a expliqu\u00e9 via un billet de blog que la grande\nmajorit\u00e9 des attaques li\u00e9es aux <strong><a href=\"https:\/\/koddos.net\/blog\/wordpress-translating-plugin-hacked-by-a-former-developer\/\">plugins\nWordPress<\/a><\/strong> provenaient d&rsquo;une seule adresse IP et qu&rsquo;elle \u00e9tait\nli\u00e9e \u00e0 un serveur Rackspace h\u00e9bergeant des sites Web pr\u00e9tendument infect\u00e9s ou\ncompromis.<\/p>\n\n\n\n<p>La\nsoci\u00e9t\u00e9 de s\u00e9curit\u00e9 a \u00e9galement d\u00e9clar\u00e9 avoir tent\u00e9 de contacter Rackspace dans\nle but de les avertir des serveurs et des pages Web suppos\u00e9ment compromis,\naucune r\u00e9ponse n\u2019a \u00e9t\u00e9 donn\u00e9e pour le moment de leur part.<\/p>\n\n\n\n<p>Certains\ndes plugins qui ont \u00e9t\u00e9 pirat\u00e9s sont Blog Designer, Bold Page Builder, Form\nLightbox, Hybrid Composer, Live Chat with Facebook Messenger, et tous les\nanciens plugins NicDark, qui incluent nd-learning, nd-travel, nd-booking et plus\n; Visual CSS Style Editor, WP Live Chat Support, et Yuzo Related Posts.<\/p>\n\n\n\n<p>Selon\nles sp\u00e9cialistes en la mati\u00e8re, les plugins WordPress ont pirat\u00e9 des scripts,\nce qui a entra\u00een\u00e9 des redirections malveillantes vers des sites Web compromis\net des popups g\u00eanants dans les navigateurs Web des visiteurs.<\/p>\n\n\n\n<p><strong>Une\ntentative d&rsquo;installation d&rsquo;une porte d\u00e9rob\u00e9e<\/strong><\/p>\n\n\n\n<p>Le\npiratage existe depuis le mois de juillet, ou du moins c&rsquo;est le moment o\u00f9 il a\n\u00e9t\u00e9 rep\u00e9r\u00e9. Depuis ce moment, les cybercriminels ont inclus un autre script qui\ntente d\u2019installer une porte d\u00e9rob\u00e9e dans la page via un exploit sur une session\nd\u2019administrateur.<\/p>\n\n\n\n<p>Les\ngens se demandent sans doute ce qu&rsquo;il faut faire au sujet du piratage. Apr\u00e8s\ntout, WordPress est une plate-forme d&rsquo;h\u00e9bergement Web bien connue, qui alimente\ndes milliers de blogs et de sites Web de partout dans le monde.<\/p>\n\n\n\n<p>Avant\nd&rsquo;aborder les solutions possibles, il convient de noter que, chaque fois que\nl&rsquo;administrateur se connecte sur un <strong><a href=\"https:\/\/koddos.net\/blog\/hacked-mailgun-wordpress-site-falls-under-hackers-attack\/\">site\nWeb WordPress infect\u00e9<\/a><\/strong>, le script nouvellement d\u00e9velopp\u00e9 tente\nd&rsquo;utiliser ses informations d&rsquo;identification pour cr\u00e9er un nouveau compte\nadministrateur sous le nom wpservices.<\/p>\n\n\n\n<p>Le\nnouveau compte d\u2019administrateur \u00abwpservices\u00bb est en fait li\u00e9 \u00e0 l\u2019adresse\n\u00e9lectronique wpservices@yandex.com.<\/p>\n\n\n\n<p>Les\ncybercriminels g\u00e8rent ce nouveau compte WordPress malveillant et le con\u00e7oivent\ncomme un moyen de r\u00e9aliser plusieurs autres man\u0153uvres. Selon les chercheurs de\nWordfence, le fait que de plus en plus de comptes d\u2019administrateurs\nmalveillants soient cr\u00e9\u00e9s est un signe clair que des hackers pourraient se\npr\u00e9parer \u00e0 infliger davantage de dommages par le biais de pages WordPress\ncompromises.<\/p>\n\n\n\n<p>Comme\nsolution possible, il est recommand\u00e9 aux administrateurs de sites Web qui\nutilisent WordPress comme plate-forme d&rsquo;h\u00e9bergement Web de garder tous leurs\nplugins \u00e0 jour, \u00e0 leurs derni\u00e8res versions respectives, afin d&rsquo;\u00e9viter que leurs\npages ne soient cibl\u00e9es et expos\u00e9es au piratage.<\/p>\n\n\n\n<p><strong>Il\nest important de tenir les plugins \u00e0 jour<\/strong><\/p>\n\n\n\n<p>Il\nn&rsquo;en demeure pas moins que le hacker ou l&rsquo;entit\u00e9 attaquant cible en fait des\nvuln\u00e9rabilit\u00e9s plus anciennes, ce qui signifierait que ceux qui ont leurs\nplugins mis \u00e0 jour ont moins de chances d&rsquo;\u00eatre les plus r\u00e9centes victimes de la\nvuln\u00e9rabilit\u00e9.<\/p>\n\n\n\n<p>Par\nailleurs, les chercheurs et les sp\u00e9cialistes recommandent \u00e9galement de\nsupprimer tous les comptes malveillants cr\u00e9\u00e9s par les <strong><a href=\"https:\/\/koddos.net\/blog\/ares-attacks-android-streaming-boxes-targeted-by-a-new-botnets-malware\/\">logiciels\nmalveillants<\/a><\/strong> et d&rsquo;effectuer une analyse suppl\u00e9mentaire de leurs\npages pour s&rsquo;assurer qu&rsquo;aucune autre porte d\u00e9rob\u00e9e n&rsquo;a \u00e9t\u00e9 install\u00e9e.<\/p>\n\n\n\n<p>En\nmati\u00e8re de cybers\u00e9curit\u00e9, en particulier dans le monde actuel, il semble que\npersonne ne puisse \u00eatre en s\u00e9curit\u00e9 \u00e0 100 pour cent lorsqu&rsquo;il s&rsquo;aventure sur le\nWeb. C&rsquo;est pourquoi la sensibilisation est la premi\u00e8re chose \u00e0 faire, et\nensuite, ensuite un plan d&rsquo;action peut \u00eatre planifi\u00e9.<\/p>\n\n\n\n<p>Quelque\nchose qui semble sans danger comme les plugins WordPress pourrait finir par\n\u00eatre extr\u00eamement pr\u00e9judiciable \u00e0 la confidentialit\u00e9 et \u00e0 la s\u00e9curit\u00e9 en ligne.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Si vous acc\u00e9dez \u00e0 votre plateforme de traitement de texte en ligne, vous ne pensez pas qu&rsquo;elle puisse vous rendre vuln\u00e9rable \u00e0 une attaque de piratage. Malheureusement, les cybercriminels ciblent d\u00e9sormais des pages Web qui utilisent l\u2019un des espaces d\u2019h\u00e9bergement Web les plus populaires, WordPress. Le protocole de la derni\u00e8re attaque a permis \u00e0 ces &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">UNE ATTAQUE DE PIRATAGE AU MOYEN DE PLUGINS WORDPRESS CIBLE DES SITES WEB VULN\u00c9RABLES<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":1191,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[6],"tags":[],"class_list":["post-1190","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UNE ATTAQUE DE PIRATAGE AU MOYEN DE PLUGINS WORDPRESS CIBLE DES SITES WEB VULN\u00c9RABLES - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UNE ATTAQUE DE PIRATAGE AU MOYEN DE PLUGINS WORDPRESS CIBLE DES SITES WEB VULN\u00c9RABLES - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Si vous acc\u00e9dez \u00e0 votre plateforme de traitement de texte en ligne, vous ne pensez pas qu&rsquo;elle puisse vous rendre vuln\u00e9rable \u00e0 une attaque de piratage. Malheureusement, les cybercriminels ciblent d\u00e9sormais des pages Web qui utilisent l\u2019un des espaces d\u2019h\u00e9bergement Web les plus populaires, WordPress. Le protocole de la derni\u00e8re attaque a permis \u00e0 ces &hellip; Continue reading UNE ATTAQUE DE PIRATAGE AU MOYEN DE PLUGINS WORDPRESS CIBLE DES SITES WEB VULN\u00c9RABLES\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-05T18:50:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-05T18:58:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/09\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"UNE ATTAQUE DE PIRATAGE AU MOYEN DE PLUGINS WORDPRESS CIBLE DES SITES WEB VULN\u00c9RABLES\",\"datePublished\":\"2019-09-05T18:50:34+00:00\",\"dateModified\":\"2019-09-05T18:58:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\\\/\"},\"wordCount\":791,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\\\/\",\"name\":\"UNE ATTAQUE DE PIRATAGE AU MOYEN DE PLUGINS WORDPRESS CIBLE DES SITES WEB VULN\u00c9RABLES - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2019-09-05T18:50:34+00:00\",\"dateModified\":\"2019-09-05T18:58:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UNE ATTAQUE DE PIRATAGE AU MOYEN DE PLUGINS WORDPRESS CIBLE DES SITES WEB VULN\u00c9RABLES\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UNE ATTAQUE DE PIRATAGE AU MOYEN DE PLUGINS WORDPRESS CIBLE DES SITES WEB VULN\u00c9RABLES - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/","og_locale":"fr_FR","og_type":"article","og_title":"UNE ATTAQUE DE PIRATAGE AU MOYEN DE PLUGINS WORDPRESS CIBLE DES SITES WEB VULN\u00c9RABLES - Blog KoDDoS","og_description":"Si vous acc\u00e9dez \u00e0 votre plateforme de traitement de texte en ligne, vous ne pensez pas qu&rsquo;elle puisse vous rendre vuln\u00e9rable \u00e0 une attaque de piratage. Malheureusement, les cybercriminels ciblent d\u00e9sormais des pages Web qui utilisent l\u2019un des espaces d\u2019h\u00e9bergement Web les plus populaires, WordPress. Le protocole de la derni\u00e8re attaque a permis \u00e0 ces &hellip; Continue reading UNE ATTAQUE DE PIRATAGE AU MOYEN DE PLUGINS WORDPRESS CIBLE DES SITES WEB VULN\u00c9RABLES","og_url":"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2019-09-05T18:50:34+00:00","article_modified_time":"2019-09-05T18:58:18+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/09\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"UNE ATTAQUE DE PIRATAGE AU MOYEN DE PLUGINS WORDPRESS CIBLE DES SITES WEB VULN\u00c9RABLES","datePublished":"2019-09-05T18:50:34+00:00","dateModified":"2019-09-05T18:58:18+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/"},"wordCount":791,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/09\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/","url":"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/","name":"UNE ATTAQUE DE PIRATAGE AU MOYEN DE PLUGINS WORDPRESS CIBLE DES SITES WEB VULN\u00c9RABLES - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/09\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","datePublished":"2019-09-05T18:50:34+00:00","dateModified":"2019-09-05T18:58:18+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/09\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/09\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/une-attaque-de-piratage-au-moyen-de-plugins-wordpress-cible-des-sites-web-vulnerables\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"UNE ATTAQUE DE PIRATAGE AU MOYEN DE PLUGINS WORDPRESS CIBLE DES SITES WEB VULN\u00c9RABLES"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/09\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-jc","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=1190"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1190\/revisions"}],"predecessor-version":[{"id":1192,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1190\/revisions\/1192"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/1191"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=1190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=1190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=1190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}