{"id":1462,"date":"2019-12-04T16:32:34","date_gmt":"2019-12-04T15:32:34","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=1462"},"modified":"2019-12-04T16:32:45","modified_gmt":"2019-12-04T15:32:45","slug":"des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/","title":{"rendered":"DES HACKERS INJECTENT DU CODE MALVEILLANT SUR LE SITE WEB DE SMITH &amp; WESSON"},"content":{"rendered":"\n<p>Avec\nles r\u00e9centes mesures de r\u00e9pression contre les cyberattaquants, il semble que\nles activit\u00e9s de piratage informatique ne s&rsquo;arr\u00eatent pas de sit\u00f4t. Cette fois,\nils ont tourn\u00e9 leur attention vers les fabricants d&rsquo;armes am\u00e9ricains, Smith\n&amp; Wesson. Le site Web de l&rsquo;entreprise \u00e9tait la cible d&rsquo;un code malveillant\ndestin\u00e9 \u00e0 voler les informations de carte de paiement des clients.<\/p>\n\n\n\n<p>Les\nhackers <strong><a href=\"https:\/\/sansec.io\/labs\/2019\/12\/02\/magecart-hackers-target-sanguine\/\">ont\ninstall\u00e9 un \u00e9cr\u00e9meur de paiement<\/a><\/strong> sur le site Web du fabricant\nd\u2019armes \u00e0 feu avant la fin du Black Friday. La soci\u00e9t\u00e9 a d\u00e9clar\u00e9 que le code\ninstall\u00e9 par les hackers \u00e9tait toujours actif \u00e0 compter du 2 d\u00e9cembre.<\/p>\n\n\n\n<p>Cet\nincident fait partie de la s\u00e9rie d&rsquo;attaques de Magecart qui consistait \u00e0\ninjecter des logiciels malveillants dans des sites de commerce \u00e9lectronique\npour obtenir un acc\u00e8s non autoris\u00e9 aux informations des utilisateurs et aux\nd\u00e9tails des cartes de cr\u00e9dit. Pas plus tard que le mois dernier, Macy <strong><a href=\"https:\/\/oag.ca.gov\/system\/files\/All%20State%20MCOM%20Consumer%20Notice%20Proof%20111419.pdf\">a\nsignal\u00e9<\/a><\/strong> une attaque similaire \u00e0 partir du m\u00eame logiciel\nmalveillant. La soci\u00e9t\u00e9 a d\u00e9clar\u00e9 qu&rsquo;il existe un code malveillant que les\nattaquants utilisent pour acc\u00e9der aux informations sensibles de leurs clients\net des utilisateurs du site. Bien que l&rsquo;entreprise ait essay\u00e9 de r\u00e9soudre le\nprobl\u00e8me, elle a mis en garde les utilisateurs contre de telles attaques.<\/p>\n\n\n\n<p><strong>Comment\nl&rsquo;attaquant s&rsquo;est infiltr\u00e9 dans le site Web<\/strong><\/p>\n\n\n\n<p>BleepingComputer\na effectu\u00e9 un test qui montre comment le pirate s&rsquo;infiltre dans le site Web du\nfabricant de gomme \u00e0 m\u00e2cher pour r\u00e9cup\u00e9rer des informations sensibles de\nl&rsquo;utilisateur. La soci\u00e9t\u00e9 de recherche avait m\u00eame contact\u00e9 Smith &amp; Wesson\npour les informer de l&rsquo;atteinte \u00e0 la s\u00e9curit\u00e9.<\/p>\n\n\n\n<p>Lorsque\nle client d\u00e9cide d&rsquo;entrer ses informations de paiement, les informations de\nl&rsquo;utilisateur seront livr\u00e9es \u00e0 l&rsquo;adresse du hacker. Une fois que l&rsquo;attaquant a\nles informations de l&rsquo;utilisateur, il peut se connecter au serveur et obtenir\nles informations de paiement. C&rsquo;est ainsi que le hacker obtient les\ninformations sensibles de l&rsquo;utilisateur par l&rsquo;interm\u00e9diaire des <strong><a href=\"https:\/\/koddos.net\/blog\/hackers-alert-checkers-restaurants-lost-credit-card-details-in-a-pos-hack\/\">d\u00e9tails\nde sa carte de cr\u00e9dit<\/a><\/strong> sur la plate-forme de paiement.<\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Stock listed gun maker <a href=\"https:\/\/twitter.com\/Smith_WessonInc?ref_src=twsrc%5Etfw\">@Smith_WessonInc<\/a>  got popped during Black Friday. Payment skimmer injected on Nov 27, still active (co-research by <a href=\"https:\/\/twitter.com\/AffableKraut?ref_src=twsrc%5Etfw\">@AffableKraut<\/a>) <a href=\"https:\/\/t.co\/eh8sokUi73\">pic.twitter.com\/eh8sokUi73<\/a><\/p>&mdash; gwillem (@gwillem) <a href=\"https:\/\/twitter.com\/gwillem\/status\/1201647716352380929?ref_src=twsrc%5Etfw\">December 2, 2019<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>Le\ncode malveillant capture les informations financi\u00e8res et personnelles des\nclients et transf\u00e8re les donn\u00e9es \u00e0 son \u00e9metteur.&nbsp; Ironiquement, ces hackers se sont cach\u00e9s sous\nle nom de Sanguine Security pour perp\u00e9trer l&rsquo;attaque. Selon Smith &amp; Wesson,\nanalyste en s\u00e9curit\u00e9 judiciaire, les \u00e9cr\u00e9meurs se cachent habituellement sous\nle couvert de Sanguine Security pour r\u00e9cup\u00e9rer des informations de leur h\u00f4te.\nC&rsquo;est ce qui le rend intraitable et difficile \u00e0 rep\u00e9rer \u00e0 temps.<\/p>\n\n\n\n<p>Il\na ajout\u00e9 que le hacker avait d\u00e9lib\u00e9r\u00e9ment choisi Sanguine Security.<\/p>\n\n\n\n<p>Le\npiratage ressemble de pr\u00e8s \u00e0 celui d&rsquo;un certain groupe de pirates sp\u00e9cialis\u00e9s\ndans les <strong><a href=\"https:\/\/koddos.net\/blog\/magecart-on-a-rampage-hackers-have-already-hit-over-17000-domains\/\">attaques\nMagecart<\/a><\/strong>. Dans ce type d&rsquo;attaque, ils tirent des informations du\nportail ou des magasins en ligne de leurs victimes. Les hackers retirent les\nd\u00e9tails des cartes de cr\u00e9dit depuis ces magasins.<\/p>\n\n\n\n<p>Smith\n&amp; Wesson a soulign\u00e9 que les hackers ont profit\u00e9 de la faille de s\u00e9curit\u00e9 du\nportail Magneto eCommerce pour pirater le site Web du fabricant d&rsquo;armes.\nR\u00e9cemment, Magneto a inform\u00e9 ses clients d&rsquo;une faille de s\u00e9curit\u00e9 et les a\navertis de la violation. Il a demand\u00e9 aux clients de se pr\u00e9parer en installant\ndes correctifs pour emp\u00eacher toute exploitation par des utilisateurs non\nautoris\u00e9s. <\/p>\n\n\n\n<p><strong>Du\ncode malveillant existe toujours sur le portail<\/strong><\/p>\n\n\n\n<p>Jusqu&rsquo;\u00e0\naujourd&rsquo;hui, le code malveillant est toujours tr\u00e8s actif sur le site Web du\nfabricant d&rsquo;armes \u00e0 feu. La soci\u00e9t\u00e9 n&rsquo;a pas encore trouv\u00e9 le moyen de supprimer\nou de mettre fin \u00e0 ses activit\u00e9s sur le site. Cependant, il assure \u00e0 ses\nclients que la soci\u00e9t\u00e9 travaille d&rsquo;arrache-pied pour trouver une solution au\nprobl\u00e8me et se d\u00e9barrasser d\u00e9finitivement du logiciel malveillant.<\/p>\n\n\n\n<p>Pour\n<strong><a href=\"https:\/\/koddos.net\/blog\/vital-steps-to-prevent-ddos-attacks\/\">emp\u00eacher ce\ntype d&rsquo;attaque<\/a><\/strong>, les entreprises doivent mettre en \u0153uvre les\nmeilleures pratiques de s\u00e9curit\u00e9 en adoptant d&rsquo;importants contr\u00f4les de CSI.<\/p>\n\n\n\n<p>Le\nscript est assez difficile \u00e0 rep\u00e9rer car il injecte un script malveillant ou\nnon, selon la section du site et les visiteurs. Quel que soit le site sur\nlequel il a \u00e9t\u00e9 infest\u00e9, le JavaScipt ressemble \u00e0 un script non malveillant et\n\u00e0 un script normal de 11 Ko. Cela le rend beaucoup plus difficile \u00e0 rep\u00e9rer car\nil semble authentique.<\/p>\n\n\n\n<p>Mais\npour ceux qui utilisent la plateforme AWS, les navigateurs non Linux ou ceux\nqui utilisent l&rsquo;adresse IP bas\u00e9e aux \u00c9tats-Unis, le script fourni passera de 11\nKo \u00e0 20 Ko. Lorsque l&rsquo;utilisateur charge le script, une fen\u00eatre affichant un\nfaux formulaire de paiement appara\u00eet.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Avec les r\u00e9centes mesures de r\u00e9pression contre les cyberattaquants, il semble que les activit\u00e9s de piratage informatique ne s&rsquo;arr\u00eatent pas de sit\u00f4t. Cette fois, ils ont tourn\u00e9 leur attention vers les fabricants d&rsquo;armes am\u00e9ricains, Smith &amp; Wesson. Le site Web de l&rsquo;entreprise \u00e9tait la cible d&rsquo;un code malveillant destin\u00e9 \u00e0 voler les informations de carte &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">DES HACKERS INJECTENT DU CODE MALVEILLANT SUR LE SITE WEB DE SMITH &amp; WESSON<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":1463,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-1462","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DES HACKERS INJECTENT DU CODE MALVEILLANT SUR LE SITE WEB DE SMITH &amp; WESSON - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DES HACKERS INJECTENT DU CODE MALVEILLANT SUR LE SITE WEB DE SMITH &amp; WESSON - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Avec les r\u00e9centes mesures de r\u00e9pression contre les cyberattaquants, il semble que les activit\u00e9s de piratage informatique ne s&rsquo;arr\u00eatent pas de sit\u00f4t. Cette fois, ils ont tourn\u00e9 leur attention vers les fabricants d&rsquo;armes am\u00e9ricains, Smith &amp; Wesson. Le site Web de l&rsquo;entreprise \u00e9tait la cible d&rsquo;un code malveillant destin\u00e9 \u00e0 voler les informations de carte &hellip; Continue reading DES HACKERS INJECTENT DU CODE MALVEILLANT SUR LE SITE WEB DE SMITH &amp; WESSON\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-04T15:32:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-04T15:32:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"DES HACKERS INJECTENT DU CODE MALVEILLANT SUR LE SITE WEB DE SMITH &amp; WESSON\",\"datePublished\":\"2019-12-04T15:32:34+00:00\",\"dateModified\":\"2019-12-04T15:32:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\\\/\"},\"wordCount\":839,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\\\/\",\"name\":\"DES HACKERS INJECTENT DU CODE MALVEILLANT SUR LE SITE WEB DE SMITH &amp; WESSON - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1\",\"datePublished\":\"2019-12-04T15:32:34+00:00\",\"dateModified\":\"2019-12-04T15:32:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DES HACKERS INJECTENT DU CODE MALVEILLANT SUR LE SITE WEB DE SMITH &amp; WESSON\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DES HACKERS INJECTENT DU CODE MALVEILLANT SUR LE SITE WEB DE SMITH &amp; WESSON - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/","og_locale":"fr_FR","og_type":"article","og_title":"DES HACKERS INJECTENT DU CODE MALVEILLANT SUR LE SITE WEB DE SMITH &amp; WESSON - Blog KoDDoS","og_description":"Avec les r\u00e9centes mesures de r\u00e9pression contre les cyberattaquants, il semble que les activit\u00e9s de piratage informatique ne s&rsquo;arr\u00eatent pas de sit\u00f4t. Cette fois, ils ont tourn\u00e9 leur attention vers les fabricants d&rsquo;armes am\u00e9ricains, Smith &amp; Wesson. Le site Web de l&rsquo;entreprise \u00e9tait la cible d&rsquo;un code malveillant destin\u00e9 \u00e0 voler les informations de carte &hellip; Continue reading DES HACKERS INJECTENT DU CODE MALVEILLANT SUR LE SITE WEB DE SMITH &amp; WESSON","og_url":"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2019-12-04T15:32:34+00:00","article_modified_time":"2019-12-04T15:32:45+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1","type":"image\/png"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"DES HACKERS INJECTENT DU CODE MALVEILLANT SUR LE SITE WEB DE SMITH &amp; WESSON","datePublished":"2019-12-04T15:32:34+00:00","dateModified":"2019-12-04T15:32:45+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/"},"wordCount":839,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/","url":"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/","name":"DES HACKERS INJECTENT DU CODE MALVEILLANT SUR LE SITE WEB DE SMITH &amp; WESSON - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1","datePublished":"2019-12-04T15:32:34+00:00","dateModified":"2019-12-04T15:32:45+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-injectent-du-code-malveillant-sur-le-site-web-de-smith-wesson\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"DES HACKERS INJECTENT DU CODE MALVEILLANT SUR LE SITE WEB DE SMITH &amp; WESSON"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-nA","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=1462"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1462\/revisions"}],"predecessor-version":[{"id":1465,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1462\/revisions\/1465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/1463"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=1462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=1462"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=1462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}