{"id":1567,"date":"2020-01-05T10:33:48","date_gmt":"2020-01-05T09:33:48","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=1567"},"modified":"2020-01-06T10:47:26","modified_gmt":"2020-01-06T09:47:26","slug":"des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/","title":{"rendered":"DES HACKERS COMPROMETTENT LA PAGE D&rsquo;ACCUEIL DE LA BIBLIOTH\u00c8QUE GOUVERNEMENTALE AM\u00c9RICAIN"},"content":{"rendered":"\n<p> <\/p>\n\n\n\n<p>Hier\nsoir, des hackers iraniens ont modifi\u00e9 la page d&rsquo;accueil du Programme de la biblioth\u00e8que\nde d\u00e9p\u00f4t f\u00e9d\u00e9ral des \u00c9tats-Unis. La page d&rsquo;accueil montrait un visage ayant\nre\u00e7u un coup de poing du pr\u00e9sident Donald Trump. Elle contient \u00e9galement un\nmessage qui dit que le groupe continuera \u00e0 montrer son soutien \u00e0 ses amis dans\nla r\u00e9gion. <\/p>\n\n\n\n<p>Le\nmot \u00abamis\u00bb dans le message fait r\u00e9f\u00e9rence au gouvernement syrien, au peuple\nopprim\u00e9 du Y\u00e9men et au peuple opprim\u00e9 du Pakistan. Il fait \u00e9galement r\u00e9f\u00e9rence\n\u00e0 d&rsquo;autres personnes de la r\u00e9gion qu\u2019Ian soutient actuellement. <\/p>\n\n\n\n<p><strong>Nature\nde l&rsquo;attaque<\/strong><\/p>\n\n\n\n<p>Sous\nle message, il y a une photo d&rsquo;Ali Khamenei, le guide supr\u00eame de l&rsquo;Iran, ainsi\nque le drapeau iranien.<\/p>\n\n\n\n<p>Un\nautre message, \u00e9galement affich\u00e9 sous le visage d\u00e9figur\u00e9 de Trump, indique que\nce message n&rsquo;est qu&rsquo;un aper\u00e7u de ce que l&rsquo;Iran peut faire en mati\u00e8re de <strong><a href=\"https:\/\/koddos.net\/blog\/security-experts-say-irans-retaliatory-attack-could-include-cyberattacks-on-u-s-businesses\/\">cyber-attaques<\/a><\/strong>.\n<\/p>\n\n\n\n<p>Cependant,\nl&rsquo;int\u00e9gralit\u00e9 du message concernant l&rsquo;attaque n&rsquo;est plus disponible sur le\nportail. Le site n&rsquo;est pas encore accessible au moment de la r\u00e9daction du\npr\u00e9sent document. <\/p>\n\n\n\n<p>Bien\nqu&rsquo;il n&rsquo;ait pas \u00e9t\u00e9 confirm\u00e9 quel cybergroupe est responsable de l&rsquo;attaque, le\nmessage contient des preuves accablantes que l&rsquo;attaque vient de l&rsquo;Iran. Selon\ndes rapports ant\u00e9rieurs, l&rsquo;Iran a planifi\u00e9 une s\u00e9rie d&rsquo;attaques, tant sur le\nplan militaire que dans le cyberespace. <\/p>\n\n\n\n<p><strong>Aucun\ndommage s\u00e9rieux n&rsquo;a \u00e9t\u00e9 caus\u00e9<\/strong><\/p>\n\n\n\n<p>Traditionnellement,\nle Programme f\u00e9d\u00e9ral des services de d\u00e9p\u00f4t (FDLP) des \u00c9tats-Unis a \u00e9t\u00e9 cr\u00e9\u00e9\npour offrir au public un acc\u00e8s permanent et gratuit aux informations du\ngouvernement f\u00e9d\u00e9ral. Le portail est utilis\u00e9 uniquement comme un portail\nd&rsquo;information sans autre forme d&rsquo;activit\u00e9. Il permet au public d&rsquo;acc\u00e9der \u00e0 <strong><a href=\"https:\/\/www.govinfo.gov\/help\/whats-available\">diff\u00e9rentes\ninformations<\/a><\/strong>, notamment aux avis des tribunaux, aux projets de\nloi et aux statuts, ainsi qu&rsquo;\u00e0 des informations connexes sur les activit\u00e9s du\ngouvernement. <\/p>\n\n\n\n<p><strong>Le\nFDLP confirme l&rsquo;attaque<\/strong><\/p>\n\n\n\n<p>Un\nporte-parole de la Cyber Security and Infrastructure Agency (CISA) a confirm\u00e9\nl&rsquo;attaque. Il a d\u00e9clar\u00e9 que le gouvernement est conscient qu&rsquo;une agence\npro-iranienne a infiltr\u00e9 le site web des FDLP avec des messages\nanti-am\u00e9ricains. <\/p>\n\n\n\n<p>Mais\nle gouvernement n&rsquo;a pas encore confirm\u00e9 si les attaquants sont affili\u00e9s ou ont\nun quelconque lien avec le <strong><a href=\"https:\/\/koddos.net\/blog\/russian-hacker-masquerades-as-iranian-counterparts-after-hacking-their-system\/\">gouvernement\niranien<\/a><\/strong>. Il a d\u00e9clar\u00e9 que le site n&rsquo;est pas disponible\nactuellement parce qu&rsquo;il a \u00e9t\u00e9 mis hors ligne. Le gouvernement et la CISA enqu\u00eatent\nactuellement sur la situation et esp\u00e8rent faire d&rsquo;autres r\u00e9v\u00e9lations sur\nl&rsquo;attaque bient\u00f4t, a d\u00e9clar\u00e9 le porte-parole.<\/p>\n\n\n\n<p>Un\nexpert en cybers\u00e9curit\u00e9, qui est \u00e9galement un fonctionnaire am\u00e9ricain, a\n\u00e9galement confirm\u00e9 l&rsquo;attaque. Toutefois, il en a minimis\u00e9 l&rsquo;importance. Il a\ndit que l&rsquo;attaque \u00e9tait sans cons\u00e9quence parce que le site Web n&rsquo;est qu&rsquo;un site\nde partage d&rsquo;information <\/p>\n\n\n\n<p>.\nIl a \u00e9galement not\u00e9 que la petite d\u00e9gradation n&rsquo;a pas de rapport significatif\navec l&rsquo;organisme attaqu\u00e9. L&rsquo;expert a \u00e9galement estim\u00e9 que les hackers sont\npeut-\u00eatre ceux qui sympathisent simplement avec l&rsquo;Iran et qu&rsquo;ils ne sont\npeut-\u00eatre pas li\u00e9s au gouvernement iranien.<\/p>\n\n\n\n<p><strong>L&rsquo;attaque\nde repr\u00e9sailles de l&rsquo;Iran<\/strong><\/p>\n\n\n\n<p>Avec\nce nouveau d\u00e9veloppement survenant \u00e0 peine deux jours apr\u00e8s que les Etats-Unis\naient tu\u00e9 Qassem Soleimani dans un <strong><a href=\"https:\/\/www.nydailynews.com\/news\/politics\/ny-iran-solemeini-baghdad-funeral-20200104-boeysj3mh5gptly7keo5mtac4a-story.html\">raid\na\u00e9rien<\/a><\/strong>, il semble que l&rsquo;attaque de repr\u00e9sailles dont les experts\nen cybers\u00e9curit\u00e9 avait averti ne fait que commencer.<\/p>\n\n\n\n<p>Plus\nt\u00f4t, le minist\u00e8re am\u00e9ricain de la s\u00e9curit\u00e9 int\u00e9rieure a averti les entreprises\net les institutions gouvernementales de l&rsquo;imminence d&rsquo;une attaque de\nrepr\u00e9sailles de la part de l&rsquo;Iran. Le D\u00e9partement a averti que l&rsquo;infiltration\ndu cyberespace am\u00e9ricain pourrait \u00eatre l&rsquo;un de leurs moyens d&rsquo;attaque possibles.\n<\/p>\n\n\n\n<p>Le\nDSH a publi\u00e9 le bulletin sur Twitter. Elle a soulign\u00e9 que l&rsquo;Iran a un programme\ncybern\u00e9tique sophistiqu\u00e9 et qu&rsquo;il pourrait s&rsquo;en servir comme avantage pour\nlancer une cyberattaque contre les entreprises et les institutions\ngouvernementales am\u00e9ricaines.<\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">A good reminder from <a href=\"https:\/\/twitter.com\/CISAgov?ref_src=twsrc%5Etfw\">@CISAGov<\/a>: In times of heightened threats, organizations should increase monitoring, back up systems, implement multifactor authentication, &amp; have an incident response plan ready. More info on threats &amp; prevention\/preparedness tips at <a href=\"https:\/\/t.co\/QrJdBOeEJz\">https:\/\/t.co\/QrJdBOeEJz<\/a><\/p>&mdash; Acting Secretary Chad Wolf (@DHS_Wolf) <a href=\"https:\/\/twitter.com\/DHS_Wolf\/status\/1213872696787980292?ref_src=twsrc%5Etfw\">January 5, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">The new <a href=\"https:\/\/twitter.com\/DHSgov?ref_src=twsrc%5Etfw\">@DHSgov<\/a> NTAS Bulletin on the threat landscape was issued to inform &amp; reassure the American public, state\/local governments &amp; private partners that DHS is actively monitoring &amp; preparing for any specific, credible threat, should one arise. <a href=\"https:\/\/t.co\/iNnHU1TI9A\">pic.twitter.com\/iNnHU1TI9A<\/a><\/p>&mdash; Acting Secretary Chad Wolf (@DHS_Wolf) <a href=\"https:\/\/twitter.com\/DHS_Wolf\/status\/1213585937881534467?ref_src=twsrc%5Etfw\">January 4, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>Plusieurs\nexperts ont suivi les activit\u00e9s des hackers de la r\u00e9gion et les activit\u00e9s d&rsquo;un\ngroupe connu sous le nom d\u2019Iran Cybersecurity Group of Hackers. Cependant, on\nne sait pas si ce groupe a des liens avec le gouvernement iranien.<\/p>\n\n\n\n<p>Bien\nqu&rsquo;il n&rsquo;y ait pas de preuve que le logiciel des hackers ait pu p\u00e9n\u00e9trer au-del\u00e0\nde la page d&rsquo;accueil du site, les dommages qui en r\u00e9sultent pourraient \u00eatre peu\nimportants. L&rsquo;attaque n&rsquo;\u00e9tait pas cens\u00e9e \u00eatre destructrice, mais symbolique. Il\nsemble que les attaquants iraniens aient choisi ce site gouvernemental\nparticulier pour transmettre des informations en vue d&rsquo;attaques ult\u00e9rieures.\nLes enqu\u00eates futures r\u00e9v\u00e9leront probablement plus d&rsquo;informations sur l&rsquo;attaque.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hier soir, des hackers iraniens ont modifi\u00e9 la page d&rsquo;accueil du Programme de la biblioth\u00e8que de d\u00e9p\u00f4t f\u00e9d\u00e9ral des \u00c9tats-Unis. La page d&rsquo;accueil montrait un visage ayant re\u00e7u un coup de poing du pr\u00e9sident Donald Trump. Elle contient \u00e9galement un message qui dit que le groupe continuera \u00e0 montrer son soutien \u00e0 ses amis dans &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">DES HACKERS COMPROMETTENT LA PAGE D&rsquo;ACCUEIL DE LA BIBLIOTH\u00c8QUE GOUVERNEMENTALE AM\u00c9RICAIN<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":1568,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[6],"tags":[],"class_list":["post-1567","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DES HACKERS COMPROMETTENT LA PAGE D&#039;ACCUEIL DE LA BIBLIOTH\u00c8QUE GOUVERNEMENTALE AM\u00c9RICAIN - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DES HACKERS COMPROMETTENT LA PAGE D&#039;ACCUEIL DE LA BIBLIOTH\u00c8QUE GOUVERNEMENTALE AM\u00c9RICAIN - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Hier soir, des hackers iraniens ont modifi\u00e9 la page d&rsquo;accueil du Programme de la biblioth\u00e8que de d\u00e9p\u00f4t f\u00e9d\u00e9ral des \u00c9tats-Unis. La page d&rsquo;accueil montrait un visage ayant re\u00e7u un coup de poing du pr\u00e9sident Donald Trump. Elle contient \u00e9galement un message qui dit que le groupe continuera \u00e0 montrer son soutien \u00e0 ses amis dans &hellip; Continue reading DES HACKERS COMPROMETTENT LA PAGE D&rsquo;ACCUEIL DE LA BIBLIOTH\u00c8QUE GOUVERNEMENTALE AM\u00c9RICAIN\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-05T09:33:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-06T09:47:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/01\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"DES HACKERS COMPROMETTENT LA PAGE D&rsquo;ACCUEIL DE LA BIBLIOTH\u00c8QUE GOUVERNEMENTALE AM\u00c9RICAIN\",\"datePublished\":\"2020-01-05T09:33:48+00:00\",\"dateModified\":\"2020-01-06T09:47:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\\\/\"},\"wordCount\":911,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\\\/\",\"name\":\"DES HACKERS COMPROMETTENT LA PAGE D'ACCUEIL DE LA BIBLIOTH\u00c8QUE GOUVERNEMENTALE AM\u00c9RICAIN - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-01-05T09:33:48+00:00\",\"dateModified\":\"2020-01-06T09:47:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DES HACKERS COMPROMETTENT LA PAGE D&rsquo;ACCUEIL DE LA BIBLIOTH\u00c8QUE GOUVERNEMENTALE AM\u00c9RICAIN\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DES HACKERS COMPROMETTENT LA PAGE D'ACCUEIL DE LA BIBLIOTH\u00c8QUE GOUVERNEMENTALE AM\u00c9RICAIN - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/","og_locale":"fr_FR","og_type":"article","og_title":"DES HACKERS COMPROMETTENT LA PAGE D'ACCUEIL DE LA BIBLIOTH\u00c8QUE GOUVERNEMENTALE AM\u00c9RICAIN - Blog KoDDoS","og_description":"Hier soir, des hackers iraniens ont modifi\u00e9 la page d&rsquo;accueil du Programme de la biblioth\u00e8que de d\u00e9p\u00f4t f\u00e9d\u00e9ral des \u00c9tats-Unis. La page d&rsquo;accueil montrait un visage ayant re\u00e7u un coup de poing du pr\u00e9sident Donald Trump. Elle contient \u00e9galement un message qui dit que le groupe continuera \u00e0 montrer son soutien \u00e0 ses amis dans &hellip; Continue reading DES HACKERS COMPROMETTENT LA PAGE D&rsquo;ACCUEIL DE LA BIBLIOTH\u00c8QUE GOUVERNEMENTALE AM\u00c9RICAIN","og_url":"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-01-05T09:33:48+00:00","article_modified_time":"2020-01-06T09:47:26+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/01\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"DES HACKERS COMPROMETTENT LA PAGE D&rsquo;ACCUEIL DE LA BIBLIOTH\u00c8QUE GOUVERNEMENTALE AM\u00c9RICAIN","datePublished":"2020-01-05T09:33:48+00:00","dateModified":"2020-01-06T09:47:26+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/"},"wordCount":911,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/01\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/","url":"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/","name":"DES HACKERS COMPROMETTENT LA PAGE D'ACCUEIL DE LA BIBLIOTH\u00c8QUE GOUVERNEMENTALE AM\u00c9RICAIN - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/01\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1","datePublished":"2020-01-05T09:33:48+00:00","dateModified":"2020-01-06T09:47:26+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/01\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/01\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-compromettent-la-page-daccueil-de-la-bibliotheque-gouvernementale-americain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"DES HACKERS COMPROMETTENT LA PAGE D&rsquo;ACCUEIL DE LA BIBLIOTH\u00c8QUE GOUVERNEMENTALE AM\u00c9RICAIN"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/01\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-ph","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=1567"}],"version-history":[{"count":4,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1567\/revisions"}],"predecessor-version":[{"id":1574,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1567\/revisions\/1574"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/1568"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=1567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=1567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=1567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}