{"id":1579,"date":"2020-01-07T09:25:56","date_gmt":"2020-01-07T08:25:56","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=1579"},"modified":"2020-01-08T09:28:35","modified_gmt":"2020-01-08T08:28:35","slug":"le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/","title":{"rendered":"LE LOGICIEL DE RAN\u00c7ON REVIL CIBLE MAINTENANT LES SERVEURS VPN NON PATCH\u00c9S"},"content":{"rendered":"\n<p>Les\nexperts en s\u00e9curit\u00e9 ont mis en garde contre les r\u00e9centes activit\u00e9s des\ncyber-attaquants qui utilisent le logiciel de ran\u00e7on REvil. Cette fois, les <strong><a href=\"https:\/\/koddos.net\/blog\/hackers-alter-the-homepage-of-the-u-s-government-library\/\">hackers<\/a><\/strong>\ncherchent \u00e0 d\u00e9sactiver l&rsquo;antivirus et \u00e0 infiltrer les syst\u00e8mes via des serveurs\nPulse Secure non patch\u00e9s. <\/p>\n\n\n\n<p>Les\nchercheurs en s\u00e9curit\u00e9 conseillent \u00e0 ceux qui exploitent le VPN Pulse Secure de\nmettre \u00e0 niveau et de patcher leurs serveurs, sous peine de perdre leur\nposition de force dans les grosses attaques de logiciels de ran\u00e7on. Selon les\nchercheurs, il est tr\u00e8s facile pour les attaquants d&rsquo;attaquer les <strong><a href=\"https:\/\/koddos.net\/blog\/cybercriminals-are-exploiting-vulnerable-servers-of-two-famous-vpns\/\">serveurs\nVPN<\/a><\/strong> vuln\u00e9rables en utilisant l&rsquo;algorithme de recherche Shodan.io\ndans les Internet des Objets. <\/p>\n\n\n\n<p>Le\nmois dernier, des chercheurs ont d\u00e9couvert le logiciel de ran\u00e7on REvil\n(Sodinokibi) lorsqu&rsquo;il a attaqu\u00e9 CyrusOne, un fournisseur am\u00e9ricain de services\nde donn\u00e9es qui est cot\u00e9 au NASDAQ. Le logiciel de ran\u00e7on a \u00e9galement infiltr\u00e9\nplusieurs portails de fournisseurs de services g\u00e9r\u00e9s ainsi que plus de 400\ncabinets de dentistes. <\/p>\n\n\n\n<p><strong>Un\nran\u00e7ongiciel classifi\u00e9 \u00abde gros gibier\u00bb<\/strong><\/p>\n\n\n\n<p>Kevin\nBeaumont, chercheur en s\u00e9curit\u00e9 au Royaume-Uni, a class\u00e9 REvil dans la\ncat\u00e9gorie des logiciels de ran\u00e7on \u00abde gros gibier\u00bb capables de causer de graves\nd\u00e9g\u00e2ts au syst\u00e8me h\u00f4te. Selon lui, les attaquants l&rsquo;ont constamment utilis\u00e9\npour crypter des syst\u00e8mes commerciaux hautement sensibles et ont demand\u00e9 des\nsommes \u00e9normes en <strong><a href=\"https:\/\/koddos.net\/blog\/clop-ransomware-evolves-now-can-terminate-663-windows-processes\/\">ran\u00e7on<\/a><\/strong>.\nAu d\u00e9part, le logiciel de ran\u00e7on a profit\u00e9 de la vuln\u00e9rabilit\u00e9 d&rsquo;Oracle\nWebLogic pour infecter les syst\u00e8mes. Le ran\u00e7ongiciel a \u00e9t\u00e9 d\u00e9couvert en avril\ndernier.<\/p>\n\n\n\n<p>Le\nlogiciel de ran\u00e7on REvil est uniquement capable d&rsquo;attaquer les serveurs VPN\nPulse Secure qui n&rsquo;ont pas encore appliqu\u00e9 les mises \u00e0 jour de patchs. D\u00e9j\u00e0, en\noctobre de l&rsquo;ann\u00e9e derni\u00e8re, le centre national de s\u00e9curit\u00e9 du Royaume-Uni,\nl&rsquo;agence de s\u00e9curit\u00e9 nationale des \u00c9tats-Unis, ainsi que la CISA, ont \u00e9mis des\navertissements sur les vuln\u00e9rabilit\u00e9s de ces VPN. <\/p>\n\n\n\n<p>Les\nagences de s\u00e9curit\u00e9 ont \u00e9mis des avertissements lorsque certains hackers parrain\u00e9s\npar l&rsquo;\u00c9tat ont exploit\u00e9 les vuln\u00e9rabilit\u00e9s des serveurs VPN Fortinet et Pulse\nSecure.<\/p>\n\n\n\n<p>Maintenant,\nles cyberattaquants ont adopt\u00e9 la faille et lancent une attaque sur les syst\u00e8mes.\nLa <strong><a href=\"https:\/\/koddos.net\/blog\/twitter-vulnerability-17-million-users-and-their-phone-numbers-compromised\/\">vuln\u00e9rabilit\u00e9<\/a><\/strong>\nsur le serveur VPN s\u00e9curis\u00e9 est assez mauvaise car elle donne un acc\u00e8s non contr\u00f4l\u00e9\nsans avoir \u00e0 authentifier les informations d&rsquo;identification des attaquants. Les\nchercheurs ont \u00e9galement d\u00e9clar\u00e9 qu&rsquo;il permet aux attaquants de se connecter \u00e0\ndistance au r\u00e9seau de l&rsquo;entreprise, de consulter \u00e0 distance les mots de passe\nen cache et de voir les historiques. Il permet \u00e9galement aux hackers de\nd\u00e9sactiver l&rsquo;authentification multi-facteur du serveur.&nbsp; <\/p>\n\n\n\n<p><strong>Comment\nle logiciel de ran\u00e7on REvil a-t-il r\u00e9ussi \u00e0 p\u00e9n\u00e9trer dans les syst\u00e8mes<\/strong><\/p>\n\n\n\n<p>Le\nchercheur Beaumont a soulign\u00e9 qu&rsquo;il a <strong><a href=\"https:\/\/doublepulsar.com\/big-game-ransomware-being-delivered-to-organisations-via-pulse-secure-vpn-bd01b791aad9\">d\u00e9tect\u00e9\ndeux<\/a><\/strong> des incidents de logiciel de ran\u00e7on la semaine derni\u00e8re.\nSelon lui, les hackers ont utilis\u00e9 la m\u00eame strat\u00e9gie pour avoir acc\u00e8s au\nr\u00e9seau. Le hacker a ensuite pris le contr\u00f4le de l&rsquo;administrateur du domaine et\na utilis\u00e9 le logiciel d&rsquo;acc\u00e8s \u00e0 distance pour naviguer dans le syst\u00e8me.<\/p>\n\n\n\n<p>A\nce stade, le logiciel de ran\u00e7on REvil a pu d\u00e9sactiver les outils de s\u00e9curit\u00e9\ndes points d&rsquo;acc\u00e8s et il s&rsquo;est infiltr\u00e9 dans tous les syst\u00e8mes par le biais des\ninvites de commande PsExec. L&rsquo;invite de commande est g\u00e9n\u00e9ralement une commande\ncach\u00e9e sur laquelle le syst\u00e8me ne peut pas agir, \u00e0 l&rsquo;exception du logiciel de\nran\u00e7on.<\/p>\n\n\n\n<p>Bad\nPackets, une soci\u00e9t\u00e9 de s\u00e9curit\u00e9, a effectu\u00e9 un contr\u00f4le de s\u00e9curit\u00e9 le 4\njanvier. Selon cette v\u00e9rification, il y avait environ 3820 serveurs VPN Pulse\nSecure qui n&rsquo;avaient pas encore \u00e9t\u00e9 mis \u00e0 niveau contre la vuln\u00e9rabilit\u00e9. Sur\nce nombre, plus de 1 300 sont des serveurs vuln\u00e9rables bas\u00e9s aux \u00c9tats-Unis.<\/p>\n\n\n\n<p>Toutefois,\nScott Gordon, directeur de la gestion de Pulse Secure, a d\u00e9clar\u00e9 que de nombreux\nclients de Pulse ont appliqu\u00e9 efficacement le <strong><a href=\"https:\/\/kb.pulsesecure.net\/articles\/Pulse_Security_Advisories\/SA44101\">patch\nqu&rsquo;il a publi\u00e9 en avril de l&rsquo;ann\u00e9e derni\u00e8re<\/a><\/strong>, et ne sont plus\nsusceptibles d&rsquo;attaquer leurs syst\u00e8mes. <\/p>\n\n\n\n<p>Il\na ajout\u00e9 que certaines organisations n&rsquo;ont pas encore appliqu\u00e9 ces patchs.\nSelon lui, ces organisations qui n&rsquo;ont pas encore mis \u00e0 jour sont les plus\nvuln\u00e9rables \u00e0 l&rsquo;attaque par ran\u00e7on. Bad Packets a signal\u00e9 la vuln\u00e9rabilit\u00e9 de\nplus de 20 000 serveurs VPN en ao\u00fbt de l&rsquo;ann\u00e9e derni\u00e8re. <\/p>\n\n\n\n<p>Sur\nce nombre, environ 5 % sont encore vuln\u00e9rables. Gordon a demand\u00e9 \u00e0 ses clients\nde s&rsquo;assurer que leurs syst\u00e8mes sont mis \u00e0 jour afin de pr\u00e9venir toute\nvuln\u00e9rabilit\u00e9 que les hackers pourraient cibler avec un <strong><a href=\"https:\/\/koddos.net\/blog\/clop-ransomware-evolves-now-can-terminate-663-windows-processes\/\">logiciel\nde ran\u00e7on<\/a><\/strong>. <\/p>\n\n\n\n<p>Il\na exhort\u00e9 les clients \u00e0 rapi\u00e9cer leurs syst\u00e8mes rapidement puisque le patch du\nc\u00f4t\u00e9 serveur n&rsquo;a pas besoin d&rsquo;eux pour mettre \u00e0 jour le client. Il a soulign\u00e9\nque la seule fa\u00e7on pour les organisations de ne pas \u00eatre une cible est de\nmettre en place les partchs n\u00e9cessaires sur les syst\u00e8mes. Gordon&nbsp;leur a conseill\u00e9\nde couvrir les vuln\u00e9rabilit\u00e9s d\u00e8s que possible pour \u00e9viter les hackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les experts en s\u00e9curit\u00e9 ont mis en garde contre les r\u00e9centes activit\u00e9s des cyber-attaquants qui utilisent le logiciel de ran\u00e7on REvil. Cette fois, les hackers cherchent \u00e0 d\u00e9sactiver l&rsquo;antivirus et \u00e0 infiltrer les syst\u00e8mes via des serveurs Pulse Secure non patch\u00e9s. Les chercheurs en s\u00e9curit\u00e9 conseillent \u00e0 ceux qui exploitent le VPN Pulse Secure de &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LE LOGICIEL DE RAN\u00c7ON REVIL CIBLE MAINTENANT LES SERVEURS VPN NON PATCH\u00c9S<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":1580,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[6],"tags":[],"class_list":["post-1579","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LE LOGICIEL DE RAN\u00c7ON REVIL CIBLE MAINTENANT LES SERVEURS VPN NON PATCH\u00c9S - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LE LOGICIEL DE RAN\u00c7ON REVIL CIBLE MAINTENANT LES SERVEURS VPN NON PATCH\u00c9S - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Les experts en s\u00e9curit\u00e9 ont mis en garde contre les r\u00e9centes activit\u00e9s des cyber-attaquants qui utilisent le logiciel de ran\u00e7on REvil. Cette fois, les hackers cherchent \u00e0 d\u00e9sactiver l&rsquo;antivirus et \u00e0 infiltrer les syst\u00e8mes via des serveurs Pulse Secure non patch\u00e9s. Les chercheurs en s\u00e9curit\u00e9 conseillent \u00e0 ceux qui exploitent le VPN Pulse Secure de &hellip; Continue reading LE LOGICIEL DE RAN\u00c7ON REVIL CIBLE MAINTENANT LES SERVEURS VPN NON PATCH\u00c9S\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-07T08:25:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-08T08:28:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/01\/Researchers-Warned-Against-Malware-That-Targets-VPN-Accounts.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LE LOGICIEL DE RAN\u00c7ON REVIL CIBLE MAINTENANT LES SERVEURS VPN NON PATCH\u00c9S\",\"datePublished\":\"2020-01-07T08:25:56+00:00\",\"dateModified\":\"2020-01-08T08:28:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\\\/\"},\"wordCount\":911,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Researchers-Warned-Against-Malware-That-Targets-VPN-Accounts.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\\\/\",\"name\":\"LE LOGICIEL DE RAN\u00c7ON REVIL CIBLE MAINTENANT LES SERVEURS VPN NON PATCH\u00c9S - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Researchers-Warned-Against-Malware-That-Targets-VPN-Accounts.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-01-07T08:25:56+00:00\",\"dateModified\":\"2020-01-08T08:28:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Researchers-Warned-Against-Malware-That-Targets-VPN-Accounts.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Researchers-Warned-Against-Malware-That-Targets-VPN-Accounts.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LE LOGICIEL DE RAN\u00c7ON REVIL CIBLE MAINTENANT LES SERVEURS VPN NON PATCH\u00c9S\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LE LOGICIEL DE RAN\u00c7ON REVIL CIBLE MAINTENANT LES SERVEURS VPN NON PATCH\u00c9S - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/","og_locale":"fr_FR","og_type":"article","og_title":"LE LOGICIEL DE RAN\u00c7ON REVIL CIBLE MAINTENANT LES SERVEURS VPN NON PATCH\u00c9S - Blog KoDDoS","og_description":"Les experts en s\u00e9curit\u00e9 ont mis en garde contre les r\u00e9centes activit\u00e9s des cyber-attaquants qui utilisent le logiciel de ran\u00e7on REvil. Cette fois, les hackers cherchent \u00e0 d\u00e9sactiver l&rsquo;antivirus et \u00e0 infiltrer les syst\u00e8mes via des serveurs Pulse Secure non patch\u00e9s. Les chercheurs en s\u00e9curit\u00e9 conseillent \u00e0 ceux qui exploitent le VPN Pulse Secure de &hellip; Continue reading LE LOGICIEL DE RAN\u00c7ON REVIL CIBLE MAINTENANT LES SERVEURS VPN NON PATCH\u00c9S","og_url":"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-01-07T08:25:56+00:00","article_modified_time":"2020-01-08T08:28:35+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/01\/Researchers-Warned-Against-Malware-That-Targets-VPN-Accounts.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LE LOGICIEL DE RAN\u00c7ON REVIL CIBLE MAINTENANT LES SERVEURS VPN NON PATCH\u00c9S","datePublished":"2020-01-07T08:25:56+00:00","dateModified":"2020-01-08T08:28:35+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/"},"wordCount":911,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/01\/Researchers-Warned-Against-Malware-That-Targets-VPN-Accounts.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/","url":"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/","name":"LE LOGICIEL DE RAN\u00c7ON REVIL CIBLE MAINTENANT LES SERVEURS VPN NON PATCH\u00c9S - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/01\/Researchers-Warned-Against-Malware-That-Targets-VPN-Accounts.jpg?fit=825%2C510&ssl=1","datePublished":"2020-01-07T08:25:56+00:00","dateModified":"2020-01-08T08:28:35+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/01\/Researchers-Warned-Against-Malware-That-Targets-VPN-Accounts.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/01\/Researchers-Warned-Against-Malware-That-Targets-VPN-Accounts.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/le-logiciel-de-rancon-revil-cible-maintenant-les-serveurs-vpn-non-patches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LE LOGICIEL DE RAN\u00c7ON REVIL CIBLE MAINTENANT LES SERVEURS VPN NON PATCH\u00c9S"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/01\/Researchers-Warned-Against-Malware-That-Targets-VPN-Accounts.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-pt","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=1579"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1579\/revisions"}],"predecessor-version":[{"id":1581,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1579\/revisions\/1581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/1580"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=1579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=1579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=1579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}