{"id":1761,"date":"2020-02-24T14:37:47","date_gmt":"2020-02-24T13:37:47","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=1761"},"modified":"2020-02-25T14:42:22","modified_gmt":"2020-02-25T13:42:22","slug":"les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/","title":{"rendered":"LES CHERCHEURS ONT D\u00c9COUVERT DEUX LOGICIELS ESPIONS DANS GOOGLE PLAY STORE"},"content":{"rendered":"\n<p>Les\nchercheurs en s\u00e9curit\u00e9 de Check Point ont d\u00e9couvert deux types de logiciels\nmalveillants diff\u00e9rents, Haken et Joker, dans Google Play Store. <\/p>\n\n\n\n<p>Selon\nun <strong><a href=\"https:\/\/research.checkpoint.com\/2020\/android-app-fraud-haken-clicker-and-joker-premium-dialer\/\">billet\nde blog<\/a><\/strong> des chercheurs Aviran Hazum, Bogdan Melnykov et Ohad\nMana, les logiciels malveillants changent constamment de forme afin d&rsquo;\u00e9viter le\nsyst\u00e8me de s\u00e9curit\u00e9 de Google.<\/p>\n\n\n\n<p>Le\nblog a \u00e9galement r\u00e9v\u00e9l\u00e9 que les <strong><a href=\"https:\/\/koddos.net\/blog\/hackers-exposed-personal-details-of-10-6m-mgm-hotel-guests\/\">hackers<\/a><\/strong>\nont d\u00e9velopp\u00e9 le logiciel espion pour \u00e9viter d&rsquo;\u00eatre rep\u00e9r\u00e9s par les\nutilisateurs am\u00e9ricains ou canadiens. Le logiciel malveillant utilise des\ndonn\u00e9es de g\u00e9olocalisation pour trouver les services premium attribu\u00e9s \u00e0&nbsp;\nun appareil dans un lieu g\u00e9ographique donn\u00e9.<\/p>\n\n\n\n<p>&nbsp;\n\u00abAvec l&rsquo;acc\u00e8s \u00e0&nbsp; Notification Listener, et la possibilit\u00e9 d&rsquo;envoyer des\nSMS, la charge utile intercepte les SMS entrants et extrait le code de\nconfirmation du service premium (2FA) et l&rsquo;envoie \u00e0&nbsp; la&nbsp; \u00abpage d&rsquo;offre \u00bb, pour abonner l&rsquo;utilisateur\n\u00e0&nbsp; ce service premium \u00bb, ont d\u00e9clar\u00e9 les chercheurs.<\/p>\n\n\n\n<p>De\nm\u00eame, les chercheurs ont soulign\u00e9 qu&rsquo;il existe un nouveau logiciel espion de\nclic, connu sous le nom de \u00abHacken\u00bb, qui a \u00e9t\u00e9 d\u00e9couvert dans huit applications\nsur <strong><a href=\"https:\/\/koddos.net\/blog\/google-play-store-bans-yet-another-group-of-malicious-apps\/\">Google\nPlay Store<\/a><\/strong>. Il imite l&rsquo;utilisateur et clique sur les annonces au\nnom de l&rsquo;utilisateur.<\/p>\n\n\n\n<p>Selon\nles chercheurs,&nbsp; \u00abCette campagne vient de\ncommencer son chemin dans Google Play Store. Avec huit applications\nmalveillantes et plus de 50 000 t\u00e9l\u00e9chargements, le&nbsp; \u00abclicqueur \u00bb vise \u00e0&nbsp; mettre la main sur\nle plus grand nombre d&rsquo;appareils possible pour g\u00e9n\u00e9rer des profits ill\u00e9gitimes.\n<\/p>\n\n\n\n<p>Les\nhackers ont r\u00e9ussi \u00e0&nbsp; rester sous le radar gr\u00e2ce \u00e0&nbsp; l&rsquo;utilisation\nd&rsquo;applications en arri\u00e8re-plan et du code natif. <\/p>\n\n\n\n<p>&nbsp;\u00abAvec\nl&rsquo;utilisation du code natif, l&rsquo;injection de code dans les Ad-SDK et les\napplications en arri\u00e8re-plan du magasin officiel, Haken a d\u00e9montr\u00e9 des\ncapacit\u00e9s de clic tout en restant sous le radar de Google Play. M\u00eame avec un\nnombre relativement faible de t\u00e9l\u00e9chargements (plus de 50 000), cette campagne\na montr\u00e9 la capacit\u00e9 des acteurs malveillants \u00e0&nbsp; g\u00e9n\u00e9rer des revenus\n\u00e0&nbsp; partir de campagnes publicitaires frauduleuses \u00bb, ont d\u00e9clar\u00e9 les\nchercheurs.<\/p>\n\n\n\n<p><strong>Les\nd\u00e9veloppeurs d&rsquo;applications mobiles devraient renforcer leur s\u00e9curit\u00e9<\/strong><\/p>\n\n\n\n<p>Sam\nBaken, directeur de production chez OneSpan, a d\u00e9clar\u00e9 que les d\u00e9veloppeurs\nd&rsquo;applications mobiles ont un grand r\u00f4le \u00e0&nbsp; jouer dans ce domaine. Il a\nsoulign\u00e9 qu&rsquo;ils devraient fournir plus de s\u00e9curit\u00e9 pour leur application mobile\nafin d&#8217;emp\u00eacher l&rsquo;utilisation non autoris\u00e9e de leurs applications.<\/p>\n\n\n\n<p>Il\na d\u00e9clar\u00e9 au m\u00e9dia MC Media UK<\/p>\n\n\n\n<p>\u00ab<em>Non\nseulement il est difficile de trouver et de retenir les talents de d\u00e9veloppement\nd&rsquo;Android et d&rsquo;iOS, mais les experts en s\u00e9curit\u00e9 des applications mobiles ou\nles d\u00e9veloppeurs mobiles ayant des connaissances en mati\u00e8re de s\u00e9curit\u00e9 sont\nencore moins nombreux et plus \u00e9loign\u00e9s. Mais ce d\u00e9fi n&rsquo;a pas d&rsquo;importance pour\nles consommateurs<\/em>\u00bb.<\/p>\n\n\n\n<p>De\nm\u00eame, le directeur g\u00e9n\u00e9ral d&rsquo;Upstream, Dimitris Mariatis, a d\u00e9clar\u00e9 que bien\nque les consommateurs soient en s\u00e9curit\u00e9 lorsqu&rsquo;ils t\u00e9l\u00e9chargent l&rsquo;application\ndirectement depuis la boutique officielle de Google, des applications peu\nscrupuleuses continuent de passer \u00e0&nbsp; travers leurs <strong><a href=\"https:\/\/koddos.net\/blog\/white-hat-hacker-infiltrates-several-commercial-aircraft-security-systems\/\">syst\u00e8mes\nde s\u00e9curit\u00e9<\/a><\/strong>.<\/p>\n\n\n\n<p>Il\na comment\u00e9 :<\/p>\n\n\n\n<p>\u00ab<em>Les\nfraudeurs semblent cibler certaines cat\u00e9gories d&rsquo;applications plus que\nd&rsquo;autres. Ironiquement, les applications con\u00e7ues pour am\u00e9liorer le\nfonctionnement d&rsquo;un appareil et faciliter la vie quotidienne sont les plus\nsusceptibles d&rsquo;\u00eatre nocives, avec 22,32 % des applications malveillantes pour\n2019 relevant de la cat\u00e9gorie Outils \/ Personnalisation \/ Productivit\u00e9 au\nniveau mondial<\/em>\u00bb.<\/p>\n\n\n\n<p>Dans\nun r\u00e9cent article de blog, InMobi a r\u00e9v\u00e9l\u00e9 que rien que l&rsquo;ann\u00e9e derni\u00e8re, les\nsp\u00e9cialistes du marketing ont perdu pr\u00e8s de 10 milliards de livres sterling en\nraison de fraudes li\u00e9es au t\u00e9l\u00e9chargement et \u00e0&nbsp; l&rsquo;installation\nd&rsquo;applications.<\/p>\n\n\n\n<p>Parmi\nles fraudes les plus courantes li\u00e9es aux applications mobiles, citons le trafic\nnon valide, l&rsquo;inondation de clics, les fausses installations, l&rsquo;usurpation de\nSDK, l&rsquo;injection de clics, ainsi que le spam de clics. Il a d\u00e9clar\u00e9 que cette\nfraude aux applications est encore le principal probl\u00e8me de la publicit\u00e9\nnum\u00e9rique cette ann\u00e9e. Selon lui,&nbsp; \u00abc&rsquo;est\nplus qu&rsquo;une menace invisible, c&rsquo;est une \u00e9pid\u00e9mie \u00bb. La nature de l&rsquo;attaque\nsignifie qu&rsquo;elle sera difficile \u00e0&nbsp; d\u00e9tecter facilement en raison de la\nnature cach\u00e9e que les <strong><a href=\"https:\/\/koddos.net\/blog\/hackers-exposed-personal-details-of-10-6m-mgm-hotel-guests\/\">hackers<\/a><\/strong>\nont conserv\u00e9e des <strong><a href=\"https:\/\/koddos.net\/blog\/android-and-ios-vulnerable-to-italian-law-enforcement-spyware\/\">logiciels\nespions<\/a><\/strong>.<\/p>\n\n\n\n<p>Il\na appel\u00e9 \u00e0&nbsp; une am\u00e9lioration de la s\u00e9curit\u00e9 mobile si les annonceurs\nnum\u00e9riques veulent mettre un terme \u00e0&nbsp; cette situation actuelle. Maniatis a\nd\u00e9clar\u00e9 que&nbsp; \u00absi la situation n&rsquo;est pas\nma\u00eetris\u00e9e, la fraude publicitaire \u00e9touffera la publicit\u00e9 mobile, \u00e9rodera la\nconfiance dans les op\u00e9rateurs et entra\u00eenera une hausse des tarifs appliqu\u00e9s aux\nutilisateurs\u00a0\u00bb.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les chercheurs en s\u00e9curit\u00e9 de Check Point ont d\u00e9couvert deux types de logiciels malveillants diff\u00e9rents, Haken et Joker, dans Google Play Store. Selon un billet de blog des chercheurs Aviran Hazum, Bogdan Melnykov et Ohad Mana, les logiciels malveillants changent constamment de forme afin d&rsquo;\u00e9viter le syst\u00e8me de s\u00e9curit\u00e9 de Google. Le blog a \u00e9galement &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LES CHERCHEURS ONT D\u00c9COUVERT DEUX LOGICIELS ESPIONS DANS GOOGLE PLAY STORE<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":1762,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[6],"tags":[],"class_list":["post-1761","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LES CHERCHEURS ONT D\u00c9COUVERT DEUX LOGICIELS ESPIONS DANS GOOGLE PLAY STORE - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LES CHERCHEURS ONT D\u00c9COUVERT DEUX LOGICIELS ESPIONS DANS GOOGLE PLAY STORE - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Les chercheurs en s\u00e9curit\u00e9 de Check Point ont d\u00e9couvert deux types de logiciels malveillants diff\u00e9rents, Haken et Joker, dans Google Play Store. Selon un billet de blog des chercheurs Aviran Hazum, Bogdan Melnykov et Ohad Mana, les logiciels malveillants changent constamment de forme afin d&rsquo;\u00e9viter le syst\u00e8me de s\u00e9curit\u00e9 de Google. Le blog a \u00e9galement &hellip; Continue reading LES CHERCHEURS ONT D\u00c9COUVERT DEUX LOGICIELS ESPIONS DANS GOOGLE PLAY STORE\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-24T13:37:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-25T13:42:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/Researchers-Discover-Significant-Security-Flaw-in-Google-Chrome-Browser-1.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LES CHERCHEURS ONT D\u00c9COUVERT DEUX LOGICIELS ESPIONS DANS GOOGLE PLAY STORE\",\"datePublished\":\"2020-02-24T13:37:47+00:00\",\"dateModified\":\"2020-02-25T13:42:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\\\/\"},\"wordCount\":848,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Researchers-Discover-Significant-Security-Flaw-in-Google-Chrome-Browser-1.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\\\/\",\"name\":\"LES CHERCHEURS ONT D\u00c9COUVERT DEUX LOGICIELS ESPIONS DANS GOOGLE PLAY STORE - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Researchers-Discover-Significant-Security-Flaw-in-Google-Chrome-Browser-1.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-02-24T13:37:47+00:00\",\"dateModified\":\"2020-02-25T13:42:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Researchers-Discover-Significant-Security-Flaw-in-Google-Chrome-Browser-1.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Researchers-Discover-Significant-Security-Flaw-in-Google-Chrome-Browser-1.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LES CHERCHEURS ONT D\u00c9COUVERT DEUX LOGICIELS ESPIONS DANS GOOGLE PLAY STORE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LES CHERCHEURS ONT D\u00c9COUVERT DEUX LOGICIELS ESPIONS DANS GOOGLE PLAY STORE - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/","og_locale":"fr_FR","og_type":"article","og_title":"LES CHERCHEURS ONT D\u00c9COUVERT DEUX LOGICIELS ESPIONS DANS GOOGLE PLAY STORE - Blog KoDDoS","og_description":"Les chercheurs en s\u00e9curit\u00e9 de Check Point ont d\u00e9couvert deux types de logiciels malveillants diff\u00e9rents, Haken et Joker, dans Google Play Store. Selon un billet de blog des chercheurs Aviran Hazum, Bogdan Melnykov et Ohad Mana, les logiciels malveillants changent constamment de forme afin d&rsquo;\u00e9viter le syst\u00e8me de s\u00e9curit\u00e9 de Google. Le blog a \u00e9galement &hellip; Continue reading LES CHERCHEURS ONT D\u00c9COUVERT DEUX LOGICIELS ESPIONS DANS GOOGLE PLAY STORE","og_url":"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-02-24T13:37:47+00:00","article_modified_time":"2020-02-25T13:42:22+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/Researchers-Discover-Significant-Security-Flaw-in-Google-Chrome-Browser-1.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LES CHERCHEURS ONT D\u00c9COUVERT DEUX LOGICIELS ESPIONS DANS GOOGLE PLAY STORE","datePublished":"2020-02-24T13:37:47+00:00","dateModified":"2020-02-25T13:42:22+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/"},"wordCount":848,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/Researchers-Discover-Significant-Security-Flaw-in-Google-Chrome-Browser-1.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/","url":"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/","name":"LES CHERCHEURS ONT D\u00c9COUVERT DEUX LOGICIELS ESPIONS DANS GOOGLE PLAY STORE - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/Researchers-Discover-Significant-Security-Flaw-in-Google-Chrome-Browser-1.jpg?fit=825%2C510&ssl=1","datePublished":"2020-02-24T13:37:47+00:00","dateModified":"2020-02-25T13:42:22+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/Researchers-Discover-Significant-Security-Flaw-in-Google-Chrome-Browser-1.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/Researchers-Discover-Significant-Security-Flaw-in-Google-Chrome-Browser-1.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/les-chercheurs-ont-decouvert-deux-logiciels-espions-dans-google-play-store\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LES CHERCHEURS ONT D\u00c9COUVERT DEUX LOGICIELS ESPIONS DANS GOOGLE PLAY STORE"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/Researchers-Discover-Significant-Security-Flaw-in-Google-Chrome-Browser-1.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-sp","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=1761"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1761\/revisions"}],"predecessor-version":[{"id":1763,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1761\/revisions\/1763"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/1762"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=1761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=1761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=1761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}