{"id":1918,"date":"2020-04-10T18:15:35","date_gmt":"2020-04-10T16:15:35","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=1918"},"modified":"2020-04-10T18:15:38","modified_gmt":"2020-04-10T16:15:38","slug":"des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/","title":{"rendered":"DES APPLICATIONS DE SUIVI DE LA PAND\u00c9MIE DE CORONAVIRUS INFECTENT LES APPAREILS ANDROID"},"content":{"rendered":"\n<p>La\nsoci\u00e9t\u00e9 Check Point Security <strong><a href=\"https:\/\/research.checkpoint.com\/2020\/covid-19-goes-mobile-coronavirus-malicious-applications-discovered\/\">a\nd\u00e9couvert<\/a><\/strong> que certaines applications de suivi sur des\ncoronavirus peuvent ouvrir des fen\u00eatres de piratage pour que les cybercriminels\nprennent le contr\u00f4le des appareils. Les attaquants peuvent utiliser les\napplications pour avoir acc\u00e8s \u00e0 l&rsquo;agenda, aux contacts et \u00e0 d&rsquo;autres d\u00e9tails de\nl&rsquo;appareil de la victime.<\/p>\n\n\n\n<p>Les\nlogiciels malveillants pour t\u00e9l\u00e9phones portables ont toujours \u00e9t\u00e9 une menace.\nMais la menace a atteint un niveau sans pr\u00e9c\u00e9dent, car les cybercriminels\nexploitent continuellement l&rsquo;environnement sanitaire vuln\u00e9rable actuel avec des\nlogiciels de ran\u00e7on, des emails d&rsquo;hame\u00e7onnage et d&rsquo;autres formes d&rsquo;attaques.\nIls profitent de la peur que suscite l&rsquo;<strong><a href=\"https:\/\/koddos.net\/blog\/cybercriminals-intensify-activities-amidst-covid-19\/\">\u00e9pid\u00e9mie\nde COVID-19<\/a><\/strong> pour tromper les utilisateurs d&rsquo;appareils mobiles et\ninfiltrer leurs appareils.<\/p>\n\n\n\n<p>R\u00e9cemment,\nle fournisseur de services de cybers\u00e9curit\u00e9 Check Point Research a d\u00e9couvert\nune application sur le th\u00e8me de COVID-19 qui proposerait des mises \u00e0 jour et\ndes informations sur la pand\u00e9mie. Cependant, l&rsquo;application fournit des <strong><a href=\"https:\/\/koddos.net\/blog\/26-sim-swappers-arrested-by-europol-after-stealing-nearly-4-million\/\">chevaux\nde Troie<\/a><\/strong> d&rsquo;acc\u00e8s \u00e0 distance ainsi que d&rsquo;autres logiciels\nmalveillants sur les appareils. Lorsque l&rsquo;utilisateur t\u00e9l\u00e9charge l&rsquo;application,\nson appareil est compromis et les attaquants ont acc\u00e8s \u00e0 plusieurs d\u00e9tails de\nl&rsquo;appareil.<\/p>\n\n\n\n<p><strong>Les\nlogiciels malveillants install\u00e9s volent des informations sensibles sur les\nappareils<\/strong><\/p>\n\n\n\n<p>Check\nPoint a publi\u00e9 ses d\u00e9couvertes hier concernant les 16 applications diff\u00e9rentes\nqu&rsquo;il a d\u00e9tect\u00e9es et qui se d\u00e9guisent en applications COVID-19 l\u00e9gitimes.<\/p>\n\n\n\n<p>Lorsque\nces applications sont install\u00e9es, elles soutirent frauduleusement de l&rsquo;argent \u00e0\ndes services payants ou volent des informations sensibles de l&rsquo;appareil. Ces\nlogiciels malveillants se composent notamment de composeurs de num\u00e9ros d&rsquo;appel\nprioritaires, de chevaux de Troie bancaires et de chevaux de Troie d&rsquo;acc\u00e8s \u00e0\ndistance.<\/p>\n\n\n\n<p>Ces\napplications ne sont pas t\u00e9l\u00e9charg\u00e9es \u00e0 partir de boutiques officielles comme\nGoogle Play. Elles proviennent plut\u00f4t de nouveaux sites traitant de la pand\u00e9mie\nde coronavirus. Selon les chercheurs de Check Point, ces sites ont \u00e9t\u00e9 cr\u00e9\u00e9s\ndans le seul but de tromper des utilisateurs peu m\u00e9fiants.<\/p>\n\n\n\n<p>Plus\nde 51 000 domaines li\u00e9s au COVID-19 ont \u00e9t\u00e9 cr\u00e9\u00e9s depuis l&rsquo;apparition du virus\nen d\u00e9cembre de l&rsquo;ann\u00e9e derni\u00e8re. Le mois dernier encore, plus de 30 000 de ces\ndomaines ont \u00e9t\u00e9 cr\u00e9\u00e9s. Sur ce nombre, 2 777 font l&rsquo;objet d&rsquo;une enqu\u00eate pour\npratiques malveillantes, tandis que 131 ont \u00e9t\u00e9 identifi\u00e9s comme des\napplications malveillantes.<\/p>\n\n\n\n<p>Selon\nAviran Hazum, directeur de l&rsquo;unit\u00e9 de recherche mobile de Check Point, outre la\nmenace physique li\u00e9e \u00e0 l&rsquo;\u00e9pid\u00e9mie de COVID-19, le cyberespace est \u00e9galement\ntr\u00e8s menac\u00e9. Les cybercriminels profitent de l&rsquo;\u00e9pid\u00e9mie pour tromper leurs\nvictimes et les inciter \u00e0 installer des applications malveillantes sur leurs\nappareils.<\/p>\n\n\n\n<p>Selon\nlui, \u00ab\u00a0<em>les hackers se r\u00e9jouissent de la peur des coronavirus en cr\u00e9ant\ndes applications malveillantes qui ont des noms et des ic\u00f4nes<\/em>\u00ab\u00a0.<\/p>\n\n\n\n<p><strong>Comment\nl&rsquo;application s&rsquo;infiltre dans les appareils mobiles<\/strong><\/p>\n\n\n\n<p>Check\nPoint a retrac\u00e9 une de ces applications malveillantes et a d\u00e9couvert que les\ncybercriminels avaient mis au point un protocole de test \u00e0 p\u00e9n\u00e9tration libre\nappel\u00e9 Metasploit. Il s&rsquo;agit d&rsquo;un outil facile \u00e0 utiliser qui permet \u00e0 presque\ntoute personne ayant quelques comp\u00e9tences informatiques de d\u00e9velopper un\nprogramme malveillant en quelques minutes.<\/p>\n\n\n\n<p>Les\nchercheurs ont r\u00e9v\u00e9l\u00e9 que trois des applications \u00e9chantillonn\u00e9es \u00e9taient\nappel\u00e9es coronavirus.apk. Les applications \u00e9chantillonn\u00e9es ont \u00e9t\u00e9 con\u00e7ues pour\n\u00eatre d\u00e9ploy\u00e9es sur un grand nombre d&rsquo;<strong><a href=\"https:\/\/koddos.net\/blog\/malicious-coronavirus-linked-android-apps-hack-user-devices\/\">appareils\nmobiles<\/a><\/strong>. Lorsque l&rsquo;utilisateur installe l&rsquo;application, il lance\nun service qui lui permet de les garder compl\u00e8tement hors de port\u00e9e. <\/p>\n\n\n\n<p>L&rsquo;application\npeut s&rsquo;infiltrer et voler des fichiers tout en restant non d\u00e9tect\u00e9e. Ils\npeuvent se connecter \u00e0 un centre de commande et de contr\u00f4le qui leur donne un\nacc\u00e8s gratuit pour t\u00e9l\u00e9charger la charge utile malveillante.<\/p>\n\n\n\n<p>Selon\nles chercheurs de Check Point, un logiciel malveillant lou\u00e9 connu sous le nom\nde Cerberus Banking Trojan a \u00e9t\u00e9 utilis\u00e9 comme charge utile pour contr\u00f4ler les\nappareils infiltr\u00e9s. Le service peut \u00eatre utilis\u00e9 par n&rsquo;importe qui sur une\nbase de location s&rsquo;il veut d\u00e9velopper sa charge utile et avoir le contr\u00f4le des\nappareils infect\u00e9s.<\/p>\n\n\n\n<p>En\ngros, le <strong><a href=\"https:\/\/www.zdnet.com\/article\/android-malware-can-steal-google-authenticator-2fa-codes\/\">cheval\nde Troie Cerberus<\/a><\/strong> peut contr\u00f4ler l&rsquo;appareil infiltr\u00e9 \u00e0 distance,\nespionner les SMS, voler les donn\u00e9es de l&rsquo;authentificateur Google et capturer\nles informations d&rsquo;identification de l&rsquo;utilisateur et les frappes de clavier. <\/p>\n\n\n\n<p>Check\nPoint a \u00e9galement d\u00e9couvert d&rsquo;autres \u00e9chantillons qui utilisent le Premium\nDealer, qui permet d&rsquo;abonner automatiquement les utilisateurs \u00e0 des services\npremium sans leur accord ou \u00e0 leur insu. <\/p>\n\n\n\n<p>Hiddad,\nun autre logiciel malveillant d\u00e9couvert, envoie automatiquement des publicit\u00e9s\nsur l&rsquo;\u00e9cran de l&rsquo;appareil infect\u00e9 m\u00eame lorsque l&rsquo;application n&rsquo;est pas ouverte.<\/p>\n\n\n\n<p><strong>Comment\n\u00e9viter les attaques<\/strong><\/p>\n\n\n\n<p>Check\nPoint a \u00e9galement offert des conseils pour \u00e9viter d&rsquo;\u00eatre victime d&rsquo;une telle\nattaque malveillante. Selon l&rsquo;entreprise de s\u00e9curit\u00e9, les utilisateurs\ndevraient bloquer les appels non sollicit\u00e9s, permettre le balayage des donn\u00e9es\net l&rsquo;horloge \u00e0 distance, et \u00e9viter de se connecter aux <strong><a href=\"https:\/\/koddos.net\/blog\/new-kr00k-bug-allow-unauthorized-persons-to-decrypt-wi-fi-packets\/\">r\u00e9seaux\nWi-Fi publics<\/a><\/strong>. Ils devraient \u00e9galement t\u00e9l\u00e9charger des\napplications uniquement lorsqu&rsquo;elles proviennent de boutiques d&rsquo;applications\nr\u00e9put\u00e9es. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>La soci\u00e9t\u00e9 Check Point Security a d\u00e9couvert que certaines applications de suivi sur des coronavirus peuvent ouvrir des fen\u00eatres de piratage pour que les cybercriminels prennent le contr\u00f4le des appareils. Les attaquants peuvent utiliser les applications pour avoir acc\u00e8s \u00e0 l&rsquo;agenda, aux contacts et \u00e0 d&rsquo;autres d\u00e9tails de l&rsquo;appareil de la victime. Les logiciels malveillants &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">DES APPLICATIONS DE SUIVI DE LA PAND\u00c9MIE DE CORONAVIRUS INFECTENT LES APPAREILS ANDROID<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":1919,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[6],"tags":[],"class_list":["post-1918","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DES APPLICATIONS DE SUIVI DE LA PAND\u00c9MIE DE CORONAVIRUS INFECTENT LES APPAREILS ANDROID - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DES APPLICATIONS DE SUIVI DE LA PAND\u00c9MIE DE CORONAVIRUS INFECTENT LES APPAREILS ANDROID - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"La soci\u00e9t\u00e9 Check Point Security a d\u00e9couvert que certaines applications de suivi sur des coronavirus peuvent ouvrir des fen\u00eatres de piratage pour que les cybercriminels prennent le contr\u00f4le des appareils. Les attaquants peuvent utiliser les applications pour avoir acc\u00e8s \u00e0 l&rsquo;agenda, aux contacts et \u00e0 d&rsquo;autres d\u00e9tails de l&rsquo;appareil de la victime. Les logiciels malveillants &hellip; Continue reading DES APPLICATIONS DE SUIVI DE LA PAND\u00c9MIE DE CORONAVIRUS INFECTENT LES APPAREILS ANDROID\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-10T16:15:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-10T16:15:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/04\/Malicious-Coronavirus-Based-Apps-Compromising-Android-Devices.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"DES APPLICATIONS DE SUIVI DE LA PAND\u00c9MIE DE CORONAVIRUS INFECTENT LES APPAREILS ANDROID\",\"datePublished\":\"2020-04-10T16:15:35+00:00\",\"dateModified\":\"2020-04-10T16:15:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\\\/\"},\"wordCount\":914,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Malicious-Coronavirus-Based-Apps-Compromising-Android-Devices.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\\\/\",\"name\":\"DES APPLICATIONS DE SUIVI DE LA PAND\u00c9MIE DE CORONAVIRUS INFECTENT LES APPAREILS ANDROID - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Malicious-Coronavirus-Based-Apps-Compromising-Android-Devices.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-04-10T16:15:35+00:00\",\"dateModified\":\"2020-04-10T16:15:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Malicious-Coronavirus-Based-Apps-Compromising-Android-Devices.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Malicious-Coronavirus-Based-Apps-Compromising-Android-Devices.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DES APPLICATIONS DE SUIVI DE LA PAND\u00c9MIE DE CORONAVIRUS INFECTENT LES APPAREILS ANDROID\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DES APPLICATIONS DE SUIVI DE LA PAND\u00c9MIE DE CORONAVIRUS INFECTENT LES APPAREILS ANDROID - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/","og_locale":"fr_FR","og_type":"article","og_title":"DES APPLICATIONS DE SUIVI DE LA PAND\u00c9MIE DE CORONAVIRUS INFECTENT LES APPAREILS ANDROID - Blog KoDDoS","og_description":"La soci\u00e9t\u00e9 Check Point Security a d\u00e9couvert que certaines applications de suivi sur des coronavirus peuvent ouvrir des fen\u00eatres de piratage pour que les cybercriminels prennent le contr\u00f4le des appareils. Les attaquants peuvent utiliser les applications pour avoir acc\u00e8s \u00e0 l&rsquo;agenda, aux contacts et \u00e0 d&rsquo;autres d\u00e9tails de l&rsquo;appareil de la victime. Les logiciels malveillants &hellip; Continue reading DES APPLICATIONS DE SUIVI DE LA PAND\u00c9MIE DE CORONAVIRUS INFECTENT LES APPAREILS ANDROID","og_url":"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-04-10T16:15:35+00:00","article_modified_time":"2020-04-10T16:15:38+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/04\/Malicious-Coronavirus-Based-Apps-Compromising-Android-Devices.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"DES APPLICATIONS DE SUIVI DE LA PAND\u00c9MIE DE CORONAVIRUS INFECTENT LES APPAREILS ANDROID","datePublished":"2020-04-10T16:15:35+00:00","dateModified":"2020-04-10T16:15:38+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/"},"wordCount":914,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/04\/Malicious-Coronavirus-Based-Apps-Compromising-Android-Devices.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/","url":"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/","name":"DES APPLICATIONS DE SUIVI DE LA PAND\u00c9MIE DE CORONAVIRUS INFECTENT LES APPAREILS ANDROID - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/04\/Malicious-Coronavirus-Based-Apps-Compromising-Android-Devices.jpg?fit=825%2C510&ssl=1","datePublished":"2020-04-10T16:15:35+00:00","dateModified":"2020-04-10T16:15:38+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/04\/Malicious-Coronavirus-Based-Apps-Compromising-Android-Devices.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/04\/Malicious-Coronavirus-Based-Apps-Compromising-Android-Devices.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/des-applications-de-suivi-de-la-pandemie-de-coronavirus-infectent-les-appareils-android\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"DES APPLICATIONS DE SUIVI DE LA PAND\u00c9MIE DE CORONAVIRUS INFECTENT LES APPAREILS ANDROID"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/04\/Malicious-Coronavirus-Based-Apps-Compromising-Android-Devices.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-uW","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=1918"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1918\/revisions"}],"predecessor-version":[{"id":1920,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1918\/revisions\/1920"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/1919"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=1918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=1918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=1918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}