{"id":2018,"date":"2020-04-30T15:48:51","date_gmt":"2020-04-30T13:48:51","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=2018"},"modified":"2020-04-30T15:49:00","modified_gmt":"2020-04-30T13:49:00","slug":"lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/","title":{"rendered":"L&rsquo;ATTAQUE DDOS CONTRE BINANCE SERAIT L&rsquo;\u0152UVRE DE SON CONCURRENT: CZ"},"content":{"rendered":"\n<p>Binance, la plus grande plateforme d&rsquo;\u00e9change de crypto-monnaie au monde, a r\u00e9cemment \u00e9t\u00e9 victime d&rsquo;attaques DDoS. La plateforme a \u00e9t\u00e9 attaqu\u00e9e hier, et le directeur g\u00e9n\u00e9ral Changpeng Zhao (CZ) a imput\u00e9 l&rsquo;attaque \u00e0 ses \u00ab\u00a0concurrents qui se per\u00e7oivent comme tels\u00a0\u00bb.<\/p>\n\n\n\n<p>\u00ab\u00a0Sur la base du mod\u00e8le d&rsquo;attaque, cela pourrait \u00eatre l&rsquo;\u0153uvre de nos concurrents\u00a0\u00bb, a-t-il d\u00e9clar\u00e9 dans un message Twitter hier.<\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/twitter.com\/cz_binance\/status\/1255446925274472448?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1255446925274472448&#038;ref_url=https%3A%2F%2Fkoddos.net%2Fblog%2Fddos-attack-on-binance-was-the-work-of-competitors-cz%2F\n<\/div><\/figure>\n\n\n\n<p>Il a \u00e9galement tweet\u00e9 que Binance a employ\u00e9 des hackers au chapeau blanc qui travaillent sur des tests internes pour garder la plateforme plus s\u00e9curis\u00e9e.<\/p>\n\n\n\n<p>Il r\u00e9pondait \u00e0 des tweets qui sugg\u00e9raient que Binance devrait avoir des hackers qui testeraient la structure de s\u00e9curit\u00e9 de la bourse et trouveraient toute faille avant les hackers au chapeau noir.<\/p>\n\n\n\n<p>Un tweet sugg\u00e9rait que Binance devrait suivre les traces de soci\u00e9t\u00e9s technologiques mondiales comme <strong><a href=\"https:\/\/koddos.net\/blog\/facebook-and-google-sued-for-secretly-monitoring-user-location\/\">Facebook et Google<\/a><\/strong>, qui emploient des hackers au chapeau blanc pour les aider \u00e0 s\u00e9curiser leurs syst\u00e8mes.<\/p>\n\n\n\n<p>En plus de la r\u00e9ponse, CZ a tweet\u00e9 que sa soci\u00e9t\u00e9 a aussi de tels hackers, ainsi que des concurrents qui se per\u00e7oivent comme tels et qui font des tests pour la plateforme.<\/p>\n\n\n\n<p><strong>L&rsquo;attaque a \u00e9t\u00e9 signal\u00e9e pour la premi\u00e8re fois plus t\u00f4t hier par le co-fondateur, Yi He<\/strong><\/p>\n\n\n\n<p>Les rapports ont r\u00e9v\u00e9l\u00e9 que Yi Hi, co-fondateur de Binance, avait initialement signal\u00e9 l&rsquo;attaque plus t\u00f4t dans la journ\u00e9e. Cependant, \u00e0 l&rsquo;heure o\u00f9 nous \u00e9crivons ces lignes, Binance n&rsquo;a pas encore publi\u00e9 de d\u00e9claration officielle concernant l&rsquo;attentat.<\/p>\n\n\n\n<p>CZ a r\u00e9v\u00e9l\u00e9 que les domaines chinois de l&rsquo;\u00e9change ont eu quelques probl\u00e8mes r\u00e9cemment, et que les <strong><a href=\"https:\/\/koddos.net\/blog\/plugin-vulnerably-in-wordpress-could-give-hackers-total-control-over-your-site\/\">hackers \u00e9thiques<\/a><\/strong> ne sont pas responsables. Il a d\u00e9clar\u00e9 que certains concurrents tentent de perturber le portail de la bourse et de le discr\u00e9diter aux yeux des clients. CZ a d\u00e9clar\u00e9 que la plateforme d&rsquo;\u00e9change est maintenant op\u00e9rationnelle.<\/p>\n\n\n\n<p><strong>Les plateformes d&rsquo;\u00e9changes de cryptomonnaies sont de plus en plus cibl\u00e9es<\/strong><\/p>\n\n\n\n<p>Ce d\u00e9veloppement fait suite \u00e0 l&rsquo;attaque r\u00e9cente de la principale bourse de cryptomonnaie, OKEx. Il a \u00e9t\u00e9 rapport\u00e9 qu&rsquo;une s\u00e9rie d&rsquo;attaques DDoS a eu lieu sur les \u00e9changes en f\u00e9vrier, entra\u00eenant des pannes de syst\u00e8mes cl\u00e9s. La bourse a ferm\u00e9 son portail avant de le reprendre apr\u00e8s avoir install\u00e9 certains serveurs.<\/p>\n\n\n\n<p>En cons\u00e9quence, Jay Hao, le PDG d&rsquo;OKEx, a d\u00e9clar\u00e9 que certains concurrents non nomm\u00e9s \u00e9taient \u00e0 bl\u00e2mer pour l&rsquo;attaque. OKEx a r\u00e9v\u00e9l\u00e9 que l&rsquo;attaque n&rsquo;avait pas endommag\u00e9 la plateforme car elle a \u00e9t\u00e9 trait\u00e9e de mani\u00e8re significative avant de pouvoir causer des dommages importants. Elle a \u00e9galement r\u00e9v\u00e9l\u00e9 qu&rsquo;aucun client \u00e9tranger n&rsquo;a \u00e9t\u00e9 touch\u00e9 par l&rsquo;attaque.<\/p>\n\n\n\n<p>Le mois dernier encore, la crypto-bourse BitMex a subi une attaque lors du crash \u00e9pique du Jeudi noir. Il a entra\u00een\u00e9 une liquidation massive, qui a fait subir de lourdes pertes \u00e0 plusieurs traders. Comme OKEx, la <strong><a href=\"https:\/\/zycrypto.com\/bitcoin-price-plunge-bitmex-blames-two-ddos-attacks-for-crashing-its-exchange\/\">bourse BitMEX<\/a><\/strong> a d\u00e9clar\u00e9 que les concurrents sont responsables de l&rsquo;attaque. Cependant, de nombreux observateurs ont r\u00e9fut\u00e9 cette affirmation et ont d\u00e9clar\u00e9 que le BitMEX avait provoqu\u00e9 l&rsquo;attaque intentionnellement.<\/p>\n\n\n\n<p>Avec cette s\u00e9rie d&rsquo;attaques, les acteurs du secteur pensent que les deux attaques pourraient avoir un lien.<\/p>\n\n\n\n<p><strong>Certains observateurs divergent d&rsquo;opinion sur les agresseurs<\/strong><\/p>\n\n\n\n<p>La nature de l&rsquo;attaque et son objectif ont conduit CZ \u00e0 rejeter la faute sur ses concurrents dans le domaine d&rsquo;\u00e9change, en particulier ceux bas\u00e9s en Chine.<\/p>\n\n\n\n<p>Comme CZ l&rsquo;a d\u00e9j\u00e0 r\u00e9v\u00e9l\u00e9, les utilisateurs et les clients ne devraient pas s&rsquo;inqui\u00e9ter de l&rsquo;attaque car leurs fonds sont en s\u00e9curit\u00e9 et la bourse a depuis mis en place un correctif.<\/p>\n\n\n\n<p>Mais certains observateurs qui commentent la publication de CZ ont d\u00e9clar\u00e9 que l&rsquo;attaque ne pouvait pas venir des concurrents. Selon eux, Binance n&rsquo;a pas de concurrents r\u00e9els qui pourraient penser qu&rsquo;une <strong><a href=\"https:\/\/koddos.net\/blog\/ddos-attack-on-us-health-agency-tied-to-a-suspicious-sms-campaign\/\">attaque DDoS<\/a><\/strong> lui nuirait.<\/p>\n\n\n\n<p>Selon eux, l&rsquo;attaque pourrait \u00eatre une erreur de l&rsquo;int\u00e9rieur, et la seule fa\u00e7on de sauver la face est de rejeter la faute sur les concurrents.<\/p>\n\n\n\n<p><strong>Recommandations concernant l&rsquo;utilisation de plateforme centralis\u00e9e<\/strong><\/p>\n\n\n\n<p>Les attaques DDoS sont men\u00e9es pour surcharger les serveurs, emp\u00eachant les utilisateurs d&rsquo;acc\u00e9der aux informations \u00e0 partir des serveurs. Ainsi, toute personne souhaitant se retirer ou effectuer des transactions sur la plateforme ne peut le faire, ce qui entra\u00eene une forte baisse des volumes de transactions.<\/p>\n\n\n\n<p>En tout \u00e9tat de cause, les r\u00e9centes attaques montrent le danger de conserver des fonds dans une plateforme centralis\u00e9e comme Binance. Qu&rsquo;il y ait eu une perte ou non, c&rsquo;est un fait que les utilisateurs ne peuvent pas acc\u00e9der \u00e0 la plateforme. Cela signifie que leurs comptes resteront gel\u00e9s jusqu&rsquo;\u00e0 ce que le probl\u00e8me soit r\u00e9solu, comme <strong><a href=\"https:\/\/en.cryptonomist.ch\/2020\/04\/20\/uniswap-attack-defi\/\">ce fut le cas avec DeFi<\/a><\/strong> il y a quelques semaines.<\/p>\n\n\n\n<p>En cons\u00e9quence, les parties prenantes ont recommand\u00e9 de ne pas conserver les fonds crypt\u00e9s sur une plateforme centralis\u00e9e afin d&rsquo;\u00e9viter de perdre des fonds en raison d&rsquo;attaques externes ou de probl\u00e8mes techniques.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Binance, la plus grande plateforme d&rsquo;\u00e9change de crypto-monnaie au monde, a r\u00e9cemment \u00e9t\u00e9 victime d&rsquo;attaques DDoS. La plateforme a \u00e9t\u00e9 attaqu\u00e9e hier, et le directeur g\u00e9n\u00e9ral Changpeng Zhao (CZ) a imput\u00e9 l&rsquo;attaque \u00e0 ses \u00ab\u00a0concurrents qui se per\u00e7oivent comme tels\u00a0\u00bb. \u00ab\u00a0Sur la base du mod\u00e8le d&rsquo;attaque, cela pourrait \u00eatre l&rsquo;\u0153uvre de nos concurrents\u00a0\u00bb, a-t-il d\u00e9clar\u00e9 &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">L&rsquo;ATTAQUE DDOS CONTRE BINANCE SERAIT L&rsquo;\u0152UVRE DE SON CONCURRENT: CZ<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2019,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-2018","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>L&#039;ATTAQUE DDOS CONTRE BINANCE SERAIT L&#039;\u0152UVRE DE SON CONCURRENT: CZ - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L&#039;ATTAQUE DDOS CONTRE BINANCE SERAIT L&#039;\u0152UVRE DE SON CONCURRENT: CZ - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Binance, la plus grande plateforme d&rsquo;\u00e9change de crypto-monnaie au monde, a r\u00e9cemment \u00e9t\u00e9 victime d&rsquo;attaques DDoS. La plateforme a \u00e9t\u00e9 attaqu\u00e9e hier, et le directeur g\u00e9n\u00e9ral Changpeng Zhao (CZ) a imput\u00e9 l&rsquo;attaque \u00e0 ses \u00ab\u00a0concurrents qui se per\u00e7oivent comme tels\u00a0\u00bb. \u00ab\u00a0Sur la base du mod\u00e8le d&rsquo;attaque, cela pourrait \u00eatre l&rsquo;\u0153uvre de nos concurrents\u00a0\u00bb, a-t-il d\u00e9clar\u00e9 &hellip; Continue reading L&rsquo;ATTAQUE DDOS CONTRE BINANCE SERAIT L&rsquo;\u0152UVRE DE SON CONCURRENT: CZ\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-30T13:48:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-30T13:49:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/04\/DDoS-Attack-on-Binance-was-the-Work-of-Competitors.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"L&rsquo;ATTAQUE DDOS CONTRE BINANCE SERAIT L&rsquo;\u0152UVRE DE SON CONCURRENT: CZ\",\"datePublished\":\"2020-04-30T13:48:51+00:00\",\"dateModified\":\"2020-04-30T13:49:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\\\/\"},\"wordCount\":923,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/DDoS-Attack-on-Binance-was-the-Work-of-Competitors.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\\\/\",\"name\":\"L'ATTAQUE DDOS CONTRE BINANCE SERAIT L'\u0152UVRE DE SON CONCURRENT: CZ - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/DDoS-Attack-on-Binance-was-the-Work-of-Competitors.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-04-30T13:48:51+00:00\",\"dateModified\":\"2020-04-30T13:49:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/DDoS-Attack-on-Binance-was-the-Work-of-Competitors.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/DDoS-Attack-on-Binance-was-the-Work-of-Competitors.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L&rsquo;ATTAQUE DDOS CONTRE BINANCE SERAIT L&rsquo;\u0152UVRE DE SON CONCURRENT: CZ\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L'ATTAQUE DDOS CONTRE BINANCE SERAIT L'\u0152UVRE DE SON CONCURRENT: CZ - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/","og_locale":"fr_FR","og_type":"article","og_title":"L'ATTAQUE DDOS CONTRE BINANCE SERAIT L'\u0152UVRE DE SON CONCURRENT: CZ - Blog KoDDoS","og_description":"Binance, la plus grande plateforme d&rsquo;\u00e9change de crypto-monnaie au monde, a r\u00e9cemment \u00e9t\u00e9 victime d&rsquo;attaques DDoS. La plateforme a \u00e9t\u00e9 attaqu\u00e9e hier, et le directeur g\u00e9n\u00e9ral Changpeng Zhao (CZ) a imput\u00e9 l&rsquo;attaque \u00e0 ses \u00ab\u00a0concurrents qui se per\u00e7oivent comme tels\u00a0\u00bb. \u00ab\u00a0Sur la base du mod\u00e8le d&rsquo;attaque, cela pourrait \u00eatre l&rsquo;\u0153uvre de nos concurrents\u00a0\u00bb, a-t-il d\u00e9clar\u00e9 &hellip; Continue reading L&rsquo;ATTAQUE DDOS CONTRE BINANCE SERAIT L&rsquo;\u0152UVRE DE SON CONCURRENT: CZ","og_url":"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-04-30T13:48:51+00:00","article_modified_time":"2020-04-30T13:49:00+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/04\/DDoS-Attack-on-Binance-was-the-Work-of-Competitors.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"L&rsquo;ATTAQUE DDOS CONTRE BINANCE SERAIT L&rsquo;\u0152UVRE DE SON CONCURRENT: CZ","datePublished":"2020-04-30T13:48:51+00:00","dateModified":"2020-04-30T13:49:00+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/"},"wordCount":923,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/04\/DDoS-Attack-on-Binance-was-the-Work-of-Competitors.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/","url":"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/","name":"L'ATTAQUE DDOS CONTRE BINANCE SERAIT L'\u0152UVRE DE SON CONCURRENT: CZ - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/04\/DDoS-Attack-on-Binance-was-the-Work-of-Competitors.jpg?fit=825%2C510&ssl=1","datePublished":"2020-04-30T13:48:51+00:00","dateModified":"2020-04-30T13:49:00+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/04\/DDoS-Attack-on-Binance-was-the-Work-of-Competitors.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/04\/DDoS-Attack-on-Binance-was-the-Work-of-Competitors.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/lattaque-ddos-contre-binance-serait-loeuvre-de-son-concurrent-cz\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"L&rsquo;ATTAQUE DDOS CONTRE BINANCE SERAIT L&rsquo;\u0152UVRE DE SON CONCURRENT: CZ"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/04\/DDoS-Attack-on-Binance-was-the-Work-of-Competitors.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-wy","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2018","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=2018"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2018\/revisions"}],"predecessor-version":[{"id":2021,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2018\/revisions\/2021"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/2019"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=2018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=2018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=2018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}