{"id":2050,"date":"2020-05-08T14:03:27","date_gmt":"2020-05-08T12:03:27","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=2050"},"modified":"2020-05-08T14:03:31","modified_gmt":"2020-05-08T12:03:31","slug":"un-hacker-a-compromis-les-comptes-prives-github-de-microsoft","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/","title":{"rendered":"UN HACKER A COMPROMIS LES COMPTES PRIV\u00c9S GITHUB DE MICROSOFT"},"content":{"rendered":"\n<p>Un petit nombre de comptes GitHub d&#8217;employ\u00e9s de Microsoft ont r\u00e9cemment \u00e9t\u00e9 attaqu\u00e9s, car certains des d\u00e9p\u00f4ts GitHub priv\u00e9s de l&rsquo;entreprise ont \u00e9t\u00e9 pirat\u00e9s. Cependant, le <strong><a href=\"https:\/\/koddos.net\/blog\/hackers-camouflage-with-favicon-to-steal-credit-card-data\/\">hacker<\/a><\/strong> n&rsquo;a pu acc\u00e9der \u00e0 aucune application majeure ni compromettre aucun syst\u00e8me vital.<\/p>\n\n\n\n<p>L&rsquo;infiltration a eu lieu en mars et n&rsquo;a \u00e9t\u00e9 connue que cette semaine lorsque le hacker a annonc\u00e9 qu&rsquo;il publiait les d\u00e9tails du piratage dans un forum de darknet.<\/p>\n\n\n\n<p>D&rsquo;apr\u00e8s les informations recueillies aupr\u00e8s de certains employ\u00e9s de Microsoft, une petite partie des fichiers vol\u00e9s \u00e9tait authentique. Mais les hackers n&rsquo;ont pu acc\u00e9der au code source d&rsquo;aucun des projets principaux de Microsoft tels qu&rsquo;Office et Windows.<\/p>\n\n\n\n<p><strong>Les donn\u00e9es importantes ne sont pas compromises<\/strong><\/p>\n\n\n\n<p>Les soci\u00e9t\u00e9s de cybers\u00e9curit\u00e9 Under The Breach et <strong><a href=\"https:\/\/www.nightlion.com\/\">Nightlion Security<\/a><\/strong> ont s\u00e9curis\u00e9 des copies des fichiers que les hackers ont divulgu\u00e9s sur le dark web. Les d\u00e9tails comprennent une liste de tous les r\u00e9pertoires et fichiers que les hackers ont vol\u00e9s dans les d\u00e9p\u00f4ts priv\u00e9s GitHub de Microsoft. Les soci\u00e9t\u00e9s de s\u00e9curit\u00e9 ont \u00e9galement re\u00e7u des donn\u00e9es sur certains projets priv\u00e9s de Microsoft.<\/p>\n\n\n\n<p><strong>Les employ\u00e9s de Microsoft ont \u00e9galement confirm\u00e9 la fuite<\/strong><\/p>\n\n\n\n<p>Mary Jo Foley, r\u00e9dactrice chez Microsoft, s&rsquo;est entretenue avec certains des ing\u00e9nieurs de Microsoft, qui souhaitaient rester anonymes, au sujet de la r\u00e9cente violation de donn\u00e9es par des hackers.<\/p>\n\n\n\n<p>Il est maintenant confirm\u00e9 que les r\u00e9pertoires et les fichiers de la liste publi\u00e9e par les hackers contiennent en fait des projets stock\u00e9s en tant que d\u00e9p\u00f4ts priv\u00e9s dans le <strong><a href=\"https:\/\/koddos.net\/blog\/new-malware-stealing-data-through-github-and-slack-platforms\/\">compte GitHub de Microsoft<\/a><\/strong>. Certains employ\u00e9s de Microsoft ont \u00e9galement confirm\u00e9 l&rsquo;authenticit\u00e9 des donn\u00e9es divulgu\u00e9es.<\/p>\n\n\n\n<p>Les ing\u00e9nieurs de Microsoft, qui continuaient de soutenir que la fuite \u00e9tait un canular, sont maintenant revenus sur leurs premiers commentaires lorsque la nouvelle de la fuite s&rsquo;est r\u00e9pandue dans l&rsquo;entreprise.&nbsp; D&rsquo;autres employ\u00e9s qui avaient initialement affirm\u00e9 que la fuite \u00e9tait une arnaque ont depuis effac\u00e9 leurs tweets apr\u00e8s que d&rsquo;autres informations sur la fuite aient \u00e9t\u00e9 diffus\u00e9es.<\/p>\n\n\n\n<p>D&rsquo;autres ont donn\u00e9 une authenticit\u00e9 partielle \u00e0 la fuite parce qu&rsquo;une grande partie des r\u00e9pertoires et des fichiers publi\u00e9s par le hacker n&rsquo;\u00e9tait li\u00e9e \u00e0 aucun projet de Microsoft. Certains d&rsquo;entre eux n&rsquo;ont aucune affiliation avec un projet de Microsoft ou un projet open source actif depuis de nombreuses ann\u00e9es. Mais on ne sait toujours pas comment les hackers ont pu mettre la main sur les d\u00e9p\u00f4ts GitHub.<\/p>\n\n\n\n<p>Les rapports ont \u00e9galement r\u00e9v\u00e9l\u00e9 qu&rsquo;aucun des projets vol\u00e9s par les hackers n&rsquo;est vital ou sensible, m\u00eame de loin. Le compte GitHub de Microsoft est utilis\u00e9 pour h\u00e9berger des projets priv\u00e9s qui sont mis \u00e0 disposition dans le futur sous une licence open source. Ils sont \u00e9galement disponibles pour partager et h\u00e9berger de la documentation et des projets open source.<\/p>\n\n\n\n<p>En outre, certains employ\u00e9s de <strong><a href=\"https:\/\/koddos.net\/blog\/microsoft-says-cybercriminals-are-infecting-streaming-sites-with-malware\/\">Microsoft<\/a><\/strong> ont r\u00e9v\u00e9l\u00e9 que leurs projets priv\u00e9s h\u00e9berg\u00e9s par Microsoft sur le compte GitHub ne faisaient pas partie de la liste que le hacker avait publi\u00e9e pr\u00e9c\u00e9demment. Cela signifie que les hackers n&rsquo;ont pu acc\u00e9der qu&rsquo;\u00e0 une petite partie des donn\u00e9es non sensibles stock\u00e9es dans le compte Microsoft.<\/p>\n\n\n\n<p>&nbsp;Cependant, la seule inqui\u00e9tude concernant le vol de donn\u00e9es sensibles pourrait concerner certains projets contenant des identifiants API et des jetons d&rsquo;acc\u00e8s que Microsoft pourrait maintenant devoir retirer.<\/p>\n\n\n\n<p><strong>La vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e<\/strong><\/p>\n\n\n\n<p>Comme l&rsquo;a rapport\u00e9 la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 Under The Breach, les employ\u00e9s de Microsoft ont peut-\u00eatre d\u00e9couvert le compte GitHub vuln\u00e9rable de l&#8217;employ\u00e9. L&rsquo;entreprise de s\u00e9curit\u00e9 a obtenu des informations de premi\u00e8re main du hacker. Elle a confirm\u00e9 que le hacker n&rsquo;a plus acc\u00e8s aux d\u00e9p\u00f4ts priv\u00e9s GitHub de Microsoft car Microsoft a peut-\u00eatre d\u00e9couvert et corrig\u00e9 la vuln\u00e9rabilit\u00e9.<\/p>\n\n\n\n<p><strong>Le hacker est le m\u00eame que celui qui est \u00e0 l&rsquo;origine de la fuite chez Tokopedia<\/strong><\/p>\n\n\n\n<p>Le hacker responsable de ce dernier piratage est toujours responsable de l&rsquo;<strong><a href=\"https:\/\/www.digitalbullet.in\/news\/15-million-tokopedia-users-have-records-leaked\">incident de piratage de Tokopedia<\/a><\/strong> signal\u00e9 plus t\u00f4t la semaine derni\u00e8re.<\/p>\n\n\n\n<p>Le hacker a pirat\u00e9 les comptes de 15 millions d&rsquo;utilisateurs enregistr\u00e9s sur Tokopedia, le plus grand magasin en ligne d&rsquo;Indon\u00e9sie. Il a d\u00e9cid\u00e9 de les publier sur le dark web.<\/p>\n\n\n\n<p>Le hacker a d\u00e9clar\u00e9 que l&rsquo;incident de piratage s&rsquo;\u00e9tait produit en mars et que le piratage ne contenait qu&rsquo;une petite partie de la base de donn\u00e9es des utilisateurs de la plateforme.<\/p>\n\n\n\n<p>Le hacker a \u00e9galement r\u00e9v\u00e9l\u00e9 qu&rsquo;il partageait les 15 millions d&rsquo;\u00e9chantillons d&rsquo;utilisateurs en esp\u00e9rant que quelqu&rsquo;un puisse d\u00e9chiffrer les <strong><a href=\"https:\/\/koddos.net\/blog\/hackers-attempted-to-steal-passwords-from-who\/\">mots de passe<\/a><\/strong> et les utiliser pour acc\u00e9der aux comptes des utilisateurs. D&rsquo;apr\u00e8s les informations fournies par le hacker, il semble que les comptes des d\u00e9p\u00f4ts priv\u00e9s GitHub de Microsoft et les donn\u00e9es des utilisateurs de Tokopedia aient \u00e9t\u00e9 compromis au cours de la m\u00eame p\u00e9riode.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un petit nombre de comptes GitHub d&#8217;employ\u00e9s de Microsoft ont r\u00e9cemment \u00e9t\u00e9 attaqu\u00e9s, car certains des d\u00e9p\u00f4ts GitHub priv\u00e9s de l&rsquo;entreprise ont \u00e9t\u00e9 pirat\u00e9s. Cependant, le hacker n&rsquo;a pu acc\u00e9der \u00e0 aucune application majeure ni compromettre aucun syst\u00e8me vital. L&rsquo;infiltration a eu lieu en mars et n&rsquo;a \u00e9t\u00e9 connue que cette semaine lorsque le hacker &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">UN HACKER A COMPROMIS LES COMPTES PRIV\u00c9S GITHUB DE MICROSOFT<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2051,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-2050","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UN HACKER A COMPROMIS LES COMPTES PRIV\u00c9S GITHUB DE MICROSOFT - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UN HACKER A COMPROMIS LES COMPTES PRIV\u00c9S GITHUB DE MICROSOFT - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Un petit nombre de comptes GitHub d&#8217;employ\u00e9s de Microsoft ont r\u00e9cemment \u00e9t\u00e9 attaqu\u00e9s, car certains des d\u00e9p\u00f4ts GitHub priv\u00e9s de l&rsquo;entreprise ont \u00e9t\u00e9 pirat\u00e9s. Cependant, le hacker n&rsquo;a pu acc\u00e9der \u00e0 aucune application majeure ni compromettre aucun syst\u00e8me vital. L&rsquo;infiltration a eu lieu en mars et n&rsquo;a \u00e9t\u00e9 connue que cette semaine lorsque le hacker &hellip; Continue reading UN HACKER A COMPROMIS LES COMPTES PRIV\u00c9S GITHUB DE MICROSOFT\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-08T12:03:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-08T12:03:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/99-Domains-Used-by-Hackers-Given-to-Microsoft-by-the-Courts.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"UN HACKER A COMPROMIS LES COMPTES PRIV\u00c9S GITHUB DE MICROSOFT\",\"datePublished\":\"2020-05-08T12:03:27+00:00\",\"dateModified\":\"2020-05-08T12:03:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\\\/\"},\"wordCount\":917,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/99-Domains-Used-by-Hackers-Given-to-Microsoft-by-the-Courts.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\\\/\",\"name\":\"UN HACKER A COMPROMIS LES COMPTES PRIV\u00c9S GITHUB DE MICROSOFT - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/99-Domains-Used-by-Hackers-Given-to-Microsoft-by-the-Courts.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-05-08T12:03:27+00:00\",\"dateModified\":\"2020-05-08T12:03:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/99-Domains-Used-by-Hackers-Given-to-Microsoft-by-the-Courts.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/99-Domains-Used-by-Hackers-Given-to-Microsoft-by-the-Courts.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UN HACKER A COMPROMIS LES COMPTES PRIV\u00c9S GITHUB DE MICROSOFT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UN HACKER A COMPROMIS LES COMPTES PRIV\u00c9S GITHUB DE MICROSOFT - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/","og_locale":"fr_FR","og_type":"article","og_title":"UN HACKER A COMPROMIS LES COMPTES PRIV\u00c9S GITHUB DE MICROSOFT - Blog KoDDoS","og_description":"Un petit nombre de comptes GitHub d&#8217;employ\u00e9s de Microsoft ont r\u00e9cemment \u00e9t\u00e9 attaqu\u00e9s, car certains des d\u00e9p\u00f4ts GitHub priv\u00e9s de l&rsquo;entreprise ont \u00e9t\u00e9 pirat\u00e9s. Cependant, le hacker n&rsquo;a pu acc\u00e9der \u00e0 aucune application majeure ni compromettre aucun syst\u00e8me vital. L&rsquo;infiltration a eu lieu en mars et n&rsquo;a \u00e9t\u00e9 connue que cette semaine lorsque le hacker &hellip; Continue reading UN HACKER A COMPROMIS LES COMPTES PRIV\u00c9S GITHUB DE MICROSOFT","og_url":"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-05-08T12:03:27+00:00","article_modified_time":"2020-05-08T12:03:31+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/99-Domains-Used-by-Hackers-Given-to-Microsoft-by-the-Courts.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"UN HACKER A COMPROMIS LES COMPTES PRIV\u00c9S GITHUB DE MICROSOFT","datePublished":"2020-05-08T12:03:27+00:00","dateModified":"2020-05-08T12:03:31+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/"},"wordCount":917,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/99-Domains-Used-by-Hackers-Given-to-Microsoft-by-the-Courts.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/","url":"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/","name":"UN HACKER A COMPROMIS LES COMPTES PRIV\u00c9S GITHUB DE MICROSOFT - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/99-Domains-Used-by-Hackers-Given-to-Microsoft-by-the-Courts.jpg?fit=825%2C510&ssl=1","datePublished":"2020-05-08T12:03:27+00:00","dateModified":"2020-05-08T12:03:31+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/99-Domains-Used-by-Hackers-Given-to-Microsoft-by-the-Courts.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/99-Domains-Used-by-Hackers-Given-to-Microsoft-by-the-Courts.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-a-compromis-les-comptes-prives-github-de-microsoft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"UN HACKER A COMPROMIS LES COMPTES PRIV\u00c9S GITHUB DE MICROSOFT"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/99-Domains-Used-by-Hackers-Given-to-Microsoft-by-the-Courts.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-x4","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=2050"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2050\/revisions"}],"predecessor-version":[{"id":2052,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2050\/revisions\/2052"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/2051"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=2050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=2050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=2050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}