{"id":2114,"date":"2020-05-25T10:15:00","date_gmt":"2020-05-25T08:15:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=2114"},"modified":"2020-05-27T10:20:30","modified_gmt":"2020-05-27T08:20:30","slug":"un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/","title":{"rendered":"UN HACKER TENTE DE VENDRE DES DONN\u00c9ES PROVENANT DE PORTEFEUILLES DE DEVISES CRYPTOGRAPHIQUES IMPORTANTES"},"content":{"rendered":"\n<p>Under the Breach, une plateforme de surveillance en ligne <strong><a href=\"https:\/\/www.bitcoininsider.org\/article\/87638\/hacker-attempts-sell-data-allegedly-tied-ledger-trezor-bnktothefuture-customers\">a signal\u00e9<\/a><\/strong> qu&rsquo;un hacker essayait s\u00e9rieusement de vendre les coordonn\u00e9es de clients de soci\u00e9t\u00e9s comme la plateforme d&rsquo;investissement Bnktothefuture, et d&rsquo;autres portefeuilles crypt\u00e9s comme Ledger, Trezor, ainsi que Keepkey.<\/p>\n\n\n\n<p>Cependant, il semble que le hacker n&rsquo;ait pas de mots de passe pour les comptes mais qu&rsquo;il vende des informations d\u00e9taill\u00e9es sur les comptes des utilisateurs, notamment des num\u00e9ros de t\u00e9l\u00e9phone, des adresses r\u00e9sidentielles et des adresses \u00e9lectroniques.<\/p>\n\n\n\n<p>Dans le cadre de la violation, il a \u00e9t\u00e9 d\u00e9clar\u00e9 que les clients qui ach\u00e8tent des produits \u00e0 des entreprises comme Keeper, Trezor et Ledger en utilisant Shopify pourraient \u00eatre victimes de ce dernier piratage.<\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/twitter.com\/underthebreach\/status\/1264460979322138628?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1264460979322138628%7Ctwgr%5E&#038;ref_url=https%3A%2F%2Fkoddos.net%2Fblog%2Fhacker-attempts-to-sell-data-tied-to-key-cryptocurrency-wallets%2F\n<\/div><\/figure>\n\n\n\n<p>Le hacker responsable de cette violation est le m\u00eame que celui qui a compromis le forum Ethereum.org. Le hacker affirme \u00e9galement qu&rsquo;il a en sa possession une \u00e9norme base de donn\u00e9es de clients.<\/p>\n\n\n\n<p>D&rsquo;apr\u00e8s les recherches men\u00e9es par Under the Breach, le hacker dispose de trois grandes bases de donn\u00e9es contenant des <strong><a href=\"https:\/\/koddos.net\/blog\/23-million-accounts-of-webkinz-children-gamers-leaked-in-hacking-forum\/\">donn\u00e9es clients ayant fait l&rsquo;objet d&rsquo;une fuite<\/a><\/strong>, comptant environ 80 000. Les donn\u00e9es comprennent l&rsquo;adresse du client, son num\u00e9ro de t\u00e9l\u00e9phone, son nom, ses adresses email et d&rsquo;autres informations. Under the Breach a \u00e9galement confirm\u00e9 qu&rsquo;aucun mot de passe ne figurait dans les donn\u00e9es.<\/p>\n\n\n\n<p><strong>Le rapport est une rumeur, selon Ledger<\/strong><\/p>\n\n\n\n<p>La base de donn\u00e9es de Shopify \u00e9tait cens\u00e9e provenir de Keepkey, Trezor et Ledger. Mais hier, Ledger s&rsquo;est pench\u00e9 sur la situation et a d\u00e9clar\u00e9 que les informations sur certaines infractions provenant de son entreprise n&rsquo;\u00e9taient qu&rsquo;une \u00ab\u00a0rumeur\u00a0\u00bb.<\/p>\n\n\n\n<p>Selon Ledger, les rumeurs pr\u00e9tendent que notre base de donn\u00e9es Shopify a \u00e9t\u00e9 pirat\u00e9e par un exploit de Shopify. La soci\u00e9t\u00e9 a \u00e9galement d\u00e9clar\u00e9 que son \u00e9quipe de commerce \u00e9lectronique examine actuellement les all\u00e9gations.<\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Rumors pretend our Shopify database has been hacked through a Shopify exploit. Our ecommerce team is currently checking these allegations by analyzing the so-called hacked db, and so far it doesn\u2019t match our real db. We continue investigations and are taking the matter seriously.<\/p>&mdash; Ledger (@Ledger) <a href=\"https:\/\/twitter.com\/Ledger\/status\/1264506360735174657?ref_src=twsrc%5Etfw\">May 24, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>L&rsquo;\u00e9quipe a d\u00e9clar\u00e9 qu&rsquo;elle avait analys\u00e9 la base de donn\u00e9es dite pirat\u00e9e et que jusqu&rsquo;\u00e0 pr\u00e9sent, elle ne correspondait pas \u00e0 la base de donn\u00e9es r\u00e9elle de l&rsquo;entreprise. Ledger a \u00e9galement d\u00e9clar\u00e9 qu&rsquo;il prend l&rsquo;affaire tr\u00e8s au s\u00e9rieux et qu&rsquo;il continuera \u00e0 enqu\u00eater sur l&rsquo;all\u00e9gation.<\/p>\n\n\n\n<p>Trezor Hardware a \u00e9galement r\u00e9fut\u00e9 les affirmations selon lesquelles l&rsquo;<strong><a href=\"https:\/\/koddos.net\/blog\/under-armour-reveals-hacking-incident-that-affected-150-million-of-its-users\/\">incident de piratage<\/a><\/strong> incluait des d\u00e9tails de ses clients. Depuis le compte Twitter officiel de Trevor, la soci\u00e9t\u00e9 a d\u00e9clar\u00e9 \u00eatre au courant de certaines rumeurs concernant le piratage de sa base de donn\u00e9es de eShop via un exploit Shopify. L&rsquo;entreprise a d\u00e9clar\u00e9 que ces affirmations \u00e9taient fausses car sa boutique en ligne n&rsquo;utilise pas Shopify.<\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">There are rumors spreading that our eshop database has been hacked thru a Shopify exploit. Our eshop does not use Shopify, but we are nonetheless investigating the situation. We&#39;ve been also routinely purging old customer records from the database to minimize the possible impact.<\/p>&mdash; Trezor (@Trezor) <a href=\"https:\/\/twitter.com\/Trezor\/status\/1264547574377218048?ref_src=twsrc%5Etfw\">May 24, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>Toutefois, elle a commenc\u00e9 \u00e0 enqu\u00eater sur ces all\u00e9gations. Et pour renforcer la s\u00e9curit\u00e9, l&rsquo;entreprise affirme qu&rsquo;elle retire de sa base de donn\u00e9es les anciens enregistrements des clients. Cela est n\u00e9cessaire, selon l&rsquo;entreprise, pour pr\u00e9venir ou r\u00e9duire toute attaque imminente.<\/p>\n\n\n\n<p>Cependant, Keepkey, qui \u00e9tait \u00e9galement mentionn\u00e9 dans la violation, n&rsquo;a pas r\u00e9pondu aux affirmations du hacker, bien que des donn\u00e9es puissent \u00eatre disponibles sur son site web ou sur sa page Twitter tr\u00e8s prochainement.<\/p>\n\n\n\n<p><strong>Shopify r\u00e9fute les all\u00e9gations de violation de donn\u00e9es<\/strong><\/p>\n\n\n\n<p>Les informations dont dispose Under the Breach indiquent qu&rsquo;aucun mot de passe n&rsquo;a \u00e9t\u00e9 impliqu\u00e9 dans la violation. Il a \u00e9galement \u00e9t\u00e9 rapport\u00e9 que le hacker a \u00e9galement compromis la <strong><a href=\"https:\/\/koddos.net\/blog\/hackers-are-deploying-backdoors-on-microsoft-sql-servers\/\">base de donn\u00e9es SQL<\/a><\/strong> de Bnktothefuture et a vol\u00e9 des informations d&rsquo;identit\u00e9 sur la plateforme d&rsquo;investissement.<\/p>\n\n\n\n<p>Lorsqu&rsquo;un repr\u00e9sentant de Shopify a \u00e9t\u00e9 contact\u00e9 au sujet de l&rsquo;incident de piratage, il a cat\u00e9goriquement rejet\u00e9 la demande et a d\u00e9clar\u00e9 qu&rsquo;il n&rsquo;y avait pas de br\u00e8che dans le syst\u00e8me de Shopify. Le repr\u00e9sentant a d\u00e9clar\u00e9 que Shopify avait men\u00e9 une enqu\u00eate rigoureuse sur les demandes d&rsquo;indemnisation et qu&rsquo;il n&rsquo;y avait aucune preuve que la soci\u00e9t\u00e9 \u00e9tait compromise. Shopify a d\u00e9clar\u00e9 que ses syst\u00e8mes et ses serveurs sont intacts et qu&rsquo;il n&rsquo;y a pas eu de violation comme le pr\u00e9tend le hacker.<\/p>\n\n\n\n<p><strong>Un hacker pr\u00e9tend avoir une base de donn\u00e9es de plus de 20 \u00e9changes de cryptomonnaies<\/strong><\/p>\n\n\n\n<p>Le hacker a plusieurs revendications douteuses avec des bases de donn\u00e9es de plus de 20 plateformes d&rsquo;\u00e9changes de devises cryptographiques dans le monde. Il s&rsquo;agit de d\u00e9clarations faites par le hacker, mais personne n&rsquo;a \u00e9t\u00e9 en mesure de confirmer leur authenticit\u00e9. Par cons\u00e9quent, cela semble n&rsquo;\u00eatre que de simples rumeurs car personne ne peut v\u00e9rifier si le hacker poss\u00e8de r\u00e9ellement les bases de donn\u00e9es.<\/p>\n\n\n\n<p>Le hacker a \u00e9galement annonc\u00e9 qu&rsquo;il avait compromis et vol\u00e9 des donn\u00e9es \u00e0 deux soci\u00e9t\u00e9s de taxation de devises num\u00e9riques et qu&rsquo;il pr\u00e9voyait de vendre les donn\u00e9es sur le darknet.<\/p>\n\n\n\n<p>En plus des listes d&rsquo;adresses \u00e9lectroniques de deux plateformes de devises cryptographiques cit\u00e9es, le hacker fait \u00e9galement la publicit\u00e9 des bases de donn\u00e9es de 18 bourses et forums de devises virtuels. Comme les donn\u00e9es pr\u00e9sum\u00e9es vol\u00e9es ne contiennent pas de mots de passe, il pourrait \u00eatre difficile de prouver que les affirmations du hacker sont authentiques.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Under the Breach, une plateforme de surveillance en ligne a signal\u00e9 qu&rsquo;un hacker essayait s\u00e9rieusement de vendre les coordonn\u00e9es de clients de soci\u00e9t\u00e9s comme la plateforme d&rsquo;investissement Bnktothefuture, et d&rsquo;autres portefeuilles crypt\u00e9s comme Ledger, Trezor, ainsi que Keepkey. Cependant, il semble que le hacker n&rsquo;ait pas de mots de passe pour les comptes mais qu&rsquo;il &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">UN HACKER TENTE DE VENDRE DES DONN\u00c9ES PROVENANT DE PORTEFEUILLES DE DEVISES CRYPTOGRAPHIQUES IMPORTANTES<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2118,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-2114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UN HACKER TENTE DE VENDRE DES DONN\u00c9ES PROVENANT DE PORTEFEUILLES DE DEVISES CRYPTOGRAPHIQUES IMPORTANTES - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UN HACKER TENTE DE VENDRE DES DONN\u00c9ES PROVENANT DE PORTEFEUILLES DE DEVISES CRYPTOGRAPHIQUES IMPORTANTES - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Under the Breach, une plateforme de surveillance en ligne a signal\u00e9 qu&rsquo;un hacker essayait s\u00e9rieusement de vendre les coordonn\u00e9es de clients de soci\u00e9t\u00e9s comme la plateforme d&rsquo;investissement Bnktothefuture, et d&rsquo;autres portefeuilles crypt\u00e9s comme Ledger, Trezor, ainsi que Keepkey. Cependant, il semble que le hacker n&rsquo;ait pas de mots de passe pour les comptes mais qu&rsquo;il &hellip; Continue reading UN HACKER TENTE DE VENDRE DES DONN\u00c9ES PROVENANT DE PORTEFEUILLES DE DEVISES CRYPTOGRAPHIQUES IMPORTANTES\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-25T08:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-27T08:20:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/Hacker-Attempts-to-Sell-Data-Tied-to-Key-Cryptocurrency-Wallets.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"UN HACKER TENTE DE VENDRE DES DONN\u00c9ES PROVENANT DE PORTEFEUILLES DE DEVISES CRYPTOGRAPHIQUES IMPORTANTES\",\"datePublished\":\"2020-05-25T08:15:00+00:00\",\"dateModified\":\"2020-05-27T08:20:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\\\/\"},\"wordCount\":1002,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Hacker-Attempts-to-Sell-Data-Tied-to-Key-Cryptocurrency-Wallets.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\\\/\",\"name\":\"UN HACKER TENTE DE VENDRE DES DONN\u00c9ES PROVENANT DE PORTEFEUILLES DE DEVISES CRYPTOGRAPHIQUES IMPORTANTES - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Hacker-Attempts-to-Sell-Data-Tied-to-Key-Cryptocurrency-Wallets.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-05-25T08:15:00+00:00\",\"dateModified\":\"2020-05-27T08:20:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Hacker-Attempts-to-Sell-Data-Tied-to-Key-Cryptocurrency-Wallets.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Hacker-Attempts-to-Sell-Data-Tied-to-Key-Cryptocurrency-Wallets.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UN HACKER TENTE DE VENDRE DES DONN\u00c9ES PROVENANT DE PORTEFEUILLES DE DEVISES CRYPTOGRAPHIQUES IMPORTANTES\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UN HACKER TENTE DE VENDRE DES DONN\u00c9ES PROVENANT DE PORTEFEUILLES DE DEVISES CRYPTOGRAPHIQUES IMPORTANTES - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/","og_locale":"fr_FR","og_type":"article","og_title":"UN HACKER TENTE DE VENDRE DES DONN\u00c9ES PROVENANT DE PORTEFEUILLES DE DEVISES CRYPTOGRAPHIQUES IMPORTANTES - Blog KoDDoS","og_description":"Under the Breach, une plateforme de surveillance en ligne a signal\u00e9 qu&rsquo;un hacker essayait s\u00e9rieusement de vendre les coordonn\u00e9es de clients de soci\u00e9t\u00e9s comme la plateforme d&rsquo;investissement Bnktothefuture, et d&rsquo;autres portefeuilles crypt\u00e9s comme Ledger, Trezor, ainsi que Keepkey. Cependant, il semble que le hacker n&rsquo;ait pas de mots de passe pour les comptes mais qu&rsquo;il &hellip; Continue reading UN HACKER TENTE DE VENDRE DES DONN\u00c9ES PROVENANT DE PORTEFEUILLES DE DEVISES CRYPTOGRAPHIQUES IMPORTANTES","og_url":"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-05-25T08:15:00+00:00","article_modified_time":"2020-05-27T08:20:30+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/Hacker-Attempts-to-Sell-Data-Tied-to-Key-Cryptocurrency-Wallets.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"UN HACKER TENTE DE VENDRE DES DONN\u00c9ES PROVENANT DE PORTEFEUILLES DE DEVISES CRYPTOGRAPHIQUES IMPORTANTES","datePublished":"2020-05-25T08:15:00+00:00","dateModified":"2020-05-27T08:20:30+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/"},"wordCount":1002,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/Hacker-Attempts-to-Sell-Data-Tied-to-Key-Cryptocurrency-Wallets.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/","url":"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/","name":"UN HACKER TENTE DE VENDRE DES DONN\u00c9ES PROVENANT DE PORTEFEUILLES DE DEVISES CRYPTOGRAPHIQUES IMPORTANTES - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/Hacker-Attempts-to-Sell-Data-Tied-to-Key-Cryptocurrency-Wallets.jpg?fit=825%2C510&ssl=1","datePublished":"2020-05-25T08:15:00+00:00","dateModified":"2020-05-27T08:20:30+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/Hacker-Attempts-to-Sell-Data-Tied-to-Key-Cryptocurrency-Wallets.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/Hacker-Attempts-to-Sell-Data-Tied-to-Key-Cryptocurrency-Wallets.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/un-hacker-tente-de-vendre-des-donnees-provenant-de-portefeuilles-de-devises-cryptographiques-importantes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"UN HACKER TENTE DE VENDRE DES DONN\u00c9ES PROVENANT DE PORTEFEUILLES DE DEVISES CRYPTOGRAPHIQUES IMPORTANTES"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/Hacker-Attempts-to-Sell-Data-Tied-to-Key-Cryptocurrency-Wallets.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-y6","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=2114"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2114\/revisions"}],"predecessor-version":[{"id":2119,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2114\/revisions\/2119"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/2118"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=2114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=2114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=2114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}