{"id":2120,"date":"2020-05-26T10:41:00","date_gmt":"2020-05-26T08:41:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=2120"},"modified":"2020-05-27T10:44:27","modified_gmt":"2020-05-27T08:44:27","slug":"les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/","title":{"rendered":"LES HACKERS DE BLUE MOCKINGBIRD PIRATENT DES MILLIERS DE SYST\u00c8MES D&rsquo;ENTREPRISE"},"content":{"rendered":"\n<p>Les hackers s&rsquo;infiltrent dans les syst\u00e8mes des entreprises en exploitant une vuln\u00e9rabilit\u00e9 dangereuse et difficile \u00e0 corriger. Un rapport r\u00e9cent a r\u00e9v\u00e9l\u00e9 que les hackers ont pirat\u00e9 et expos\u00e9 des milliers de ces syst\u00e8mes d&rsquo;entreprise qui sont infect\u00e9s par des <strong><a href=\"https:\/\/koddos.net\/blog\/new-way-for-malware-and-cryptominers-to-hack-your-pc-wav-files\/\">logiciels malveillants cryptographiques<\/a><\/strong>.<\/p>\n\n\n\n<p>Le rapport indique qu&rsquo;un groupe de hackers connu sous le nom de Blue Mockingbird est responsable de l&rsquo;attaque.<\/p>\n\n\n\n<p>L&rsquo;incident de piratage a \u00e9t\u00e9 d\u00e9couvert ce mois-ci par Red Canary, une soci\u00e9t\u00e9 de s\u00e9curit\u00e9 cloud. Cependant, on pense que le <strong><a href=\"https:\/\/koddos.net\/blog\/researchers-caught-chinese-hacking-syndicate-bypassing-2fa\/\">groupe de hackers<\/a><\/strong> est op\u00e9rationnel depuis d\u00e9cembre de l&rsquo;ann\u00e9e derni\u00e8re.<\/p>\n\n\n\n<p>Selon les chercheurs de l&rsquo;entreprise de s\u00e9curit\u00e9, Blue Mockingbird a infiltr\u00e9 des serveurs publics qui ex\u00e9cutent des applications ASP.NET. Ces applications utilisent le protocole Telerik pour leur interface utilisateur.<\/p>\n\n\n\n<p><strong>Le groupe de hackers a install\u00e9 un shell web sur les serveurs<\/strong><\/p>\n\n\n\n<p>Le groupe de hackers a profit\u00e9 de la <strong><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-18935\">vuln\u00e9rabilit\u00e9 CVE-2019-18935<\/a><\/strong>&nbsp; et a install\u00e9 un shell web sur le serveur de la victime. Apr\u00e8s avoir implant\u00e9 le shell web, ils ont utilis\u00e9 la <strong><a href=\"https:\/\/ohpe.it\/juicy-potato\/\">m\u00e9thode de piratage \u00ab\u00a0juicy potato\u00a0\u00bb<\/a><\/strong> pour acc\u00e9der au niveau administrateur, modifier les param\u00e8tres du serveur et obtenir une pr\u00e9sence au red\u00e9marrage.<\/p>\n\n\n\n<p>Apr\u00e8s avoir obtenu l&rsquo;acc\u00e8s complet au syst\u00e8me, ils ont t\u00e9l\u00e9charg\u00e9 et install\u00e9 une version de XMRRig, une application de crypto-mining bien connue pour la cryptoconnaissance du Monero.<\/p>\n\n\n\n<p>Les chercheurs de Red Canary ont d\u00e9clar\u00e9 que le syndicat de piratage a \u00e9galement essay\u00e9 de se propager en interne par le biais du Server Message Block (SMB) ou du Remote Desktop Protocol (RDP). Ils ont d\u00e9clar\u00e9 que cela \u00e9tait possible lorsque les serveurs IIS destin\u00e9s au public sont connect\u00e9s au r\u00e9seau interne de l&rsquo;entreprise.<\/p>\n\n\n\n<p>Les chercheurs ont \u00e9galement admis qu&rsquo;ils ne connaissaient pas les m\u00e9thodes op\u00e9rationnelles compl\u00e8tes des hackers, mais ils pensent que le botnet commandit\u00e9 par les <strong><a href=\"https:\/\/koddos.net\/blog\/hackers-stole-10-million-from-norfund-via-email-compromise-fraud\/\">hackers<\/a><\/strong> a infect\u00e9 environ 1000 syst\u00e8mes uniquement \u00e0 cause de la visibilit\u00e9 restreinte dont ils disposaient.<\/p>\n\n\n\n<p><strong>Le nombre d&rsquo;entreprises infect\u00e9es pourrait \u00eatre plus \u00e9lev\u00e9<\/strong><\/p>\n\n\n\n<p>Red Canary a d\u00e9clar\u00e9 ne pas disposer d&rsquo;informations compl\u00e8tes sur le niveau de menace que repr\u00e9sente le logiciel malveillant Blue Mockingbird, comme toute autre entreprise de s\u00e9curit\u00e9.<\/p>\n\n\n\n<p>Mais la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 a d\u00e9clar\u00e9 que la menace a affect\u00e9 certaines des organisations qu&rsquo;elle surveille.<\/p>\n\n\n\n<p>\u00ab\u00a0Cette menace a affect\u00e9 un tr\u00e8s faible pourcentage des organisations dont nous surveillons les terminaux\u00a0\u00bb, a rappel\u00e9 un porte-parole de l&rsquo;entreprise de s\u00e9curit\u00e9.<\/p>\n\n\n\n<p>De plus, la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 a not\u00e9 qu&rsquo;en dehors des 1000 cas qu&rsquo;elle a confirm\u00e9s, le nombre pourrait \u00eatre plus \u00e9lev\u00e9, compte tenu des connaissances limit\u00e9es qu&rsquo;elle a sur le niveau des op\u00e9rations du groupe.<\/p>\n\n\n\n<p>De nombreux d\u00e9veloppeurs et entreprises ne savent peut-\u00eatre pas que le module d&rsquo;interface utilisateur de Telerik fait partie de leur application. Par cons\u00e9quent, il les expose davantage aux attaques. Les attaquants ont profit\u00e9 de cette vuln\u00e9rabilit\u00e9 pour exploiter des milliers de syst\u00e8mes apr\u00e8s que les d\u00e9tails de la vuln\u00e9rabilit\u00e9 aient \u00e9t\u00e9 connus du public.<\/p>\n\n\n\n<p><strong>Cette vuln\u00e9rabilit\u00e9 est l&rsquo;une des plus fr\u00e9quentes aux \u00c9tats-Unis et en Australie<\/strong><\/p>\n\n\n\n<p>Dans une note consultative publi\u00e9e le mois dernier, l&rsquo;Agence de s\u00e9curit\u00e9 nationale (NSA) des \u00c9tats-Unis a soulign\u00e9 les dangers que repr\u00e9sente la vuln\u00e9rabilit\u00e9 CVE-2019-18935 de Telerik UI. L&rsquo;agence l&rsquo;a list\u00e9e comme l&rsquo;une des <strong><a href=\"https:\/\/koddos.net\/blog\/fbi-warns-on-the-internet-vulnerabilities-of-smart-tvs\/\">vuln\u00e9rabilit\u00e9s<\/a><\/strong> les plus exploit\u00e9es pour compromettre les shells des serveurs.<\/p>\n\n\n\n<p>Dans une <strong><a href=\"https:\/\/www.cyber.gov.au\/threats\/summary-of-tradecraft-trends-for-2019-20-tactics-techniques-and-procedures-used-to-target-australian-networks\">publication<\/a><\/strong> similaire de l&rsquo;Australian Cyber Security Center (ACSC), la semaine derni\u00e8re, il a \u00e9galement mentionn\u00e9 la vuln\u00e9rabilit\u00e9 de Telerik comme une vuln\u00e9rabilit\u00e9 exploit\u00e9e tr\u00e8s courante qui attaque les entreprises australiennes depuis l&rsquo;ann\u00e9e derni\u00e8re.<\/p>\n\n\n\n<p>Afin d&#8217;emp\u00eacher les hackers de profiter de la vuln\u00e9rabilit\u00e9 pour infecter les serveurs, les entreprises ont \u00e9t\u00e9 averties qu&rsquo;elles devaient corriger leurs applications vuln\u00e9rables. Elles doivent emp\u00eacher ou arr\u00eater l&rsquo;exploitation de la vuln\u00e9rabilit\u00e9 au niveau du pare-feu.<\/p>\n\n\n\n<p>Dans les cas o\u00f9 les organisations ne disposent pas d&rsquo;un pare-feu web, elles doivent rechercher des indices de violation au niveau du poste de travail ou du serveur.<\/p>\n\n\n\n<p><strong>Les entreprises doivent scanner leurs syst\u00e8mes r\u00e9guli\u00e8rement<\/strong><\/p>\n\n\n\n<p>Red Canary a r\u00e9cemment <strong><a href=\"https:\/\/redcanary.com\/blog\/blue-mockingbird-cryptominer\/\">publi\u00e9 un avis<\/a><\/strong> \u00e0 l&rsquo;intention des entreprises pour les aider \u00e0 prot\u00e9ger leurs serveurs contre ce type de vuln\u00e9rabilit\u00e9. La soci\u00e9t\u00e9 de s\u00e9curit\u00e9 a donn\u00e9 des indicateurs de violations que les organisations peuvent examiner. Ils peuvent scanner les syst\u00e8mes et les serveurs avec l&rsquo;indicateur pour d\u00e9couvrir rapidement une attaque de Blue Mockingbird et obtenir imm\u00e9diatement des correctifs.<\/p>\n\n\n\n<p>Red Canary a r\u00e9it\u00e9r\u00e9 que sa priorit\u00e9 est de toujours aider les individus et les organisations \u00e0 se prot\u00e9ger contre les diff\u00e9rents moyens de cyber-attaque, m\u00eame en cas de vuln\u00e9rabilit\u00e9s. Par cons\u00e9quent, le rapport consultatif doit permettre aux \u00e9quipes de s\u00e9curit\u00e9 d&rsquo;appliquer des strat\u00e9gies de d\u00e9tection des m\u00e9thodes de menace qui peuvent \u00eatre utilis\u00e9es contre elles.<\/p>\n\n\n\n<p>Il est donc indispensable pour la s\u00e9curit\u00e9 d&rsquo;\u00e9valuer en permanence la propension des attaques, avec la possibilit\u00e9 de d\u00e9tecter celles qui sont li\u00e9es et qui tirent parti des vuln\u00e9rabilit\u00e9s, a d\u00e9clar\u00e9 le cabinet de recherche.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les hackers s&rsquo;infiltrent dans les syst\u00e8mes des entreprises en exploitant une vuln\u00e9rabilit\u00e9 dangereuse et difficile \u00e0 corriger. Un rapport r\u00e9cent a r\u00e9v\u00e9l\u00e9 que les hackers ont pirat\u00e9 et expos\u00e9 des milliers de ces syst\u00e8mes d&rsquo;entreprise qui sont infect\u00e9s par des logiciels malveillants cryptographiques. Le rapport indique qu&rsquo;un groupe de hackers connu sous le nom de &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LES HACKERS DE BLUE MOCKINGBIRD PIRATENT DES MILLIERS DE SYST\u00c8MES D&rsquo;ENTREPRISE<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2121,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-2120","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LES HACKERS DE BLUE MOCKINGBIRD PIRATENT DES MILLIERS DE SYST\u00c8MES D&#039;ENTREPRISE - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LES HACKERS DE BLUE MOCKINGBIRD PIRATENT DES MILLIERS DE SYST\u00c8MES D&#039;ENTREPRISE - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Les hackers s&rsquo;infiltrent dans les syst\u00e8mes des entreprises en exploitant une vuln\u00e9rabilit\u00e9 dangereuse et difficile \u00e0 corriger. Un rapport r\u00e9cent a r\u00e9v\u00e9l\u00e9 que les hackers ont pirat\u00e9 et expos\u00e9 des milliers de ces syst\u00e8mes d&rsquo;entreprise qui sont infect\u00e9s par des logiciels malveillants cryptographiques. Le rapport indique qu&rsquo;un groupe de hackers connu sous le nom de &hellip; Continue reading LES HACKERS DE BLUE MOCKINGBIRD PIRATENT DES MILLIERS DE SYST\u00c8MES D&rsquo;ENTREPRISE\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-26T08:41:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-27T08:44:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LES HACKERS DE BLUE MOCKINGBIRD PIRATENT DES MILLIERS DE SYST\u00c8MES D&rsquo;ENTREPRISE\",\"datePublished\":\"2020-05-26T08:41:00+00:00\",\"dateModified\":\"2020-05-27T08:44:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\\\/\"},\"wordCount\":943,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\\\/\",\"name\":\"LES HACKERS DE BLUE MOCKINGBIRD PIRATENT DES MILLIERS DE SYST\u00c8MES D'ENTREPRISE - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-05-26T08:41:00+00:00\",\"dateModified\":\"2020-05-27T08:44:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LES HACKERS DE BLUE MOCKINGBIRD PIRATENT DES MILLIERS DE SYST\u00c8MES D&rsquo;ENTREPRISE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LES HACKERS DE BLUE MOCKINGBIRD PIRATENT DES MILLIERS DE SYST\u00c8MES D'ENTREPRISE - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/","og_locale":"fr_FR","og_type":"article","og_title":"LES HACKERS DE BLUE MOCKINGBIRD PIRATENT DES MILLIERS DE SYST\u00c8MES D'ENTREPRISE - Blog KoDDoS","og_description":"Les hackers s&rsquo;infiltrent dans les syst\u00e8mes des entreprises en exploitant une vuln\u00e9rabilit\u00e9 dangereuse et difficile \u00e0 corriger. Un rapport r\u00e9cent a r\u00e9v\u00e9l\u00e9 que les hackers ont pirat\u00e9 et expos\u00e9 des milliers de ces syst\u00e8mes d&rsquo;entreprise qui sont infect\u00e9s par des logiciels malveillants cryptographiques. Le rapport indique qu&rsquo;un groupe de hackers connu sous le nom de &hellip; Continue reading LES HACKERS DE BLUE MOCKINGBIRD PIRATENT DES MILLIERS DE SYST\u00c8MES D&rsquo;ENTREPRISE","og_url":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-05-26T08:41:00+00:00","article_modified_time":"2020-05-27T08:44:27+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LES HACKERS DE BLUE MOCKINGBIRD PIRATENT DES MILLIERS DE SYST\u00c8MES D&rsquo;ENTREPRISE","datePublished":"2020-05-26T08:41:00+00:00","dateModified":"2020-05-27T08:44:27+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/"},"wordCount":943,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/","url":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/","name":"LES HACKERS DE BLUE MOCKINGBIRD PIRATENT DES MILLIERS DE SYST\u00c8MES D'ENTREPRISE - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1","datePublished":"2020-05-26T08:41:00+00:00","dateModified":"2020-05-27T08:44:27+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-blue-mockingbird-piratent-des-milliers-de-systemes-dentreprise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LES HACKERS DE BLUE MOCKINGBIRD PIRATENT DES MILLIERS DE SYST\u00c8MES D&rsquo;ENTREPRISE"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/Hackers-Can-Detect-Passwords-From-the-Sound-of-Your-Keystrokes.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-yc","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=2120"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2120\/revisions"}],"predecessor-version":[{"id":2122,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2120\/revisions\/2122"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/2121"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=2120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=2120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=2120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}