{"id":2179,"date":"2020-06-12T17:17:17","date_gmt":"2020-06-12T15:17:17","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=2179"},"modified":"2020-06-12T17:17:20","modified_gmt":"2020-06-12T15:17:20","slug":"la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/","title":{"rendered":"LA VULN\u00c9RABILIT\u00c9 D&rsquo;UNE APPLICATION FACEBOOK AURAIT PU CONDUIRE \u00c0 UNE ATTAQUE PERMANENTE"},"content":{"rendered":"\n<p>Les chercheurs en s\u00e9curit\u00e9 de Reason Labs <strong><a href=\"https:\/\/www.reasonsecurity.com\/\">ont r\u00e9v\u00e9l\u00e9<\/a><\/strong> aujourd&rsquo;hui qu&rsquo;ils avaient r\u00e9cemment d\u00e9couvert une vuln\u00e9rabilit\u00e9 dans l&rsquo;application Facebook Messenger pour Windows. L&rsquo;\u00e9quipe de recherche en s\u00e9curit\u00e9 est une division de Reason Cybersecurity, un fournisseur de solutions de s\u00e9curit\u00e9.<\/p>\n\n\n\n<p>Selon les chercheurs, la vuln\u00e9rabilit\u00e9 se trouve dans la version 460.16 de l&rsquo;application Facebook Messenger. Elle pourrait permettre aux hackers d&rsquo;ex\u00e9cuter des fichiers malveillants trouv\u00e9s sur un syst\u00e8me infect\u00e9 afin d&rsquo;aider le <strong><a href=\"https:\/\/koddos.net\/blog\/octopus-scanner-malware-spreads-among-open-source-developers\/\">logiciel malveillant<\/a><\/strong> \u00e0 obtenir un acc\u00e8s \u00e9tendu ou permanent.<\/p>\n\n\n\n<p><strong>La vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e<\/strong><\/p>\n\n\n\n<p>Reason Labs a initialement <strong><a href=\"https:\/\/blog.reasonsecurity.com\/2020\/06\/11\/persistence-method-using-facebook-messenger-desktop-app\/\">r\u00e9v\u00e9l\u00e9<\/a><\/strong> sa d\u00e9couverte \u00e0 Facebook en avril. Imm\u00e9diatement apr\u00e8s avoir re\u00e7u la nouvelle de la faille, le g\u00e9ant des m\u00e9dias sociaux a corrig\u00e9 la vuln\u00e9rabilit\u00e9 et mis \u00e0 jour l&rsquo;application de messagerie vuln\u00e9rable pour les utilisateurs de Windows par le biais de la boutique Microsoft.<\/p>\n\n\n\n<p><strong>Cette faille pourrait permettre aux hackers de prendre le contr\u00f4le total<\/strong><\/p>\n\n\n\n<p>Les chercheurs ont d\u00e9clar\u00e9 que l&rsquo;application d\u00e9fectueuse d\u00e9clenche syst\u00e9matiquement une action pour charger Windows Powershell \u00e0 partir du chemin C:\\python27, qui est g\u00e9n\u00e9ralement publi\u00e9 pendant l&rsquo;installation de la version 2.7 de Python. Les chercheurs ont \u00e9galement d\u00e9clar\u00e9 que ce n&rsquo;est pas courant avec la plupart des installations de Windows.<\/p>\n\n\n\n<p>Les hackers peuvent prendre le contr\u00f4le d&rsquo;une telle action qui a tent\u00e9 de charger des protocoles apparemment inexistants pour lib\u00e9rer secr\u00e8tement des logiciels malveillants. En outre, le programme malveillant peut avoir acc\u00e8s aux privil\u00e8ges administrateur puisque le r\u00e9seau cibl\u00e9 se trouve dans une zone de faible activit\u00e9.<\/p>\n\n\n\n<p>Reason Labs a essay\u00e9 de tester si la faille peut \u00eatre explor\u00e9e. Ils ont mis en place un shell de r\u00e9serve qui a agi comme Powershell.exe et l&rsquo;ont lib\u00e9r\u00e9 dans le r\u00e9pertoire Python.<\/p>\n\n\n\n<p>Ensuite, l&rsquo;\u00e9quipe a lanc\u00e9 l&rsquo;application Messenger, qui a activ\u00e9 l&rsquo;appel, et a ex\u00e9cut\u00e9 le shell inverse avec succ\u00e8s. Cela a prouv\u00e9 que la faille peut \u00eatre exploit\u00e9e pour des attaques continuelles par une <strong><a href=\"https:\/\/koddos.net\/blog\/malicious-apps-tricking-password-managers-into-handing-over-login-data\/\">application malveillante<\/a><\/strong>.<\/p>\n\n\n\n<p>Traditionnellement, les hackers qui utilisent des m\u00e9thodes d&rsquo;attaque persistantes d\u00e9pendent fortement des t\u00e2ches planifi\u00e9es, des cl\u00e9s de registre et des services pour rester actifs au sein du syst\u00e8me affect\u00e9. Cependant, cette faille est connue pour \u00eatre plus difficile \u00e0 exploiter.<\/p>\n\n\n\n<p>C&rsquo;est probablement l&rsquo;une des raisons pour lesquelles elle n&rsquo;a pas encore \u00e9t\u00e9 exploit\u00e9e. Les attaquants auraient constat\u00e9 si l&rsquo;application effectue un appel ascendant. Ils auraient \u00e9galement pu fouiller dans le code binaire de l&rsquo;application pour localiser un protocole qui effectue un tel appel.<\/p>\n\n\n\n<p><strong>Il est conseill\u00e9 aux utilisateurs de mettre \u00e0 jour leur ancienne application&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/strong><\/p>\n\n\n\n<p>La vuln\u00e9rabilit\u00e9 de la version 480.5 a \u00e9t\u00e9 corrig\u00e9e, ce qui s&rsquo;est av\u00e9r\u00e9 \u00eatre la version la plus r\u00e9cente test\u00e9e par les laboratoires Reason. Facebook a d\u00e9j\u00e0 envoy\u00e9 une notification aux utilisateurs utilisant l&rsquo;ancienne version ou la version vuln\u00e9rable de l&rsquo;application pour qu&rsquo;ils la mettent \u00e0 jour d\u00e8s que possible.<\/p>\n\n\n\n<p><strong>Cette vuln\u00e9rabilit\u00e9 peut conduire \u00e0 d&rsquo;autres attaques<\/strong><\/p>\n\n\n\n<p>Les hackers peuvent profiter de cette vuln\u00e9rabilit\u00e9 pour continuer \u00e0 acc\u00e9der \u00e0 des donn\u00e9es \u00e0 partir de l&rsquo;appareil pendant une p\u00e9riode prolong\u00e9e. Ce type d&rsquo;acc\u00e8s continu peut leur permettre de mener d&rsquo;autres <strong><a href=\"https:\/\/koddos.net\/blog\/300-million-people-vulnerable-to-hacking-attacks-due-to-ea-origin-bug\/\">attaques de piratage<\/a><\/strong>, notamment l&rsquo;exfiltration de donn\u00e9es, l&rsquo;implantation de logiciels de ran\u00e7on et d&rsquo;autres violations.<\/p>\n\n\n\n<p>Les groupes de hackers utilisent \u00e9galement des m\u00e9thodes de piratage permanentes pour effectuer des piratages sp\u00e9cialis\u00e9s ciblant les bureaux gouvernementaux, les institutions financi\u00e8res et d&rsquo;autres installations industrielles.<\/p>\n\n\n\n<p><strong>Une attaque aurait pu \u00eatre g\u00e9n\u00e9ralis\u00e9e<\/strong><\/p>\n\n\n\n<p>De plus, si la faille avait \u00e9t\u00e9 exploit\u00e9e, la menace aurait pu toucher plusieurs syst\u00e8mes et appareils, avec <strong><a href=\"https:\/\/www.messengerpeople.com\/global-messenger-usage-statistics\/\">1,3 milliard<\/a><\/strong> d&rsquo;utilisateurs de Facebook Messenger chaque mois. Le chiffre est encore plus car il ne prend en compte que les utilisateurs qui acc\u00e8dent \u00e0 l&rsquo;application avec leurs appareils mobiles. Plusieurs autres acc\u00e8dent \u00e0 l&rsquo;application via leurs syst\u00e8mes Windows.<\/p>\n\n\n\n<p>Les applications de messagerie \u00e9tant de plus en plus utilis\u00e9es pendant la pand\u00e9mie actuelle de Convid-19, l&rsquo;impact pourrait m\u00eame \u00eatre pire. Comme des restrictions de voyage et de travail sont en place dans plusieurs pays, l&rsquo;utilisation des <strong><a href=\"https:\/\/koddos.net\/blog\/fbi-says-zoom-video-conference-vulnerable-to-attacks\/\">applications de vid\u00e9oconf\u00e9rence<\/a><\/strong> et des outils de messagerie a augment\u00e9. Les utilisateurs d\u00e9pendent fortement de ces applications pour communiquer avec leurs amis et coll\u00e8gues qu&rsquo;ils ne peuvent pas visiter physiquement en raison des restrictions.<\/p>\n\n\n\n<p>Facebook Messenger \u00e9tant l&rsquo;une des applications les plus populaires, il pourrait toucher plusieurs utilisateurs si la vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 exploit\u00e9e avec succ\u00e8s. En mars de cette ann\u00e9e, la soci\u00e9t\u00e9 a signal\u00e9 une augmentation de <strong><a href=\"https:\/\/about.fb.com\/news\/2020\/03\/keeping-our-apps-stable-during-covid-19\/\">50 % des messages<\/a><\/strong> et une augmentation de 1000% du temps consacr\u00e9 aux appels de groupe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les chercheurs en s\u00e9curit\u00e9 de Reason Labs ont r\u00e9v\u00e9l\u00e9 aujourd&rsquo;hui qu&rsquo;ils avaient r\u00e9cemment d\u00e9couvert une vuln\u00e9rabilit\u00e9 dans l&rsquo;application Facebook Messenger pour Windows. L&rsquo;\u00e9quipe de recherche en s\u00e9curit\u00e9 est une division de Reason Cybersecurity, un fournisseur de solutions de s\u00e9curit\u00e9. Selon les chercheurs, la vuln\u00e9rabilit\u00e9 se trouve dans la version 460.16 de l&rsquo;application Facebook Messenger. Elle &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LA VULN\u00c9RABILIT\u00c9 D&rsquo;UNE APPLICATION FACEBOOK AURAIT PU CONDUIRE \u00c0 UNE ATTAQUE PERMANENTE<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2180,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-2179","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LA VULN\u00c9RABILIT\u00c9 D&#039;UNE APPLICATION FACEBOOK AURAIT PU CONDUIRE \u00c0 UNE ATTAQUE PERMANENTE - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LA VULN\u00c9RABILIT\u00c9 D&#039;UNE APPLICATION FACEBOOK AURAIT PU CONDUIRE \u00c0 UNE ATTAQUE PERMANENTE - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Les chercheurs en s\u00e9curit\u00e9 de Reason Labs ont r\u00e9v\u00e9l\u00e9 aujourd&rsquo;hui qu&rsquo;ils avaient r\u00e9cemment d\u00e9couvert une vuln\u00e9rabilit\u00e9 dans l&rsquo;application Facebook Messenger pour Windows. L&rsquo;\u00e9quipe de recherche en s\u00e9curit\u00e9 est une division de Reason Cybersecurity, un fournisseur de solutions de s\u00e9curit\u00e9. Selon les chercheurs, la vuln\u00e9rabilit\u00e9 se trouve dans la version 460.16 de l&rsquo;application Facebook Messenger. Elle &hellip; Continue reading LA VULN\u00c9RABILIT\u00c9 D&rsquo;UNE APPLICATION FACEBOOK AURAIT PU CONDUIRE \u00c0 UNE ATTAQUE PERMANENTE\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-12T15:17:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-12T15:17:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/06\/Hackers-Discovered-to-Distribute-Cryptocurrency-Mining-Software-Via-Facebook-Messenger.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LA VULN\u00c9RABILIT\u00c9 D&rsquo;UNE APPLICATION FACEBOOK AURAIT PU CONDUIRE \u00c0 UNE ATTAQUE PERMANENTE\",\"datePublished\":\"2020-06-12T15:17:17+00:00\",\"dateModified\":\"2020-06-12T15:17:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\\\/\"},\"wordCount\":856,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Hackers-Discovered-to-Distribute-Cryptocurrency-Mining-Software-Via-Facebook-Messenger.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\\\/\",\"name\":\"LA VULN\u00c9RABILIT\u00c9 D'UNE APPLICATION FACEBOOK AURAIT PU CONDUIRE \u00c0 UNE ATTAQUE PERMANENTE - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Hackers-Discovered-to-Distribute-Cryptocurrency-Mining-Software-Via-Facebook-Messenger.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-06-12T15:17:17+00:00\",\"dateModified\":\"2020-06-12T15:17:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Hackers-Discovered-to-Distribute-Cryptocurrency-Mining-Software-Via-Facebook-Messenger.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Hackers-Discovered-to-Distribute-Cryptocurrency-Mining-Software-Via-Facebook-Messenger.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LA VULN\u00c9RABILIT\u00c9 D&rsquo;UNE APPLICATION FACEBOOK AURAIT PU CONDUIRE \u00c0 UNE ATTAQUE PERMANENTE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LA VULN\u00c9RABILIT\u00c9 D'UNE APPLICATION FACEBOOK AURAIT PU CONDUIRE \u00c0 UNE ATTAQUE PERMANENTE - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/","og_locale":"fr_FR","og_type":"article","og_title":"LA VULN\u00c9RABILIT\u00c9 D'UNE APPLICATION FACEBOOK AURAIT PU CONDUIRE \u00c0 UNE ATTAQUE PERMANENTE - Blog KoDDoS","og_description":"Les chercheurs en s\u00e9curit\u00e9 de Reason Labs ont r\u00e9v\u00e9l\u00e9 aujourd&rsquo;hui qu&rsquo;ils avaient r\u00e9cemment d\u00e9couvert une vuln\u00e9rabilit\u00e9 dans l&rsquo;application Facebook Messenger pour Windows. L&rsquo;\u00e9quipe de recherche en s\u00e9curit\u00e9 est une division de Reason Cybersecurity, un fournisseur de solutions de s\u00e9curit\u00e9. Selon les chercheurs, la vuln\u00e9rabilit\u00e9 se trouve dans la version 460.16 de l&rsquo;application Facebook Messenger. Elle &hellip; Continue reading LA VULN\u00c9RABILIT\u00c9 D&rsquo;UNE APPLICATION FACEBOOK AURAIT PU CONDUIRE \u00c0 UNE ATTAQUE PERMANENTE","og_url":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-06-12T15:17:17+00:00","article_modified_time":"2020-06-12T15:17:20+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/06\/Hackers-Discovered-to-Distribute-Cryptocurrency-Mining-Software-Via-Facebook-Messenger.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LA VULN\u00c9RABILIT\u00c9 D&rsquo;UNE APPLICATION FACEBOOK AURAIT PU CONDUIRE \u00c0 UNE ATTAQUE PERMANENTE","datePublished":"2020-06-12T15:17:17+00:00","dateModified":"2020-06-12T15:17:20+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/"},"wordCount":856,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/06\/Hackers-Discovered-to-Distribute-Cryptocurrency-Mining-Software-Via-Facebook-Messenger.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/","url":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/","name":"LA VULN\u00c9RABILIT\u00c9 D'UNE APPLICATION FACEBOOK AURAIT PU CONDUIRE \u00c0 UNE ATTAQUE PERMANENTE - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/06\/Hackers-Discovered-to-Distribute-Cryptocurrency-Mining-Software-Via-Facebook-Messenger.jpg?fit=825%2C510&ssl=1","datePublished":"2020-06-12T15:17:17+00:00","dateModified":"2020-06-12T15:17:20+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/06\/Hackers-Discovered-to-Distribute-Cryptocurrency-Mining-Software-Via-Facebook-Messenger.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/06\/Hackers-Discovered-to-Distribute-Cryptocurrency-Mining-Software-Via-Facebook-Messenger.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-dune-application-facebook-aurait-pu-conduire-a-une-attaque-permanente\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LA VULN\u00c9RABILIT\u00c9 D&rsquo;UNE APPLICATION FACEBOOK AURAIT PU CONDUIRE \u00c0 UNE ATTAQUE PERMANENTE"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/06\/Hackers-Discovered-to-Distribute-Cryptocurrency-Mining-Software-Via-Facebook-Messenger.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-z9","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=2179"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2179\/revisions"}],"predecessor-version":[{"id":2181,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2179\/revisions\/2181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/2180"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=2179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=2179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=2179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}