{"id":2372,"date":"2020-07-31T14:44:00","date_gmt":"2020-07-31T12:44:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=2372"},"modified":"2020-08-01T14:49:36","modified_gmt":"2020-08-01T12:49:36","slug":"les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/","title":{"rendered":"LES HACKERS DE TWITTER ONT UTILIS\u00c9 LE SPEAR PHISHING PAR T\u00c9L\u00c9PHONE DANS UN PIRATAGE DE MASSE"},"content":{"rendered":"\n<p>Twitter a fait la une des journaux en raison de la violation de son syst\u00e8me. Au fur et \u00e0 mesure que les informations sur le piratage sont publi\u00e9es, il a \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9 qu&rsquo;un certain nombre d&#8217;employ\u00e9s avaient \u00e9t\u00e9 explicitement vis\u00e9s par des attaques de type spear phishing par t\u00e9l\u00e9phone.<\/p>\n\n\n\n<p>C&rsquo;est ce qu&rsquo;a annonc\u00e9 jeudi le g\u00e9ant des m\u00e9dias sociaux. Apr\u00e8s que les hackers aient \u00e9chou\u00e9 \u00e0 acc\u00e9der aux outils d&rsquo;assistance aux comptes gr\u00e2ce aux informations d&rsquo;identification des employ\u00e9s qu&rsquo;ils avaient vol\u00e9es, ils ont r\u00e9essay\u00e9, en ciblant d&rsquo;autres employ\u00e9s. Par chance, ces employ\u00e9s ont eu l&rsquo;acc\u00e8s n\u00e9cessaire aux outils qu&rsquo;ils voulaient.<\/p>\n\n\n\n<p><strong>Les informations sont d\u00e9voil\u00e9es petit \u00e0 petit<\/strong><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/blog.twitter.com\/en_us\/topics\/company\/2020\/an-update-on-our-security-incident.html\">Dans un post<\/a><\/strong>, les responsables de Twitter ont expliqu\u00e9 que l&rsquo;attaque a permis d&rsquo;exploiter les <strong><a href=\"https:\/\/koddos.net\/blog\/hsm-vulnerabilities-detected-flaws-affecting-major-institutions-banks-and-even-governments\/\">vuln\u00e9rabilit\u00e9s<\/a><\/strong> humaines du syst\u00e8me de Twitter, en trompant un certain nombre d&#8217;employ\u00e9s.<\/p>\n\n\n\n<p>Bien s\u00fbr, Twitter s&rsquo;est rapidement r\u00e9engag\u00e9 \u00e0 prot\u00e9ger les informations priv\u00e9es, promettant que l&rsquo;entreprise prend cette responsabilit\u00e9 tr\u00e8s au s\u00e9rieux. Selon la d\u00e9claration de la plateforme de m\u00e9dias sociaux, c&rsquo;est un rappel brutal de l&rsquo;importance de chaque personne au sein de l&rsquo;\u00e9quipe de Twitter.<\/p>\n\n\n\n<p>Sur un point important, Twitter a r\u00e9v\u00e9l\u00e9 que sept des <strong><a href=\"https:\/\/koddos.net\/blog\/hackers-are-posting-trump-campaign-message-on-hacked-roblox-accounts\/\">comptes pirat\u00e9s<\/a><\/strong> ont vu leurs donn\u00e9es personnelles t\u00e9l\u00e9charg\u00e9es. Cependant, la plateforme de m\u00e9dias sociaux a jug\u00e9 bon de garder l&rsquo;identit\u00e9 de ces comptes pirat\u00e9s pour eux-m\u00eames, dans leurs tentatives infinies de r\u00e9duire les dommages.<\/p>\n\n\n\n<p><strong>Une arnaque massive au Bitcoin<\/strong><\/p>\n\n\n\n<p>Ce post est le dernier point sur les enqu\u00eates de Twitter concernant le piratage massif de la plateforme. Ce piratage, qui s&rsquo;est produit le 15 juillet, a d\u00e9tourn\u00e9 les comptes Twitter de certaines des personnalit\u00e9s les plus connues de Twitter, qu&rsquo;il s&rsquo;agisse de c\u00e9l\u00e9brit\u00e9s, de cadres ou d&rsquo;hommes politiques. Les hackers ont ensuite utilis\u00e9 ces comptes pour associer les <strong><a href=\"https:\/\/koddos.net\/blog\/twitter-hack-takes-over-a-number-of-highly-visible-accounts\/\">arnaques au Bitcoin<\/a><\/strong>, et ont abus\u00e9 des comptes de grands noms comme Bill Gates, Joe Biden, Kanye West et Elon Musk pour faciliter leur arnaque.<\/p>\n\n\n\n<p>Twitter n&rsquo;a pu reprendre le contr\u00f4le de ces comptes qu&rsquo;au bout de quelques heures, certains d&rsquo;entre eux faisant l&rsquo;objet d&rsquo;une lutte acharn\u00e9e entre Twitter et les hackers. \u00c0 plusieurs reprises, ils ont r\u00e9ussi \u00e0 reprendre le compte Twitter, poursuivant leurs propres agendas sadiques.<\/p>\n\n\n\n<p>Ce n&rsquo;est que quelques heures apr\u00e8s que la violation a \u00e9t\u00e9 contenue que Twitter a finalement r\u00e9pondu, en d\u00e9taillant comment la plateforme a perdu le contr\u00f4le de ses syst\u00e8mes administratifs internes. La raison de cette perte de contr\u00f4le \u00e9tait due au fait qu&rsquo;une personne au sein des employ\u00e9s de l&rsquo;entreprise avait \u00e9t\u00e9 contrainte, pay\u00e9e ou autrement tromp\u00e9e pour les aider. Depuis lors, des mises \u00e0 jour r\u00e9guli\u00e8res ont \u00e9t\u00e9 fournies par les responsables de l&rsquo;entreprise.<\/p>\n\n\n\n<p>L&rsquo;une des plus r\u00e9centes, datant de la semaine derni\u00e8re, a r\u00e9v\u00e9l\u00e9 que les hackers ont r\u00e9ussi \u00e0 lire les messages priv\u00e9s de 36 <strong><a href=\"https:\/\/koddos.net\/blog\/hackers-are-using-hijacked-youtube-accounts-for-crypto-ponzi-scheme\/\">comptes pirat\u00e9s<\/a><\/strong>, 130 des utilisateurs concern\u00e9s ayant des num\u00e9ros de t\u00e9l\u00e9phone, ainsi que des messages priv\u00e9s, visibles par les hackers.<\/p>\n\n\n\n<p><strong>Restructuration en cours<\/strong><\/p>\n\n\n\n<p>Suite \u00e0 ce piratage, les critiques se sont rapidement accumul\u00e9es sur Twitter. Un argument cl\u00e9 pr\u00e9sent\u00e9 \u00e9tait que Twitter n&rsquo;avait pas mis en place un syst\u00e8me de contr\u00f4le ad\u00e9quat pour pr\u00e9venir les initi\u00e9s de l&rsquo;entreprise, ainsi que les personnes qui les ciblent, d&rsquo;obtenir des informations sensibles sur les utilisateurs.<\/p>\n\n\n\n<p>Depuis lors, Twitter a jur\u00e9 haut et fort de d\u00e9couvrir comment les personnes ext\u00e9rieures ont r\u00e9ussi \u00e0 acc\u00e9der aux syst\u00e8mes internes sensibles, et de prendre des mesures pour emp\u00eacher qu&rsquo;une telle attaque ne se produise \u00e0 l&rsquo;avenir.<\/p>\n\n\n\n<p>Dans la derni\u00e8re mise \u00e0 jour, une explication d\u00e9taill\u00e9e a \u00e9t\u00e9 donn\u00e9e sur la mani\u00e8re dont les syst\u00e8mes internes et les outils de compte fonctionnent pour les employ\u00e9s de Twitter. Depuis lors, Twitter a d\u00e9clar\u00e9 que l&rsquo;acc\u00e8s des employ\u00e9s aux syst\u00e8mes et outils internes a \u00e9t\u00e9 consid\u00e9rablement r\u00e9duit au fur et \u00e0 mesure de la poursuite de l&rsquo;enqu\u00eate.<\/p>\n\n\n\n<p>Une gamme de services a \u00e9t\u00e9 temporairement limit\u00e9e en cons\u00e9quence, mais le plus touch\u00e9 est le service qui permet aux utilisateurs de t\u00e9l\u00e9charger leurs donn\u00e9es Twitter.<\/p>\n\n\n\n<p>En raison de tous les d\u00e9veloppements en cours, Twitter a d\u00e9clar\u00e9 qu&rsquo;il serait plus lent \u00e0 r\u00e9pondre aux demandes d&rsquo;assistance pour les comptes, ainsi qu&rsquo;aux applications de sa plateforme de d\u00e9veloppement et aux Tweets signal\u00e9s en g\u00e9n\u00e9ral. Bien que des excuses aient \u00e9t\u00e9 pr\u00e9sent\u00e9es pour ces retards, Twitter les d\u00e9crit comme des pr\u00e9cautions obligatoires afin d&rsquo;apporter les changements \u00e0 son processus dont la plateforme a besoin pour s&rsquo;assurer que cet incident ne se reproduira plus jamais.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Twitter a fait la une des journaux en raison de la violation de son syst\u00e8me. Au fur et \u00e0 mesure que les informations sur le piratage sont publi\u00e9es, il a \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9 qu&rsquo;un certain nombre d&#8217;employ\u00e9s avaient \u00e9t\u00e9 explicitement vis\u00e9s par des attaques de type spear phishing par t\u00e9l\u00e9phone. C&rsquo;est ce qu&rsquo;a annonc\u00e9 jeudi le &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LES HACKERS DE TWITTER ONT UTILIS\u00c9 LE SPEAR PHISHING PAR T\u00c9L\u00c9PHONE DANS UN PIRATAGE DE MASSE<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2373,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-2372","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LES HACKERS DE TWITTER ONT UTILIS\u00c9 LE SPEAR PHISHING PAR T\u00c9L\u00c9PHONE DANS UN PIRATAGE DE MASSE - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LES HACKERS DE TWITTER ONT UTILIS\u00c9 LE SPEAR PHISHING PAR T\u00c9L\u00c9PHONE DANS UN PIRATAGE DE MASSE - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Twitter a fait la une des journaux en raison de la violation de son syst\u00e8me. Au fur et \u00e0 mesure que les informations sur le piratage sont publi\u00e9es, il a \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9 qu&rsquo;un certain nombre d&#8217;employ\u00e9s avaient \u00e9t\u00e9 explicitement vis\u00e9s par des attaques de type spear phishing par t\u00e9l\u00e9phone. C&rsquo;est ce qu&rsquo;a annonc\u00e9 jeudi le &hellip; Continue reading LES HACKERS DE TWITTER ONT UTILIS\u00c9 LE SPEAR PHISHING PAR T\u00c9L\u00c9PHONE DANS UN PIRATAGE DE MASSE\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-31T12:44:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-01T12:49:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/08\/Twitter-Memes-Used-for-Hiding-Malware-Instructions-in-Plain-Sight.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LES HACKERS DE TWITTER ONT UTILIS\u00c9 LE SPEAR PHISHING PAR T\u00c9L\u00c9PHONE DANS UN PIRATAGE DE MASSE\",\"datePublished\":\"2020-07-31T12:44:00+00:00\",\"dateModified\":\"2020-08-01T12:49:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\\\/\"},\"wordCount\":886,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Twitter-Memes-Used-for-Hiding-Malware-Instructions-in-Plain-Sight.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\\\/\",\"name\":\"LES HACKERS DE TWITTER ONT UTILIS\u00c9 LE SPEAR PHISHING PAR T\u00c9L\u00c9PHONE DANS UN PIRATAGE DE MASSE - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Twitter-Memes-Used-for-Hiding-Malware-Instructions-in-Plain-Sight.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-07-31T12:44:00+00:00\",\"dateModified\":\"2020-08-01T12:49:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Twitter-Memes-Used-for-Hiding-Malware-Instructions-in-Plain-Sight.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Twitter-Memes-Used-for-Hiding-Malware-Instructions-in-Plain-Sight.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LES HACKERS DE TWITTER ONT UTILIS\u00c9 LE SPEAR PHISHING PAR T\u00c9L\u00c9PHONE DANS UN PIRATAGE DE MASSE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LES HACKERS DE TWITTER ONT UTILIS\u00c9 LE SPEAR PHISHING PAR T\u00c9L\u00c9PHONE DANS UN PIRATAGE DE MASSE - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/","og_locale":"fr_FR","og_type":"article","og_title":"LES HACKERS DE TWITTER ONT UTILIS\u00c9 LE SPEAR PHISHING PAR T\u00c9L\u00c9PHONE DANS UN PIRATAGE DE MASSE - Blog KoDDoS","og_description":"Twitter a fait la une des journaux en raison de la violation de son syst\u00e8me. Au fur et \u00e0 mesure que les informations sur le piratage sont publi\u00e9es, il a \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9 qu&rsquo;un certain nombre d&#8217;employ\u00e9s avaient \u00e9t\u00e9 explicitement vis\u00e9s par des attaques de type spear phishing par t\u00e9l\u00e9phone. C&rsquo;est ce qu&rsquo;a annonc\u00e9 jeudi le &hellip; Continue reading LES HACKERS DE TWITTER ONT UTILIS\u00c9 LE SPEAR PHISHING PAR T\u00c9L\u00c9PHONE DANS UN PIRATAGE DE MASSE","og_url":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-07-31T12:44:00+00:00","article_modified_time":"2020-08-01T12:49:36+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/08\/Twitter-Memes-Used-for-Hiding-Malware-Instructions-in-Plain-Sight.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LES HACKERS DE TWITTER ONT UTILIS\u00c9 LE SPEAR PHISHING PAR T\u00c9L\u00c9PHONE DANS UN PIRATAGE DE MASSE","datePublished":"2020-07-31T12:44:00+00:00","dateModified":"2020-08-01T12:49:36+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/"},"wordCount":886,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/08\/Twitter-Memes-Used-for-Hiding-Malware-Instructions-in-Plain-Sight.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/","url":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/","name":"LES HACKERS DE TWITTER ONT UTILIS\u00c9 LE SPEAR PHISHING PAR T\u00c9L\u00c9PHONE DANS UN PIRATAGE DE MASSE - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/08\/Twitter-Memes-Used-for-Hiding-Malware-Instructions-in-Plain-Sight.jpg?fit=825%2C510&ssl=1","datePublished":"2020-07-31T12:44:00+00:00","dateModified":"2020-08-01T12:49:36+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/08\/Twitter-Memes-Used-for-Hiding-Malware-Instructions-in-Plain-Sight.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/08\/Twitter-Memes-Used-for-Hiding-Malware-Instructions-in-Plain-Sight.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-twitter-ont-utilise-le-spear-phishing-par-telephone-dans-un-piratage-de-masse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LES HACKERS DE TWITTER ONT UTILIS\u00c9 LE SPEAR PHISHING PAR T\u00c9L\u00c9PHONE DANS UN PIRATAGE DE MASSE"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/08\/Twitter-Memes-Used-for-Hiding-Malware-Instructions-in-Plain-Sight.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-Cg","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=2372"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2372\/revisions"}],"predecessor-version":[{"id":2374,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2372\/revisions\/2374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/2373"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=2372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=2372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=2372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}