{"id":2603,"date":"2020-10-12T15:03:00","date_gmt":"2020-10-12T13:03:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=2603"},"modified":"2020-10-12T15:07:49","modified_gmt":"2020-10-12T13:07:49","slug":"les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/","title":{"rendered":"LES HACKERS UTILISENT LES VULN\u00c9RABILIT\u00c9S DE WINDOWS ET DE VPN POUR ACC\u00c9DER AUX SYST\u00c8MES DE SUPPORT AUX \u00c9LECTIONS"},"content":{"rendered":"\n<p>Alors que les \u00e9lections am\u00e9ricaines sont sur le point de commencer, la s\u00e9curit\u00e9 des services d&rsquo;assistance \u00e9lectorale est plus importante que jamais. Le pays a fait tout ce qui est en son pouvoir pour s&rsquo;assurer qu&rsquo;il n&rsquo;y ait aucun moyen pour quiconque de violer la s\u00e9curit\u00e9 du syst\u00e8me et d&rsquo;essayer de manipuler les \u00e9lections.<\/p>\n\n\n\n<p>Cependant, apr\u00e8s tout ce qui a \u00e9t\u00e9 fait pour prot\u00e9ger le syst\u00e8me, il semble que les hackers aient encore r\u00e9ussi \u00e0 trouver un moyen d&rsquo;acc\u00e9der aux r\u00e9seaux du gouvernement.<\/p>\n\n\n\n<p>Le FBI et la CISA (Cybersecurity and Infrastructure Security Agency) ont men\u00e9 une enqu\u00eate conjointe et ont d\u00e9couvert que les hackers ont r\u00e9ussi \u00e0 violer la s\u00e9curit\u00e9 en combinant des bogues de <strong><a href=\"https:\/\/blog.koddos.net\/windows-xp-source-code-leaked-to-the-public-by-hackers\/\">Windows<\/a><\/strong> et de <strong><a href=\"https:\/\/blog.koddos.net\/200000-businesses-open-to-hackers-thanks-to-fortinet-vpn-default-settings\/\">VPN<\/a><\/strong>.<\/p>\n\n\n\n<p><strong>Les donn\u00e9es \u00e9lectorales n&rsquo;ont pas \u00e9t\u00e9 compromises<\/strong><\/p>\n\n\n\n<p>Les agences ont publi\u00e9 un rapport vendredi, notant qu&rsquo;il y a eu de multiples attaques contre les r\u00e9seaux des gouvernements f\u00e9d\u00e9ral, d&rsquo;\u00e9tat, local, tribal et territorial (SLTT). Les hackers ne se sont pas arr\u00eat\u00e9s l\u00e0 non plus, puisqu&rsquo;ils ont \u00e9galement cibl\u00e9 certains r\u00e9seaux non gouvernementaux.<\/p>\n\n\n\n<p>L&rsquo;alerte de s\u00e9curit\u00e9 que les agences ont publi\u00e9e indique que les enqu\u00eateurs sont conscients de l&rsquo;activit\u00e9 ainsi que du fait que les attaques ont r\u00e9ussi \u00e0 acc\u00e9der aux syst\u00e8mes de support aux \u00e9lections. Cependant, selon la <strong><a href=\"https:\/\/blog.koddos.net\/new-chinese-malware-strain-exposed-by-cisa-dod-and-fbi\/\">CISA<\/a><\/strong>, il n&rsquo;y a aucune preuve que les donn\u00e9es ont \u00e9t\u00e9 compromises.<\/p>\n\n\n\n<p>Les responsables ont not\u00e9 qu&rsquo;il ne semble pas que ces cibles aient \u00e9t\u00e9 choisies en raison de leur proximit\u00e9 avec les informations \u00e9lectorales. Malgr\u00e9 cela, les donn\u00e9es \u00e9lectorales stock\u00e9es sur les r\u00e9seaux gouvernementaux pourraient \u00eatre menac\u00e9es.<\/p>\n\n\n\n<p><strong>Quelles vuln\u00e9rabilit\u00e9s les hackers ont-ils utilis\u00e9es ?<\/strong><\/p>\n\n\n\n<p>L&rsquo;alerte indique que les hackers ont utilis\u00e9 une combinaison de deux vuln\u00e9rabilit\u00e9s &#8211; une vuln\u00e9rabilit\u00e9 VPN connue sous le nom de CVE-2018-13379, et une vuln\u00e9rabilit\u00e9 Windows connue sous le nom de CVE-2020-1472.<\/p>\n\n\n\n<p>La premi\u00e8re est une vuln\u00e9rabilit\u00e9 du VPN SSL FortiOS de Fortinet, qui est un serveur VPN sur site. Le serveur est utilis\u00e9 comme une passerelle s\u00e9curis\u00e9e, qui permet d&rsquo;acc\u00e9der \u00e0 distance aux r\u00e9seaux d&rsquo;entreprise.<\/p>\n\n\n\n<p>Cette vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9e en 2019 et permet aux hackers de t\u00e9l\u00e9charger des logiciels malveillants sur des syst\u00e8mes non prot\u00e9g\u00e9s. Ce faisant, il leur est possible de d\u00e9tourner les <strong><a href=\"https:\/\/blog.koddos.net\/iran-hackers-planting-backdoors-in-vpn-companies-for-future-attacks\/\">serveurs VPN de Fortinet<\/a><\/strong>.<\/p>\n\n\n\n<p>La vuln\u00e9rabilit\u00e9 de Windows, CVE-2020-1472, est \u00e9galement connue sous un autre nom &#8211; Zerologon. Il s&rsquo;agit essentiellement d&rsquo;une vuln\u00e9rabilit\u00e9 de Netlogon. Netlogon est un protocole que les postes de travail Windows utilisent pour l&rsquo;authentification par rapport aux serveurs Windows fonctionnant en tant que contr\u00f4leurs de domaine.<\/p>\n\n\n\n<p>En utilisant cette vuln\u00e9rabilit\u00e9, les hackers pourraient s&#8217;emparer des contr\u00f4leurs de domaine, qui sont des serveurs utilis\u00e9s pour g\u00e9rer l&rsquo;ensemble des r\u00e9seaux internes ou d&rsquo;entreprise. Ces serveurs stockent g\u00e9n\u00e9ralement aussi les mots de passe de chaque poste de travail qui leur est connect\u00e9.<\/p>\n\n\n\n<p>En combinant ces deux vuln\u00e9rabilit\u00e9s, les hackers peuvent d\u00e9tourner les serveurs Fortinet, puis utiliser Zerologon pour prendre le contr\u00f4le des r\u00e9seaux internes. Il a \u00e9t\u00e9 confirm\u00e9 qu&rsquo;ils utilisent des outils d&rsquo;acc\u00e8s \u00e0 distance l\u00e9gitimes, tels que RDP et VPN, et qu&rsquo;ils utilisent des identifiants compromis pour acc\u00e9der \u00e0 l&rsquo;environnement.<\/p>\n\n\n\n<p>Les agences ont \u00e9galement qualifi\u00e9 les attaquants d&rsquo;acteurs APT (Advanced Persistent Threat), mais aucun autre \u00e9l\u00e9ment n&rsquo;a \u00e9t\u00e9 communiqu\u00e9 dans le rapport. Une chose \u00e0 noter est que ce terme est souvent utilis\u00e9 pour les groupes parrain\u00e9s par l&rsquo;\u00c9tat, comme l&rsquo;Iranian MuddyWatter (APT Mercury). Ce groupe particulier a r\u00e9cemment \u00e9t\u00e9 observ\u00e9 \u00e0 l&rsquo;aide de Zerologon, et il \u00e9tait connu pour avoir cibl\u00e9 des r\u00e9seaux du gouvernement am\u00e9ricain dans le pass\u00e9.<\/p>\n\n\n\n<p><strong>Qu&rsquo;en est-il ensuite ?<\/strong><\/p>\n\n\n\n<p>Compte tenu de ces nouvelles d\u00e9couvertes, le FBI et la CISA recommandent aux secteurs priv\u00e9 et public de mettre \u00e0 jour leurs syst\u00e8mes. Les mises \u00e0 jour permettraient de corriger les bogues et de garantir les syst\u00e8mes contre de telles <strong><a href=\"https:\/\/blog.koddos.net\/lazarus-hacking-group-attacks-israeli-defense-ministry\/\">attaques<\/a><\/strong>.<\/p>\n\n\n\n<p>Les correctifs ne sont pas nouveaux \u2014 ils existent depuis des mois, ils devraient donc \u00eatre faciles \u00e0 trouver et \u00e0 mettre en \u0153uvre. En outre, les agences ont \u00e9galement not\u00e9 que les hackers pourraient essayer d&rsquo;utiliser d&rsquo;autres vuln\u00e9rabilit\u00e9s des produits VPN et des passerelles qui ont \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9es et rendues publiques au cours des derniers mois.<\/p>\n\n\n\n<p>Il s&rsquo;agit par exemple des vuln\u00e9rabilit\u00e9s CVE-2019-11510, CVE-2019-1579, CVE-2019-19781, CVE-2020-15505 et CVE-2020-5902.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alors que les \u00e9lections am\u00e9ricaines sont sur le point de commencer, la s\u00e9curit\u00e9 des services d&rsquo;assistance \u00e9lectorale est plus importante que jamais. Le pays a fait tout ce qui est en son pouvoir pour s&rsquo;assurer qu&rsquo;il n&rsquo;y ait aucun moyen pour quiconque de violer la s\u00e9curit\u00e9 du syst\u00e8me et d&rsquo;essayer de manipuler les \u00e9lections. Cependant, &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LES HACKERS UTILISENT LES VULN\u00c9RABILIT\u00c9S DE WINDOWS ET DE VPN POUR ACC\u00c9DER AUX SYST\u00c8MES DE SUPPORT AUX \u00c9LECTIONS<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2604,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-2603","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LES HACKERS UTILISENT LES VULN\u00c9RABILIT\u00c9S DE WINDOWS ET DE VPN POUR ACC\u00c9DER AUX SYST\u00c8MES DE SUPPORT AUX \u00c9LECTIONS - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LES HACKERS UTILISENT LES VULN\u00c9RABILIT\u00c9S DE WINDOWS ET DE VPN POUR ACC\u00c9DER AUX SYST\u00c8MES DE SUPPORT AUX \u00c9LECTIONS - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Alors que les \u00e9lections am\u00e9ricaines sont sur le point de commencer, la s\u00e9curit\u00e9 des services d&rsquo;assistance \u00e9lectorale est plus importante que jamais. Le pays a fait tout ce qui est en son pouvoir pour s&rsquo;assurer qu&rsquo;il n&rsquo;y ait aucun moyen pour quiconque de violer la s\u00e9curit\u00e9 du syst\u00e8me et d&rsquo;essayer de manipuler les \u00e9lections. Cependant, &hellip; Continue reading LES HACKERS UTILISENT LES VULN\u00c9RABILIT\u00c9S DE WINDOWS ET DE VPN POUR ACC\u00c9DER AUX SYST\u00c8MES DE SUPPORT AUX \u00c9LECTIONS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-12T13:03:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-12T13:07:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/10\/Hackers-Use-Windows-and-VPN-Bugs-to-Access-US-Election-Support-Systems.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LES HACKERS UTILISENT LES VULN\u00c9RABILIT\u00c9S DE WINDOWS ET DE VPN POUR ACC\u00c9DER AUX SYST\u00c8MES DE SUPPORT AUX \u00c9LECTIONS\",\"datePublished\":\"2020-10-12T13:03:00+00:00\",\"dateModified\":\"2020-10-12T13:07:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\\\/\"},\"wordCount\":822,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Hackers-Use-Windows-and-VPN-Bugs-to-Access-US-Election-Support-Systems.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\\\/\",\"name\":\"LES HACKERS UTILISENT LES VULN\u00c9RABILIT\u00c9S DE WINDOWS ET DE VPN POUR ACC\u00c9DER AUX SYST\u00c8MES DE SUPPORT AUX \u00c9LECTIONS - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Hackers-Use-Windows-and-VPN-Bugs-to-Access-US-Election-Support-Systems.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-10-12T13:03:00+00:00\",\"dateModified\":\"2020-10-12T13:07:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Hackers-Use-Windows-and-VPN-Bugs-to-Access-US-Election-Support-Systems.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Hackers-Use-Windows-and-VPN-Bugs-to-Access-US-Election-Support-Systems.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LES HACKERS UTILISENT LES VULN\u00c9RABILIT\u00c9S DE WINDOWS ET DE VPN POUR ACC\u00c9DER AUX SYST\u00c8MES DE SUPPORT AUX \u00c9LECTIONS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LES HACKERS UTILISENT LES VULN\u00c9RABILIT\u00c9S DE WINDOWS ET DE VPN POUR ACC\u00c9DER AUX SYST\u00c8MES DE SUPPORT AUX \u00c9LECTIONS - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/","og_locale":"fr_FR","og_type":"article","og_title":"LES HACKERS UTILISENT LES VULN\u00c9RABILIT\u00c9S DE WINDOWS ET DE VPN POUR ACC\u00c9DER AUX SYST\u00c8MES DE SUPPORT AUX \u00c9LECTIONS - Blog KoDDoS","og_description":"Alors que les \u00e9lections am\u00e9ricaines sont sur le point de commencer, la s\u00e9curit\u00e9 des services d&rsquo;assistance \u00e9lectorale est plus importante que jamais. Le pays a fait tout ce qui est en son pouvoir pour s&rsquo;assurer qu&rsquo;il n&rsquo;y ait aucun moyen pour quiconque de violer la s\u00e9curit\u00e9 du syst\u00e8me et d&rsquo;essayer de manipuler les \u00e9lections. Cependant, &hellip; Continue reading LES HACKERS UTILISENT LES VULN\u00c9RABILIT\u00c9S DE WINDOWS ET DE VPN POUR ACC\u00c9DER AUX SYST\u00c8MES DE SUPPORT AUX \u00c9LECTIONS","og_url":"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-10-12T13:03:00+00:00","article_modified_time":"2020-10-12T13:07:49+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/10\/Hackers-Use-Windows-and-VPN-Bugs-to-Access-US-Election-Support-Systems.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LES HACKERS UTILISENT LES VULN\u00c9RABILIT\u00c9S DE WINDOWS ET DE VPN POUR ACC\u00c9DER AUX SYST\u00c8MES DE SUPPORT AUX \u00c9LECTIONS","datePublished":"2020-10-12T13:03:00+00:00","dateModified":"2020-10-12T13:07:49+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/"},"wordCount":822,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/10\/Hackers-Use-Windows-and-VPN-Bugs-to-Access-US-Election-Support-Systems.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/","url":"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/","name":"LES HACKERS UTILISENT LES VULN\u00c9RABILIT\u00c9S DE WINDOWS ET DE VPN POUR ACC\u00c9DER AUX SYST\u00c8MES DE SUPPORT AUX \u00c9LECTIONS - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/10\/Hackers-Use-Windows-and-VPN-Bugs-to-Access-US-Election-Support-Systems.jpg?fit=825%2C510&ssl=1","datePublished":"2020-10-12T13:03:00+00:00","dateModified":"2020-10-12T13:07:49+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/10\/Hackers-Use-Windows-and-VPN-Bugs-to-Access-US-Election-Support-Systems.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/10\/Hackers-Use-Windows-and-VPN-Bugs-to-Access-US-Election-Support-Systems.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-utilisent-les-vulnerabilites-de-windows-et-de-vpn-pour-acceder-aux-systemes-de-support-aux-elections\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LES HACKERS UTILISENT LES VULN\u00c9RABILIT\u00c9S DE WINDOWS ET DE VPN POUR ACC\u00c9DER AUX SYST\u00c8MES DE SUPPORT AUX \u00c9LECTIONS"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/10\/Hackers-Use-Windows-and-VPN-Bugs-to-Access-US-Election-Support-Systems.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-FZ","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=2603"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2603\/revisions"}],"predecessor-version":[{"id":2605,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2603\/revisions\/2605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/2604"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=2603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=2603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=2603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}