{"id":3040,"date":"2021-03-03T16:47:00","date_gmt":"2021-03-03T15:47:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=3040"},"modified":"2021-03-04T16:50:34","modified_gmt":"2021-03-04T15:50:34","slug":"les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/","title":{"rendered":"LES HACKERS CHINOIS EXPLOITENT LES VULN\u00c9RABILIT\u00c9S DES SERVEURS EXCHANGE"},"content":{"rendered":"\n<p>Microsoft <strong><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/\">a mis en garde<\/a><\/strong> les utilisateurs contre l&rsquo;exploitation des failles des serveurs d&rsquo;Exchange par des hackers chinois. Le g\u00e9ant de la technologie a d\u00e9couvert que les hackers encha\u00eenaient plusieurs exploits zero-day pour voler les donn\u00e9es de messagerie des serveurs Exchange de Microsoft. Cependant, Exchange Online et tous les autres produits Microsoft n&rsquo;ont pas \u00e9t\u00e9 touch\u00e9s par l&rsquo;attaque.<\/p>\n\n\n\n<p>Microsoft a \u00e9galement publi\u00e9 des correctifs d&rsquo;urgence pour quatre des failles qui faisaient partie de l&rsquo;arsenal des hackers. \u00ab\u00a0Nous recommandons vivement aux clients de mettre \u00e0 jour les syst\u00e8mes sur site imm\u00e9diatement\u00a0\u00bb, a conseill\u00e9 la soci\u00e9t\u00e9.<\/p>\n\n\n\n<p><strong>Le groupe HAFNIUM est accus\u00e9 de l&rsquo;attaque<\/strong><\/p>\n\n\n\n<p>Microsoft a d\u00e9clar\u00e9 que l&rsquo;auteur est HAFNIUM, un op\u00e9rateur APT chinois qui op\u00e8re \u00e0 partir d&rsquo;un VPS lou\u00e9 aux \u00c9tats-Unis.<\/p>\n\n\n\n<p>En g\u00e9n\u00e9ral, HAFNIUM attaque des entreprises aux \u00c9tats-Unis dans diff\u00e9rents secteurs tels que les groupes de r\u00e9flexion sur les politiques, les entrepreneurs de la d\u00e9fense, les \u00e9tablissements d&rsquo;enseignement sup\u00e9rieur, les cabinets d&rsquo;avocats, les chercheurs en maladies infectieuses, ainsi que les ONG.<\/p>\n\n\n\n<p>Microsoft a d\u00e9clar\u00e9 que d&rsquo;apr\u00e8s les conclusions de ses analystes, il est tr\u00e8s probable que HAFNIUM soit un groupe cybercriminel parrain\u00e9 par le gouvernement chinois, d&rsquo;apr\u00e8s les proc\u00e9dures, les tactiques et la victimologie du groupe.<\/p>\n\n\n\n<p>La vuln\u00e9rabilit\u00e9 a expos\u00e9 les clients du g\u00e9ant technologique \u00e0 des attaques par ex\u00e9cution de code \u00e0 distance qui ne n\u00e9cessitent pas d&rsquo;authentification.<\/p>\n\n\n\n<p>Microsoft <strong><a href=\"https:\/\/www.reuters.com\/article\/us-usa-cyber-microsoft\/microsoft-says-chinese-hackers-targeted-groups-via-server-software-idUSKCN2AU2MF\">a ajout\u00e9 que<\/a><\/strong> l&rsquo;acteur malveillant a profit\u00e9 des failles pour acc\u00e9der aux serveurs Exchange sur site, leur donnant un acc\u00e8s non autoris\u00e9 aux comptes de messagerie.<\/p>\n\n\n\n<p><strong>Les hackers ont cibl\u00e9 quatre vuln\u00e9rabilit\u00e9s<\/strong><\/p>\n\n\n\n<p>Elle a \u00e9galement permis aux <strong><a href=\"https:\/\/blog.koddos.net\/demon-hackers-accused-of-recent-attack-on-far-right-platform\/\">hackers<\/a><\/strong> d&rsquo;installer des logiciels malveillants suppl\u00e9mentaires pour un acc\u00e8s \u00e0 long terme aux environnements des victimes.<\/p>\n\n\n\n<p>Les quatre vuln\u00e9rabilit\u00e9s exploit\u00e9es dans la nature comprennent <strong><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-27065\">CVE-2021-27065<\/a><\/strong>, <strong><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26858\">CVE-2021-26858<\/a><\/strong>, <strong><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26857\">CVE-2021-26857<\/a><\/strong> et <strong><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26855\">CVE-2021-26855<\/a><\/strong>.<\/p>\n\n\n\n<p>La vuln\u00e9rabilit\u00e9 CVE-2021-26855 permet \u00e0 l&rsquo;attaquant d&rsquo;envoyer des demandes de ran\u00e7on HTTP et de s&rsquo;authentifier en tant que serveur Exchange. La vuln\u00e9rabilit\u00e9 CVE-2021-26855 est particuli\u00e8rement grave car elle peut \u00eatre exploit\u00e9e \u00e0 distance sans n\u00e9cessiter d&rsquo;authentification. Les hackers n&rsquo;ont qu&rsquo;\u00e0 trouver le serveur sur lequel fonctionne Exchange et le compte sur lequel ils veulent que l&rsquo;extraction du courrier \u00e9lectronique soit effectu\u00e9e.<\/p>\n\n\n\n<p>Microsoft a \u00e9galement d\u00e9clar\u00e9 que les attaquants ont suivi trois \u00e9tapes pour <strong><a href=\"https:\/\/blog.koddos.net\/oracle-researchers-say-hackers-are-exploiting-flaws-on-its-weblogic-servers\/\">exploiter les failles<\/a><\/strong>. Dans la premi\u00e8re \u00e9tape, le groupe a pu acc\u00e9der \u00e0 un serveur Exchange en utilisant des <strong><a href=\"https:\/\/blog.koddos.net\/security-researchers-discovered-major-vulnerabilities-on-the-tiktok-app\/\">vuln\u00e9rabilit\u00e9s d\u00e9couvertes<\/a><\/strong> pr\u00e9c\u00e9demment ou en utilisant des mots de passe vol\u00e9s. Lors de la deuxi\u00e8me \u00e9tape, l&rsquo;attaquant a contr\u00f4l\u00e9 le serveur compromis \u00e0 distance apr\u00e8s avoir cr\u00e9\u00e9 un shell web \u00e0 cet effet.<\/p>\n\n\n\n<p>Pour la troisi\u00e8me \u00e9tape, les acteurs malveillants ont utilis\u00e9 l&rsquo;acc\u00e8s \u00e0 distance depuis les serveurs priv\u00e9s aux \u00c9tats-Unis pour voler des donn\u00e9es sur les r\u00e9seaux des organisations.<\/p>\n\n\n\n<p><strong>Microsoft invite ses clients \u00e0 appliquer un correctif<\/strong><\/p>\n\n\n\n<p>Microsoft a \u00e9galement r\u00e9v\u00e9l\u00e9 avoir d\u00e9couvert que HAFNIUM interagissait avec les locataires Office 365 victimes. Bien qu&rsquo;ils n&rsquo;aient pas r\u00e9ussi les attaques, leurs activit\u00e9s incessantes sur le r\u00e9seau leur donnent plus de chances de compromettre les comptes des clients, a d\u00e9clar\u00e9 Microsoft.<\/p>\n\n\n\n<p>Les hackers ont \u00e9galement r\u00e9ussi \u00e0 t\u00e9l\u00e9charger le carnet d&rsquo;adresses hors ligne d&rsquo;Exchange \u00e0 partir des <strong><a href=\"https:\/\/blog.koddos.net\/data-from-bombardier-breached-and-posted-on-the-dark-web\/\">serveurs pirat\u00e9s<\/a><\/strong>. Les donn\u00e9es compromises contiennent des informations sur l&rsquo;organisation victime ainsi que des informations sur ses utilisateurs, selon Microsoft.<\/p>\n\n\n\n<p>Microsoft a \u00e9galement d\u00e9clar\u00e9 que le rapport sur l&rsquo;incident de piratage a \u00e9t\u00e9 cr\u00e9dit\u00e9 \u00e0 la soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 Volexity. La soci\u00e9t\u00e9 de s\u00e9curit\u00e9 a \u00e9galement publi\u00e9 un billet de blog qui utilise la vid\u00e9o pour d\u00e9montrer les d\u00e9tails techniques de l&rsquo;attaque. Elle a \u00e9galement r\u00e9v\u00e9l\u00e9 les adresses IP utilis\u00e9es par les hackers lors de l&rsquo;attaque.<\/p>\n\n\n\n<p>Volexity a \u00e9galement r\u00e9v\u00e9l\u00e9 qu&rsquo;elle avait d\u00e9couvert des activit\u00e9s irr\u00e9guli\u00e8res sur les serveurs Exchange de deux de ses clients au d\u00e9but du mois de janvier, ce qui a donn\u00e9 des indications sur la d\u00e9couverte des attaques.<\/p>\n\n\n\n<p>Selon Volexity, les attaques ont d\u00e9j\u00e0 commenc\u00e9 depuis le 6 janvier.<\/p>\n\n\n\n<p>Et avec une deuxi\u00e8me vuln\u00e9rabilit\u00e9, le hacker peut avoir un acc\u00e8s complet \u00e0 l&rsquo;ex\u00e9cution de code \u00e0 distance, ce qui lui permet d&rsquo;installer des <strong><a href=\"https:\/\/blog.koddos.net\/silver-marrow-malware-found-in-over-30000-macs\/\">logiciels malveillants<\/a><\/strong> sur le serveur.<\/p>\n\n\n\n<p>Microsoft a \u00e9galement d\u00e9clar\u00e9 qu&rsquo;elle a travaill\u00e9 sans rel\u00e2che pour fournir un correctif et une mise \u00e0 jour de la faille. Toutefois, il est important de veiller \u00e0 ce que les syst\u00e8mes des clients soient enti\u00e8rement mis \u00e0 jour. Le g\u00e9ant de la technologie a d\u00e9clar\u00e9 que les clients devraient appliquer le correctif d\u00e8s que possible pour rester totalement prot\u00e9g\u00e9s.<\/p>\n\n\n\n<p>Pour renforcer la s\u00e9curit\u00e9, la soci\u00e9t\u00e9 souhaite publier un correctif pour le serveur Microsoft Exchange 2010 afin de r\u00e9duire les risques. Microsoft a \u00e9galement mis \u00e0 jour son antivirus gratuit pour d\u00e9tecter les logiciels malveillants de HAFNIUM.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft a mis en garde les utilisateurs contre l&rsquo;exploitation des failles des serveurs d&rsquo;Exchange par des hackers chinois. Le g\u00e9ant de la technologie a d\u00e9couvert que les hackers encha\u00eenaient plusieurs exploits zero-day pour voler les donn\u00e9es de messagerie des serveurs Exchange de Microsoft. Cependant, Exchange Online et tous les autres produits Microsoft n&rsquo;ont pas \u00e9t\u00e9 &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LES HACKERS CHINOIS EXPLOITENT LES VULN\u00c9RABILIT\u00c9S DES SERVEURS EXCHANGE<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2073,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-3040","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LES HACKERS CHINOIS EXPLOITENT LES VULN\u00c9RABILIT\u00c9S DES SERVEURS EXCHANGE - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LES HACKERS CHINOIS EXPLOITENT LES VULN\u00c9RABILIT\u00c9S DES SERVEURS EXCHANGE - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Microsoft a mis en garde les utilisateurs contre l&rsquo;exploitation des failles des serveurs d&rsquo;Exchange par des hackers chinois. Le g\u00e9ant de la technologie a d\u00e9couvert que les hackers encha\u00eenaient plusieurs exploits zero-day pour voler les donn\u00e9es de messagerie des serveurs Exchange de Microsoft. Cependant, Exchange Online et tous les autres produits Microsoft n&rsquo;ont pas \u00e9t\u00e9 &hellip; Continue reading LES HACKERS CHINOIS EXPLOITENT LES VULN\u00c9RABILIT\u00c9S DES SERVEURS EXCHANGE\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-03T15:47:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-04T15:50:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/China-Backed-Hackers-Targeting-Coronavirus-Research-USA.jpg?fit=626%2C417&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"626\" \/>\n\t<meta property=\"og:image:height\" content=\"417\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LES HACKERS CHINOIS EXPLOITENT LES VULN\u00c9RABILIT\u00c9S DES SERVEURS EXCHANGE\",\"datePublished\":\"2021-03-03T15:47:00+00:00\",\"dateModified\":\"2021-03-04T15:50:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\\\/\"},\"wordCount\":892,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/China-Backed-Hackers-Targeting-Coronavirus-Research-USA.jpg?fit=626%2C417&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\\\/\",\"name\":\"LES HACKERS CHINOIS EXPLOITENT LES VULN\u00c9RABILIT\u00c9S DES SERVEURS EXCHANGE - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/China-Backed-Hackers-Targeting-Coronavirus-Research-USA.jpg?fit=626%2C417&ssl=1\",\"datePublished\":\"2021-03-03T15:47:00+00:00\",\"dateModified\":\"2021-03-04T15:50:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/China-Backed-Hackers-Targeting-Coronavirus-Research-USA.jpg?fit=626%2C417&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/China-Backed-Hackers-Targeting-Coronavirus-Research-USA.jpg?fit=626%2C417&ssl=1\",\"width\":626,\"height\":417},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LES HACKERS CHINOIS EXPLOITENT LES VULN\u00c9RABILIT\u00c9S DES SERVEURS EXCHANGE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LES HACKERS CHINOIS EXPLOITENT LES VULN\u00c9RABILIT\u00c9S DES SERVEURS EXCHANGE - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/","og_locale":"fr_FR","og_type":"article","og_title":"LES HACKERS CHINOIS EXPLOITENT LES VULN\u00c9RABILIT\u00c9S DES SERVEURS EXCHANGE - Blog KoDDoS","og_description":"Microsoft a mis en garde les utilisateurs contre l&rsquo;exploitation des failles des serveurs d&rsquo;Exchange par des hackers chinois. Le g\u00e9ant de la technologie a d\u00e9couvert que les hackers encha\u00eenaient plusieurs exploits zero-day pour voler les donn\u00e9es de messagerie des serveurs Exchange de Microsoft. Cependant, Exchange Online et tous les autres produits Microsoft n&rsquo;ont pas \u00e9t\u00e9 &hellip; Continue reading LES HACKERS CHINOIS EXPLOITENT LES VULN\u00c9RABILIT\u00c9S DES SERVEURS EXCHANGE","og_url":"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2021-03-03T15:47:00+00:00","article_modified_time":"2021-03-04T15:50:34+00:00","og_image":[{"width":626,"height":417,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/China-Backed-Hackers-Targeting-Coronavirus-Research-USA.jpg?fit=626%2C417&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LES HACKERS CHINOIS EXPLOITENT LES VULN\u00c9RABILIT\u00c9S DES SERVEURS EXCHANGE","datePublished":"2021-03-03T15:47:00+00:00","dateModified":"2021-03-04T15:50:34+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/"},"wordCount":892,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/China-Backed-Hackers-Targeting-Coronavirus-Research-USA.jpg?fit=626%2C417&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/","url":"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/","name":"LES HACKERS CHINOIS EXPLOITENT LES VULN\u00c9RABILIT\u00c9S DES SERVEURS EXCHANGE - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/China-Backed-Hackers-Targeting-Coronavirus-Research-USA.jpg?fit=626%2C417&ssl=1","datePublished":"2021-03-03T15:47:00+00:00","dateModified":"2021-03-04T15:50:34+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/China-Backed-Hackers-Targeting-Coronavirus-Research-USA.jpg?fit=626%2C417&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/China-Backed-Hackers-Targeting-Coronavirus-Research-USA.jpg?fit=626%2C417&ssl=1","width":626,"height":417},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-chinois-exploitent-les-vulnerabilites-des-serveurs-exchange\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LES HACKERS CHINOIS EXPLOITENT LES VULN\u00c9RABILIT\u00c9S DES SERVEURS EXCHANGE"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/China-Backed-Hackers-Targeting-Coronavirus-Research-USA.jpg?fit=626%2C417&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-N2","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/3040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=3040"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/3040\/revisions"}],"predecessor-version":[{"id":3041,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/3040\/revisions\/3041"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/2073"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=3040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=3040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=3040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}