{"id":3191,"date":"2021-05-10T07:36:00","date_gmt":"2021-05-10T05:36:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=3191"},"modified":"2021-05-12T07:39:49","modified_gmt":"2021-05-12T05:39:49","slug":"les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/","title":{"rendered":"LES HACKERS DE DARKSIDE ONT UN CODE \u00c9THIQUE QUI R\u00c9GIT LES ATTAQUES"},"content":{"rendered":"\n<p>DarkSide, le groupe de hackers responsable du piratage de Colonial Pipeline, a d\u00e9clar\u00e9 avoir un code de conduite \u00e9thique. Ce code r\u00e9git les entreprises que le <strong><a href=\"https:\/\/blog.koddos.net\/a-chinese-hacking-group-found-stealing-airline-passenger-details\/\">groupe de hackers<\/a><\/strong> va cibler.<\/p>\n\n\n\n<p>Colonial Pipeline est le plus grand fournisseur de carburant de la c\u00f4te Est. La soci\u00e9t\u00e9 a \u00e9t\u00e9 pirat\u00e9e jeudi dernier, les hackers ayant emport\u00e9 environ 100 Go de donn\u00e9es. Les hackers ont \u00e9galement crypt\u00e9 certaines des donn\u00e9es de la soci\u00e9t\u00e9 et ont exig\u00e9 une ran\u00e7on. Colonial Pipeline n&rsquo;a toutefois pas r\u00e9v\u00e9l\u00e9 le montant de la ran\u00e7on demand\u00e9e.<\/p>\n\n\n\n<p>L&rsquo;entr\u00e9e de DarkSide dans le domaine du march\u00e9 des crypto-monnaies a \u00e9t\u00e9 marqu\u00e9e en ao\u00fbt 2020. L&rsquo;entreprise a \u00e9t\u00e9 mise sous les projecteurs par un <strong><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/darkside-new-targeted-ransomware-demands-million-dollar-ransoms\/\">article d&rsquo;information de Bleeping Computer<\/a><\/strong>. \u00c0 l&rsquo;\u00e9poque, DarkSide a affirm\u00e9 \u00eatre une entreprise l\u00e9gitime et non un groupe de hackers au chapeau noir.<\/p>\n\n\n\n<p><strong>Le code d&rsquo;\u00e9thique de DarkSide<\/strong><\/p>\n\n\n\n<p>Un communiqu\u00e9 de presse publi\u00e9 sur le dark web a r\u00e9v\u00e9l\u00e9 que DarkSide travaille avec un code \u00e9thique. Un communiqu\u00e9 de presse sur Bleeping Computer a r\u00e9v\u00e9l\u00e9 les d\u00e9tails.<\/p>\n\n\n\n<p>Le code \u00e9thique stipule que DarkSide ne peut pas attaquer diverses institutions qui offrent des services n\u00e9cessaires, notamment les \u00e9coles, les h\u00f4pitaux, les universit\u00e9s, les ONG, les gouvernements et les hospices. Selon Bleeping Computer, ne pas attaquer de telles organisations \u00e9tait dans les principes de la firme.<\/p>\n\n\n\n<p>La soci\u00e9t\u00e9 a d\u00e9clar\u00e9 que son public cible \u00e9tait les entreprises qui avaient les fonds n\u00e9cessaires pour payer la ran\u00e7on. Une <strong><a href=\"https:\/\/blog.koddos.net\/ransomware-attack-on-colonial-pipeline-causes-shutdown\/\">attaque de ransomware<\/a><\/strong> peut entra\u00eener un paiement \u00e9quivalent \u00e0 des millions de dollars.<\/p>\n\n\n\n<p>Par ailleurs, l&rsquo;entreprise travaille \u00e9galement de mani\u00e8re professionnelle. Le groupe diffuse g\u00e9n\u00e9ralement des communiqu\u00e9s de presse et dispose m\u00eame d&rsquo;une liste de diffusion. Selon Lior Div, le directeur g\u00e9n\u00e9ral de Cyberason, \u00ab\u00a0ils sont tr\u00e8s nouveaux, mais ils sont tr\u00e8s organis\u00e9s\u00a0\u00bb. \u00ab\u00a0On dirait quelqu&rsquo;un qui est pass\u00e9 par l\u00e0 et qui l&rsquo;a fait\u00a0\u00bb a-t-il ajout\u00e9.<\/p>\n\n\n\n<p><strong>L&rsquo;attaque contre Colonial Pipeline<\/strong><\/p>\n\n\n\n<p>L&rsquo;<strong><a href=\"https:\/\/www.colpipe.com\/news\/press-releases\/media-statement-colonial-pipeline-system-disruption\">attaque contre Colonial Pipeline<\/a><\/strong> par DarkSide pourrait \u00eatre l&rsquo;une des plus importantes de l&rsquo;histoire du pays. L&rsquo;entreprise traite environ 2,5 millions de barils de carburant par jour. Cela \u00e9quivaut \u00e0 45% de l&rsquo;approvisionnement total en carburant de la c\u00f4te Est.<\/p>\n\n\n\n<p>L&rsquo;ol\u00e9oduc a interrompu ses activit\u00e9s vendredi en raison de l&rsquo;attaque. Il a engag\u00e9 une soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 qui cherche \u00e0 identifier un moyen de r\u00e9soudre le piratage. L&rsquo;entreprise travaille \u00e9galement avec le gouvernement pour trouver un moyen de g\u00e9rer la situation. Pour r\u00e9pondre \u00e0 la demande de carburant, le gouvernement am\u00e9ricain se montre plus indulgent \u00e0 l&rsquo;\u00e9gard du carburant transport\u00e9 par route en attendant que le Colonial Pipeline reprenne ses activit\u00e9s.<\/p>\n\n\n\n<p>Actuellement, les prix du carburant aux \u00c9tats-Unis ne sont pas encore affect\u00e9s par la pand\u00e9mie. Toutefois, on craint que cela ne change si la fermeture de l&rsquo;entreprise se poursuit pendant plusieurs jours.<\/p>\n\n\n\n<p>DarkSide a vol\u00e9 environ 100 Go de donn\u00e9es \u00e0 l&rsquo;entreprise et a menac\u00e9 de divulguer les informations si une ran\u00e7on n&rsquo;\u00e9tait pas pay\u00e9e. Cependant, Colonial Pipeline a mis son syst\u00e8me de cloud computing hors ligne. \u00c0 l&rsquo;\u00e9poque, les donn\u00e9es vol\u00e9es n&rsquo;avaient pas \u00e9t\u00e9 transf\u00e9r\u00e9es vers d&rsquo;autres sites, ce qui a r\u00e9duit l&rsquo;influence de DarkSide sur l&rsquo;entreprise.<\/p>\n\n\n\n<p>L&rsquo;entreprise a ferm\u00e9 toutes ses op\u00e9rations et a d\u00e9clar\u00e9 qu&rsquo;elle reprendrait ses activit\u00e9s une fois l&rsquo;affaire r\u00e9gl\u00e9e. Selon la soci\u00e9t\u00e9, les syst\u00e8mes ne seront remis en ligne que \u00ab\u00a0lorsque nous estimerons qu&rsquo;il est possible de le faire en toute s\u00e9curit\u00e9\u00a0\u00bb.<\/p>\n\n\n\n<p>L&rsquo;attaque contre Colonial Pipeline a mis en lumi\u00e8re les niveaux \u00e9lev\u00e9s de vuln\u00e9rabilit\u00e9 dans le secteur de l&rsquo;\u00e9nergie. Par ailleurs, les attaques par ransomware et les autres attaques en ligne sont en augmentation aux \u00c9tats-Unis. Cette situation exige un renforcement des mesures visant \u00e0 assurer la cybers\u00e9curit\u00e9 des institutions gouvernementales et des consommateurs am\u00e9ricains.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DarkSide, le groupe de hackers responsable du piratage de Colonial Pipeline, a d\u00e9clar\u00e9 avoir un code de conduite \u00e9thique. Ce code r\u00e9git les entreprises que le groupe de hackers va cibler. Colonial Pipeline est le plus grand fournisseur de carburant de la c\u00f4te Est. La soci\u00e9t\u00e9 a \u00e9t\u00e9 pirat\u00e9e jeudi dernier, les hackers ayant emport\u00e9 &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LES HACKERS DE DARKSIDE ONT UN CODE \u00c9THIQUE QUI R\u00c9GIT LES ATTAQUES<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":1463,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-3191","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LES HACKERS DE DARKSIDE ONT UN CODE \u00c9THIQUE QUI R\u00c9GIT LES ATTAQUES - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LES HACKERS DE DARKSIDE ONT UN CODE \u00c9THIQUE QUI R\u00c9GIT LES ATTAQUES - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"DarkSide, le groupe de hackers responsable du piratage de Colonial Pipeline, a d\u00e9clar\u00e9 avoir un code de conduite \u00e9thique. Ce code r\u00e9git les entreprises que le groupe de hackers va cibler. Colonial Pipeline est le plus grand fournisseur de carburant de la c\u00f4te Est. La soci\u00e9t\u00e9 a \u00e9t\u00e9 pirat\u00e9e jeudi dernier, les hackers ayant emport\u00e9 &hellip; Continue reading LES HACKERS DE DARKSIDE ONT UN CODE \u00c9THIQUE QUI R\u00c9GIT LES ATTAQUES\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-10T05:36:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-12T05:39:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LES HACKERS DE DARKSIDE ONT UN CODE \u00c9THIQUE QUI R\u00c9GIT LES ATTAQUES\",\"datePublished\":\"2021-05-10T05:36:00+00:00\",\"dateModified\":\"2021-05-12T05:39:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\\\/\"},\"wordCount\":709,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\\\/\",\"name\":\"LES HACKERS DE DARKSIDE ONT UN CODE \u00c9THIQUE QUI R\u00c9GIT LES ATTAQUES - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1\",\"datePublished\":\"2021-05-10T05:36:00+00:00\",\"dateModified\":\"2021-05-12T05:39:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LES HACKERS DE DARKSIDE ONT UN CODE \u00c9THIQUE QUI R\u00c9GIT LES ATTAQUES\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LES HACKERS DE DARKSIDE ONT UN CODE \u00c9THIQUE QUI R\u00c9GIT LES ATTAQUES - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/","og_locale":"fr_FR","og_type":"article","og_title":"LES HACKERS DE DARKSIDE ONT UN CODE \u00c9THIQUE QUI R\u00c9GIT LES ATTAQUES - Blog KoDDoS","og_description":"DarkSide, le groupe de hackers responsable du piratage de Colonial Pipeline, a d\u00e9clar\u00e9 avoir un code de conduite \u00e9thique. Ce code r\u00e9git les entreprises que le groupe de hackers va cibler. Colonial Pipeline est le plus grand fournisseur de carburant de la c\u00f4te Est. La soci\u00e9t\u00e9 a \u00e9t\u00e9 pirat\u00e9e jeudi dernier, les hackers ayant emport\u00e9 &hellip; Continue reading LES HACKERS DE DARKSIDE ONT UN CODE \u00c9THIQUE QUI R\u00c9GIT LES ATTAQUES","og_url":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2021-05-10T05:36:00+00:00","article_modified_time":"2021-05-12T05:39:49+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1","type":"image\/png"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LES HACKERS DE DARKSIDE ONT UN CODE \u00c9THIQUE QUI R\u00c9GIT LES ATTAQUES","datePublished":"2021-05-10T05:36:00+00:00","dateModified":"2021-05-12T05:39:49+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/"},"wordCount":709,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/","url":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/","name":"LES HACKERS DE DARKSIDE ONT UN CODE \u00c9THIQUE QUI R\u00c9GIT LES ATTAQUES - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1","datePublished":"2021-05-10T05:36:00+00:00","dateModified":"2021-05-12T05:39:49+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-de-darkside-ont-un-code-ethique-qui-regit-les-attaques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LES HACKERS DE DARKSIDE ONT UN CODE \u00c9THIQUE QUI R\u00c9GIT LES ATTAQUES"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Hackers-Plant-Malicious-Code-on-Smith-Wessons-Website.png?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-Pt","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/3191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=3191"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/3191\/revisions"}],"predecessor-version":[{"id":3192,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/3191\/revisions\/3192"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/1463"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=3191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=3191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=3191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}