{"id":37,"date":"2018-01-30T08:55:28","date_gmt":"2018-01-30T07:55:28","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=37"},"modified":"2019-03-05T05:25:32","modified_gmt":"2019-03-05T04:25:32","slug":"hackers-utilisent-tor-proxy-voler-bitcoin-ransomware","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/","title":{"rendered":"Des hackers utilisent Tor Proxy pour voler Bitcoin Ransomware"},"content":{"rendered":"<p>Des hackers ont \u00e9t\u00e9 d\u00e9couverts pour utiliser des sites proxy Tor pour voler bitcoin qui a \u00e9t\u00e9 pr\u00e9c\u00e9demment gagn\u00e9 par d&rsquo;autres hackers pendant les campagnes ransomware.<br \/>\nCe n&rsquo;est pas un secret que les crypto-monnaies ont \u00e9t\u00e9 la propri\u00e9t\u00e9 des hackers. \u00c0 mesure que la valeur augmentait et atteignait des sommets records au cours des derniers mois, les pirates sont devenus de plus en plus habiles et novateurs dans l&rsquo;exploitation du syst\u00e8me pour leur propre profit. Cependant, dans une tournure inattendue des \u00e9v\u00e9nements, les pirates informatiques se sont exploit\u00e9s mutuellement dans la nouvelle course num\u00e9rique.<br \/>\nDes chercheurs en s\u00e9curit\u00e9 ont r\u00e9cemment d\u00e9couvert que des pirates informatiques ciblaient un site Web proxy Tor pour voler des bitcoins \u00e0 d&rsquo;anciens gestionnaires de campagnes de ran\u00e7ongiciels.<br \/>\nDe mani\u00e8re g\u00e9n\u00e9rale, lors d&rsquo;une attaque ransomware qui demande des paiements bitcoin, les pirates exigent que la somme soit pay\u00e9e en utilisant un site Tor. Cependant, comme la plupart des victimes n&rsquo;ont pas install\u00e9 le navigateur Tor, elles choisissent souvent d&rsquo;utiliser un site Web Tor proxy pour effectuer la transaction. Or, l&rsquo;utilisation d&rsquo;un site Web Tor proxy a ses inconv\u00e9nients, tels que le fait que les administrateurs du site peuvent donner une puissance illimit\u00e9e sur le site Web, par exemple en servant de l&rsquo;homme du milieu ou simplement en rempla\u00e7ant le contenu.<br \/>\nLa derni\u00e8re tendance a \u00e9t\u00e9 d\u00e9couverte par la firme de cybers\u00e9curit\u00e9, Proofpoint, apr\u00e8s que les chercheurs ont constat\u00e9 que les administrateurs du site, onion [.] Top, ont \u00e9cum\u00e9 les paiements bitcoin faits par les victimes de ran\u00e7ongiciels aux gestionnaires de campagne. Les administrateurs du site ont simplement remplac\u00e9 l&rsquo;adresse bitcoin des campagnes de ransomware par la leur. De cette fa\u00e7on, les hackers ont vol\u00e9 \u00e0 la fois la victime et les pairs de la communaut\u00e9 de piratage.<br \/>\nDans un post de blog, les chercheurs notent qu&rsquo;en utilisant cette technique, les administrateurs du site proxy emp\u00eachent les pirates informatiques ran\u00e7onneurs d&rsquo;acc\u00e9der \u00e0 leurs fonds ainsi que les victimes d&rsquo;acc\u00e9der \u00e0 leurs fichiers crypt\u00e9s. Les chercheurs ont d\u00e9clar\u00e9 qu&rsquo;il s&rsquo;agit du premier exemple enregistr\u00e9 d&rsquo;une technique de ce genre.<\/p>\n<p>Selon les chercheurs, le site <a href=\"https:\/\/fr.koddos.net\/blog\/vpn-ou-proxy-dans-quel-cas-utiliser-lun-ou-lautre\/\">proxy<\/a> sp\u00e9cifique a servi d&rsquo;outils pour plusieurs campagnes de ransomware telles que Sigma, LockerR et Globelmposter. Il est int\u00e9ressant de noter que toutes les campagnes de ransomwares ont des adresses bitcoin diff\u00e9rentes de celles affich\u00e9es sur leurs sites Tor respectifs. \u00c0 ce jour, les administrateurs de sites Web responsables ont vol\u00e9 un total de 20 000 $ de bitcoin.<br \/>\n\u00c9tonnamment, la plupart des campagnes de ransomware semblent \u00eatre d\u00e9j\u00e0 conscientes de cette tendance \u00e9mergente, et certaines ont explicitement averti leurs victimes de s&rsquo;abstenir d&rsquo;utiliser le site web onion [.] Top pour mener leurs transactions.<br \/>\nLes gestionnaires de la campagne LockerR ransomware ont autrefois ajout\u00e9 des liens vers le site onion[.] top dans leur note ransomware, cependant, ils ont r\u00e9cemment supprim\u00e9 ces liens et inclus un avertissement visible qui exhorte les victimes \u00e0 s&rsquo;abstenir d&rsquo;utiliser ce site. En outre, les gestionnaires de la campagne Magniber ransomware ont leur adresse bitcoin dans quatre code source utilisant HTML, ostensiblement pour emp\u00eacher des instances similaires d&rsquo;avoir lieu. Les gestionnaires de Globelmposter ransomware ont demand\u00e9 aux victimes d&rsquo;utiliser uniquement le navigateur Tor pour effectuer des paiements.<br \/>\nLes chercheurs de Proofpoint ajoutent que si les administrateurs du site proxy Tor ont seulement vol\u00e9 une quantit\u00e9 relativement faible de bitcoin, la menace pr\u00e9sente un danger potentiel car la majorit\u00e9 des victimes de ransomware pr\u00e9f\u00e8rent effectuer leur transaction via des sites proxy au lieu du navigateur Tor.<br \/>\nLes chercheurs ont ajout\u00e9 que la principale pr\u00e9occupation ici est le risque suppl\u00e9mentaire pour les victimes qui sont d\u00e9j\u00e0 en proie \u00e0 une situation pr\u00e9caire, comme le fait d&rsquo;avoir leurs fichiers crypt\u00e9s. En outre, ce dernier cas met peut-\u00eatre en \u00e9vidence le d\u00e9sespoir grandissant dans la communaut\u00e9 du piratage de rassembler une quantit\u00e9 raisonnable de crypto-monnaie qu&rsquo;ils seraient maintenant s&rsquo;abaisser \u00e0 voler leurs propres pairs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Des hackers ont \u00e9t\u00e9 d\u00e9couverts pour utiliser des sites proxy Tor pour voler bitcoin qui a \u00e9t\u00e9 pr\u00e9c\u00e9demment gagn\u00e9 par d&rsquo;autres hackers pendant les campagnes ransomware. Ce n&rsquo;est pas un secret que les crypto-monnaies ont \u00e9t\u00e9 la propri\u00e9t\u00e9 des hackers. \u00c0 mesure que la valeur augmentait et atteignait des sommets records au cours des derniers &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Des hackers utilisent Tor Proxy pour voler Bitcoin Ransomware<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":38,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6,2,4,3],"tags":[14,10,9,12,8,11,13],"class_list":["post-37","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-exploit","category-hacking","category-malware","tag-breche-de-securite","tag-faille-de-securite","tag-hackers","tag-hacking","tag-securite","tag-vie-prive","tag-vulnerabilite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Des hackers utilisent Tor Proxy pour voler Bitcoin Ransomware - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Des hackers utilisent Tor Proxy pour voler Bitcoin Ransomware - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Des hackers ont \u00e9t\u00e9 d\u00e9couverts pour utiliser des sites proxy Tor pour voler bitcoin qui a \u00e9t\u00e9 pr\u00e9c\u00e9demment gagn\u00e9 par d&rsquo;autres hackers pendant les campagnes ransomware. Ce n&rsquo;est pas un secret que les crypto-monnaies ont \u00e9t\u00e9 la propri\u00e9t\u00e9 des hackers. \u00c0 mesure que la valeur augmentait et atteignait des sommets records au cours des derniers &hellip; Continue reading Des hackers utilisent Tor Proxy pour voler Bitcoin Ransomware\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-30T07:55:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-05T04:25:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/Hackers-Use-Tor-Proxy-to-Steal-Ransomware-Bitcoin.jpg?fit=825%2C492&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"492\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"cvssgrpkqsptqz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"cvssgrpkqsptqz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\\\/\"},\"author\":{\"name\":\"cvssgrpkqsptqz\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/9df2a4428c694fe68e9dcce5d98a0731\"},\"headline\":\"Des hackers utilisent Tor Proxy pour voler Bitcoin Ransomware\",\"datePublished\":\"2018-01-30T07:55:28+00:00\",\"dateModified\":\"2019-03-05T04:25:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\\\/\"},\"wordCount\":710,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/Hackers-Use-Tor-Proxy-to-Steal-Ransomware-Bitcoin.jpg?fit=825%2C492&ssl=1\",\"keywords\":[\"br\u00e8che de s\u00e9curit\u00e9\",\"faille de s\u00e9curit\u00e9\",\"hackers\",\"hacking\",\"s\u00e9curit\u00e9\",\"vie priv\u00e9\",\"vuln\u00e9rabilit\u00e9\"],\"articleSection\":[\"Actualit\u00e9s\",\"Exploit\",\"Hacking\",\"Malware\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\\\/\",\"name\":\"Des hackers utilisent Tor Proxy pour voler Bitcoin Ransomware - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/Hackers-Use-Tor-Proxy-to-Steal-Ransomware-Bitcoin.jpg?fit=825%2C492&ssl=1\",\"datePublished\":\"2018-01-30T07:55:28+00:00\",\"dateModified\":\"2019-03-05T04:25:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/Hackers-Use-Tor-Proxy-to-Steal-Ransomware-Bitcoin.jpg?fit=825%2C492&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/Hackers-Use-Tor-Proxy-to-Steal-Ransomware-Bitcoin.jpg?fit=825%2C492&ssl=1\",\"width\":825,\"height\":492},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Des hackers utilisent Tor Proxy pour voler Bitcoin Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/9df2a4428c694fe68e9dcce5d98a0731\",\"name\":\"cvssgrpkqsptqz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/004dce143c68d28963f42b82c6ec56fb69999473313676bf79049066c79cbee3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/004dce143c68d28963f42b82c6ec56fb69999473313676bf79049066c79cbee3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/004dce143c68d28963f42b82c6ec56fb69999473313676bf79049066c79cbee3?s=96&d=mm&r=g\",\"caption\":\"cvssgrpkqsptqz\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/cvssgrpkqsptqz\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Des hackers utilisent Tor Proxy pour voler Bitcoin Ransomware - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/","og_locale":"fr_FR","og_type":"article","og_title":"Des hackers utilisent Tor Proxy pour voler Bitcoin Ransomware - Blog KoDDoS","og_description":"Des hackers ont \u00e9t\u00e9 d\u00e9couverts pour utiliser des sites proxy Tor pour voler bitcoin qui a \u00e9t\u00e9 pr\u00e9c\u00e9demment gagn\u00e9 par d&rsquo;autres hackers pendant les campagnes ransomware. Ce n&rsquo;est pas un secret que les crypto-monnaies ont \u00e9t\u00e9 la propri\u00e9t\u00e9 des hackers. \u00c0 mesure que la valeur augmentait et atteignait des sommets records au cours des derniers &hellip; Continue reading Des hackers utilisent Tor Proxy pour voler Bitcoin Ransomware","og_url":"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2018-01-30T07:55:28+00:00","article_modified_time":"2019-03-05T04:25:32+00:00","og_image":[{"width":825,"height":492,"url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/Hackers-Use-Tor-Proxy-to-Steal-Ransomware-Bitcoin.jpg?fit=825%2C492&ssl=1","type":"image\/jpeg"}],"author":"cvssgrpkqsptqz","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"cvssgrpkqsptqz","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/"},"author":{"name":"cvssgrpkqsptqz","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/9df2a4428c694fe68e9dcce5d98a0731"},"headline":"Des hackers utilisent Tor Proxy pour voler Bitcoin Ransomware","datePublished":"2018-01-30T07:55:28+00:00","dateModified":"2019-03-05T04:25:32+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/"},"wordCount":710,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/Hackers-Use-Tor-Proxy-to-Steal-Ransomware-Bitcoin.jpg?fit=825%2C492&ssl=1","keywords":["br\u00e8che de s\u00e9curit\u00e9","faille de s\u00e9curit\u00e9","hackers","hacking","s\u00e9curit\u00e9","vie priv\u00e9","vuln\u00e9rabilit\u00e9"],"articleSection":["Actualit\u00e9s","Exploit","Hacking","Malware"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/","url":"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/","name":"Des hackers utilisent Tor Proxy pour voler Bitcoin Ransomware - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/Hackers-Use-Tor-Proxy-to-Steal-Ransomware-Bitcoin.jpg?fit=825%2C492&ssl=1","datePublished":"2018-01-30T07:55:28+00:00","dateModified":"2019-03-05T04:25:32+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/Hackers-Use-Tor-Proxy-to-Steal-Ransomware-Bitcoin.jpg?fit=825%2C492&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/Hackers-Use-Tor-Proxy-to-Steal-Ransomware-Bitcoin.jpg?fit=825%2C492&ssl=1","width":825,"height":492},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/hackers-utilisent-tor-proxy-voler-bitcoin-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Des hackers utilisent Tor Proxy pour voler Bitcoin Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/9df2a4428c694fe68e9dcce5d98a0731","name":"cvssgrpkqsptqz","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/004dce143c68d28963f42b82c6ec56fb69999473313676bf79049066c79cbee3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/004dce143c68d28963f42b82c6ec56fb69999473313676bf79049066c79cbee3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/004dce143c68d28963f42b82c6ec56fb69999473313676bf79049066c79cbee3?s=96&d=mm&r=g","caption":"cvssgrpkqsptqz"},"url":"https:\/\/fr.koddos.net\/blog\/author\/cvssgrpkqsptqz\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/Hackers-Use-Tor-Proxy-to-Steal-Ransomware-Bitcoin.jpg?fit=825%2C492&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-B","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/37","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=37"}],"version-history":[{"count":3,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/37\/revisions"}],"predecessor-version":[{"id":543,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/37\/revisions\/543"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/38"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=37"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=37"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}