{"id":417,"date":"2019-02-05T20:05:40","date_gmt":"2019-02-05T19:05:40","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=417"},"modified":"2019-02-06T07:13:04","modified_gmt":"2019-02-06T06:13:04","slug":"google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/","title":{"rendered":"GOOGLE PLAY STORE BANNIT ENCORE UN AUTRE GROUPE D&rsquo;APPLICATIONS MALVEILLANTES"},"content":{"rendered":"<p>Selon un <strong><u><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/various-google-play-beauty-camera-apps-sends-users-pornographic-content-redirects-them-to-phishing-websites-and-collects-their-pictures\/\">rapport r\u00e9cent<\/a><\/u><\/strong> d&rsquo;une soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 Trend Micro, Google Play Store est confront\u00e9 \u00e0 un grand nombre d&rsquo;applications infect\u00e9es par des logiciels malveillants. La soci\u00e9t\u00e9 de s\u00e9curit\u00e9 a r\u00e9cemment signal\u00e9 la d\u00e9couverte de 29 autres applications malveillantes qui se faisaient passer pour des applications de \u00ab\u00a0cam\u00e9ras de beaut\u00e9\u00a0\u00bb.<\/p>\n<p>Avant que Google ne supprime les applications, ils avaient plus de 4 millions de t\u00e9l\u00e9chargements, les trois premi\u00e8res applications \u00e9tant t\u00e9l\u00e9charg\u00e9es un million de fois chacune. Les applications tournaient autour du vol de photos et d&rsquo;images des t\u00e9l\u00e9phones de l&rsquo;utilisateur et de leur t\u00e9l\u00e9chargement sur des serveurs externes, contr\u00f4l\u00e9s par le hacker. En outre, certaines des applications ont \u00e9galement exprim\u00e9 d&rsquo;autres formes de mauvais comportement, comme l&rsquo;affichage d&rsquo;annonces inappropri\u00e9es avec un contenu frauduleux ou pornographique chaque fois que les utilisateurs d\u00e9verrouillent leur t\u00e9l\u00e9phone.<\/p>\n<p>Certaines applications essayaient \u00e9galement d&rsquo;envoyer des utilisateurs sur de faux sites Web, esp\u00e9rant voler leurs identifiants de connexion si l&rsquo;utilisateur tente d&rsquo;acc\u00e9der \u00e0 leur compte.<\/p>\n<p>Les chercheurs de Trend Micro ont signal\u00e9 que tout le contenu promu par les applications faisait partie de l&rsquo;escroquerie, m\u00eame s&rsquo;il est techniquement l\u00e9gal, comme la pornographie. Lors de leurs tentatives pour r\u00e9v\u00e9ler l&rsquo;ampleur de la campagne, les chercheurs ont pay\u00e9 l&rsquo;installation d&rsquo;un lecteur vid\u00e9o pour adultes dont l&rsquo;une des applications faisait la promotion. Une fois install\u00e9e, l&rsquo;application n&rsquo;a lu aucun contenu.<\/p>\n<p>D&rsquo;autres applications se pr\u00e9sentaient comme des filtres photo qui promettaient des modifications photo de haute qualit\u00e9. Cependant, apr\u00e8s avoir test\u00e9 les applications, les chercheurs ont d\u00e9couvert que l&rsquo;application volait r\u00e9ellement les images des utilisateurs. La raison en est probablement l&rsquo;utilisation d&rsquo;images pour cr\u00e9er de faux comptes de m\u00e9dias sociaux et d&rsquo;autres <a href=\"https:\/\/koddos.net\/blog\/several-wordpress-sites-compromised-by-malicious-codes\/\"><strong>actions malveillantes<\/strong><\/a> similaires. Pendant ce temps, apr\u00e8s avoir vol\u00e9 la photo, l&rsquo;application informerait l&rsquo;utilisateur qu&rsquo;il doit mettre \u00e0 niveau l&rsquo;application, au lieu de retourner une version filtr\u00e9e.<\/p>\n<p><strong>Les applications sont de plus en plus difficiles \u00e0 capturer.<\/strong><\/p>\n<p>Afin d&rsquo;\u00e9viter la d\u00e9tection, les hackers ont commenc\u00e9 \u00e0 utiliser des m\u00e9thodes plus complexes et furtives, telles que les archives de compression dans ce cas. Les archives de compression sont \u00e9galement connues sous le nom de Packers, ce qui rend les applications de plus en plus difficiles \u00e0 analyser. De plus, il est difficile pour l&rsquo;utilisateur de d\u00e9terminer quelle application est \u00e0 l&rsquo;origine des annonces \u00e9clair (pop-up).<\/p>\n<p>Ils sont \u00e9galement difficiles \u00e0 d\u00e9sinstaller, car ils cachent souvent l&rsquo;ic\u00f4ne de l&rsquo;application de la liste des applications sur les t\u00e9l\u00e9phones des utilisateurs.<\/p>\n<p>Le rapport indique \u00e9galement que la majorit\u00e9 des t\u00e9l\u00e9chargements ont apparemment eu lieu en Asie, en particulier en Inde. Les applications d&rsquo;\u00e9dition photo sont devenues populaires dans cette r\u00e9gion derni\u00e8rement, ce qui explique pourquoi les appareils de nombreux utilisateurs d&rsquo;Android du pays sont infect\u00e9s.<\/p>\n<p>Google a supprim\u00e9 les applications apr\u00e8s avoir re\u00e7u le rapport de Trend Micro. Toutefois, compte tenu du probl\u00e8me massif que <strong><u><a href=\"https:\/\/koddos.net\/blog\/9-more-android-apps-filled-with-adware-discovered-on-google-play-store\/\">Play Store<\/a><\/u><\/strong> a eu avec les applications malveillantes au cours des derni\u00e8res ann\u00e9es, il est probable qu&rsquo;il y en a beaucoup plus qui sont encore \u00e0 d\u00e9couvrir. Pour cette raison, il est conseill\u00e9 aux utilisateurs d&rsquo;Android de toujours v\u00e9rifier les \u00e9valuations des applications avant de t\u00e9l\u00e9charger toute application, et de rechercher des signes suspects.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Selon un rapport r\u00e9cent d&rsquo;une soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 Trend Micro, Google Play Store est confront\u00e9 \u00e0 un grand nombre d&rsquo;applications infect\u00e9es par des logiciels malveillants. La soci\u00e9t\u00e9 de s\u00e9curit\u00e9 a r\u00e9cemment signal\u00e9 la d\u00e9couverte de 29 autres applications malveillantes qui se faisaient passer pour des applications de \u00ab\u00a0cam\u00e9ras de beaut\u00e9\u00a0\u00bb. Avant que Google ne supprime &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">GOOGLE PLAY STORE BANNIT ENCORE UN AUTRE GROUPE D&rsquo;APPLICATIONS MALVEILLANTES<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":418,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-417","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GOOGLE PLAY STORE BANNIT ENCORE UN AUTRE GROUPE D&#039;APPLICATIONS MALVEILLANTES - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GOOGLE PLAY STORE BANNIT ENCORE UN AUTRE GROUPE D&#039;APPLICATIONS MALVEILLANTES - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Selon un rapport r\u00e9cent d&rsquo;une soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 Trend Micro, Google Play Store est confront\u00e9 \u00e0 un grand nombre d&rsquo;applications infect\u00e9es par des logiciels malveillants. La soci\u00e9t\u00e9 de s\u00e9curit\u00e9 a r\u00e9cemment signal\u00e9 la d\u00e9couverte de 29 autres applications malveillantes qui se faisaient passer pour des applications de \u00ab\u00a0cam\u00e9ras de beaut\u00e9\u00a0\u00bb. Avant que Google ne supprime &hellip; Continue reading GOOGLE PLAY STORE BANNIT ENCORE UN AUTRE GROUPE D&rsquo;APPLICATIONS MALVEILLANTES\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-05T19:05:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-02-06T06:13:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/02\/Hackers-Compromise-Millions-of-Android-Devices-to-Mine-Monero.jpg?fit=880%2C543&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"880\" \/>\n\t<meta property=\"og:image:height\" content=\"543\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"GOOGLE PLAY STORE BANNIT ENCORE UN AUTRE GROUPE D&rsquo;APPLICATIONS MALVEILLANTES\",\"datePublished\":\"2019-02-05T19:05:40+00:00\",\"dateModified\":\"2019-02-06T06:13:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\\\/\"},\"wordCount\":614,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Hackers-Compromise-Millions-of-Android-Devices-to-Mine-Monero.jpg?fit=880%2C543&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\\\/\",\"name\":\"GOOGLE PLAY STORE BANNIT ENCORE UN AUTRE GROUPE D'APPLICATIONS MALVEILLANTES - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Hackers-Compromise-Millions-of-Android-Devices-to-Mine-Monero.jpg?fit=880%2C543&ssl=1\",\"datePublished\":\"2019-02-05T19:05:40+00:00\",\"dateModified\":\"2019-02-06T06:13:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Hackers-Compromise-Millions-of-Android-Devices-to-Mine-Monero.jpg?fit=880%2C543&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Hackers-Compromise-Millions-of-Android-Devices-to-Mine-Monero.jpg?fit=880%2C543&ssl=1\",\"width\":880,\"height\":543},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GOOGLE PLAY STORE BANNIT ENCORE UN AUTRE GROUPE D&rsquo;APPLICATIONS MALVEILLANTES\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GOOGLE PLAY STORE BANNIT ENCORE UN AUTRE GROUPE D'APPLICATIONS MALVEILLANTES - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/","og_locale":"fr_FR","og_type":"article","og_title":"GOOGLE PLAY STORE BANNIT ENCORE UN AUTRE GROUPE D'APPLICATIONS MALVEILLANTES - Blog KoDDoS","og_description":"Selon un rapport r\u00e9cent d&rsquo;une soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 Trend Micro, Google Play Store est confront\u00e9 \u00e0 un grand nombre d&rsquo;applications infect\u00e9es par des logiciels malveillants. La soci\u00e9t\u00e9 de s\u00e9curit\u00e9 a r\u00e9cemment signal\u00e9 la d\u00e9couverte de 29 autres applications malveillantes qui se faisaient passer pour des applications de \u00ab\u00a0cam\u00e9ras de beaut\u00e9\u00a0\u00bb. Avant que Google ne supprime &hellip; Continue reading GOOGLE PLAY STORE BANNIT ENCORE UN AUTRE GROUPE D&rsquo;APPLICATIONS MALVEILLANTES","og_url":"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2019-02-05T19:05:40+00:00","article_modified_time":"2019-02-06T06:13:04+00:00","og_image":[{"width":880,"height":543,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/02\/Hackers-Compromise-Millions-of-Android-Devices-to-Mine-Monero.jpg?fit=880%2C543&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"GOOGLE PLAY STORE BANNIT ENCORE UN AUTRE GROUPE D&rsquo;APPLICATIONS MALVEILLANTES","datePublished":"2019-02-05T19:05:40+00:00","dateModified":"2019-02-06T06:13:04+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/"},"wordCount":614,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/02\/Hackers-Compromise-Millions-of-Android-Devices-to-Mine-Monero.jpg?fit=880%2C543&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/","url":"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/","name":"GOOGLE PLAY STORE BANNIT ENCORE UN AUTRE GROUPE D'APPLICATIONS MALVEILLANTES - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/02\/Hackers-Compromise-Millions-of-Android-Devices-to-Mine-Monero.jpg?fit=880%2C543&ssl=1","datePublished":"2019-02-05T19:05:40+00:00","dateModified":"2019-02-06T06:13:04+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/02\/Hackers-Compromise-Millions-of-Android-Devices-to-Mine-Monero.jpg?fit=880%2C543&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/02\/Hackers-Compromise-Millions-of-Android-Devices-to-Mine-Monero.jpg?fit=880%2C543&ssl=1","width":880,"height":543},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/google-play-store-bannit-encore-un-autre-groupe-dapplications-malveillantes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"GOOGLE PLAY STORE BANNIT ENCORE UN AUTRE GROUPE D&rsquo;APPLICATIONS MALVEILLANTES"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/02\/Hackers-Compromise-Millions-of-Android-Devices-to-Mine-Monero.jpg?fit=880%2C543&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-6J","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=417"}],"version-history":[{"count":2,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/417\/revisions"}],"predecessor-version":[{"id":420,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/417\/revisions\/420"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/418"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}