{"id":4236,"date":"2022-06-17T09:39:00","date_gmt":"2022-06-17T07:39:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=4236"},"modified":"2022-06-19T19:25:13","modified_gmt":"2022-06-19T17:25:13","slug":"le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/","title":{"rendered":"LE RANSOMWARE BLACKCAT D\u00c9PLOY\u00c9 SUR LES SERVEURS EXCHANGE NON CORRIG\u00c9S"},"content":{"rendered":"\n<p>Microsoft a mis en garde ses utilisateurs contre le ransomware BlackCat qui exploite une vuln\u00e9rabilit\u00e9 non corrig\u00e9e sur les serveurs Exchange. Le ransomware proc\u00e8de \u00e0 ces <strong><a href=\"https:\/\/blog.koddos.net\/researchers-discover-active-exploits-on-the-billquick-billing-server\/\">exploits<\/a><\/strong> pour cibler certains r\u00e9seaux.<\/p>\n\n\n\n<p><strong>BlackCat cible un serveur Exchange non corrig\u00e9<\/strong><\/p>\n\n\n\n<p>Une fois que ces attaquants ont obtenu un point d&rsquo;entr\u00e9e, ils s&#8217;empressent de recueillir des informations sur les machines touch\u00e9es. L&rsquo;\u00e9tape suivante consiste \u00e0 voler les informations d&rsquo;identification des utilisateurs et \u00e0 mener des activit\u00e9s de mouvement lat\u00e9ral. Les attaquants r\u00e9coltent ensuite la propri\u00e9t\u00e9 intellectuelle, puis d\u00e9posent la charge utile du ransomware.<\/p>\n\n\n\n<p>Ces \u00e9v\u00e9nements se sont produits en l&rsquo;espace de deux semaines. L&rsquo;\u00e9quipe Microsoft 365 Defender Threat Intelligence a publi\u00e9 cette semaine un <strong><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/06\/13\/the-many-lives-of-blackcat-ransomware\/\">rapport<\/a><\/strong> indiquant que des informations d&rsquo;identification compromises ont \u00e9t\u00e9 utilis\u00e9es pour se connecter aux comptes des utilisateurs.<\/p>\n\n\n\n<p>\u00ab\u00a0Dans un autre incident que nous avons observ\u00e9, nous avons constat\u00e9 qu&rsquo;un affili\u00e9 de l\u2019attaquant de ransomware a obtenu un acc\u00e8s initial \u00e0 l&rsquo;environnement via un serveur Remote Desktop orient\u00e9 Internet en utilisant des informations d&rsquo;identification compromises pour se connecter\u00a0\u00bb, ont ajout\u00e9 les chercheurs. Ils ont \u00e9galement not\u00e9 comment les d\u00e9ploiements peuvent diff\u00e9rer bien qu&rsquo;ils soient men\u00e9s par le m\u00eame attaquant.<\/p>\n\n\n\n<p>BlackCat est l&rsquo;une des plus r\u00e9centes entr\u00e9es dans l&rsquo;espace des ransomwares. Ce ransomware porte \u00e9galement d&rsquo;autres noms comme Noberus et ALPHV. Il est \u00e9galement consid\u00e9r\u00e9 comme le premier ransomware multiplateforme \u00e9crit en Rust. Cela illustre une tendance croissante des acteurs de menaces \u00e0 se tourner vers des langages de programmation impopulaires pour \u00e9viter d&rsquo;\u00eatre d\u00e9tect\u00e9s.<\/p>\n\n\n\n<p>Le programme de ransomware-as-a-service (RaaS) fonctionne de diff\u00e9rentes mani\u00e8res malgr\u00e9 les vecteurs d&rsquo;acc\u00e8s initiaux qui ont \u00e9t\u00e9 publi\u00e9s. Le programme fonctionne en exfiltrant et en <strong><a href=\"https:\/\/blog.koddos.net\/more-organizations-are-attacked-via-operational-technology-data-researchers-warn\/\">cryptant les donn\u00e9es<\/a><\/strong> qui ont fait l&rsquo;objet d&rsquo;une demande de ran\u00e7on afin de r\u00e9aliser une double extorsion. Cette strat\u00e9gie a entra\u00een\u00e9 une perte de donn\u00e9es consid\u00e9rable pour les personnes et les entreprises cibl\u00e9es.<\/p>\n\n\n\n<p>Le programme RaaS est devenu tr\u00e8s lucratif pour le monde cybercriminel. Le mod\u00e8le est recherch\u00e9 par les individus qui cherchent \u00e0 obtenir un maximum de b\u00e9n\u00e9fices \u00e9conomiques. Le mod\u00e8le se compose de trois acteurs cl\u00e9s.<\/p>\n\n\n\n<p>Les acteurs impliqu\u00e9s dans le dispositif sont les courtiers d&rsquo;acc\u00e8s (IAB) charg\u00e9s de compromettre le r\u00e9seau et de maintenir la persistance. Les op\u00e9rateurs travaillent en d\u00e9veloppant et en maintenant les op\u00e9rations de ransomware, tandis que les affili\u00e9s qui ach\u00e8tent l&rsquo;acc\u00e8s aux IAB l&rsquo;utilisent pour d\u00e9ployer la charge utile.<\/p>\n\n\n\n<p><strong>BlackCat est une menace croissante<\/strong><\/p>\n\n\n\n<p>Le Federal Bureau of Investigations (FBI) des \u00c9tats-Unis a r\u00e9cemment publi\u00e9 une alerte concernant des attaques par ransomware utilisant le ransomware BlackCat. Ces attaques ont vis\u00e9 une soixantaine d&rsquo;institutions dans le monde. Le ransomware est utilis\u00e9 depuis mars 2022 et a \u00e9t\u00e9 rep\u00e9r\u00e9 pour la premi\u00e8re fois en novembre 2021.<\/p>\n\n\n\n<p>Microsoft ajoute que \u00ab\u00a0deux des groupes d&rsquo;acteurs de menaces les plus prolifiques\u00a0\u00bb ont utilis\u00e9 ce ransomware. Parmi les familles de ransomware qui ont d\u00e9ploy\u00e9 BlackCat figurent Conti, Hive, LockBit 2.0 et REvil.<\/p>\n\n\n\n<p>L&rsquo;autre groupe de hackers notoire qui d\u00e9ploie le logiciel malveillant est DEV-0237. Ce groupe porte \u00e9galement le nom de FIN12, qui a \u00e9t\u00e9 vu pour la derni\u00e8re fois op\u00e9rant dans le secteur de la sant\u00e9 en octobre 2021. DEV-0504 a aussi \u00e9t\u00e9 trouv\u00e9 en train d&rsquo;utiliser le logiciel malveillant, et cet acteur de la menace est actif depuis 2020.<\/p>\n\n\n\n<p>DEX-0504 est proactif et ne s&rsquo;appuie pas enti\u00e8rement sur le syst\u00e8me RaaS. Son comportement montre qu&rsquo;apr\u00e8s l&rsquo;arr\u00eat du mod\u00e8le RaaS, il se tourne vers le d\u00e9placement des charges utiles. Cela montre l&rsquo;agressivit\u00e9 de l&rsquo;acteur dans le maintien des <strong><a href=\"https:\/\/blog.koddos.net\/ransomware-hackers-could-launch-ransomware-attacks-using-a-microsoft-365-feature\/\">attaques de ransomware<\/a><\/strong>.<\/p>\n\n\n\n<p>Le mois dernier, Microsoft a publi\u00e9 un rapport sur cet acteur malveillant, <strong><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/05\/09\/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself\/#DEV-0504\">indiquant<\/a><\/strong> que \u00ab\u00a0DEV-0504 \u00e9tait responsable du d\u00e9ploiement du ransomware BlackCat dans des entreprises du secteur de l&rsquo;\u00e9nergie en janvier 2022. \u00c0 peu pr\u00e8s au m\u00eame moment, DEV-0504 a \u00e9galement d\u00e9ploy\u00e9 BlackCat dans des attaques contre des entreprises de mode, de tabac, d&rsquo;informatique et de fabrication, entre autres.\u00a0\u00bb<\/p>\n\n\n\n<p>Ces observations illustrent l&rsquo;agressivit\u00e9 des groupes de ransomware qui ciblent les particuliers et les entreprises. Les rapports montrent que les acteurs affili\u00e9s ont pris le train en marche du RaaS pour mon\u00e9tiser leurs attaques. Le mod\u00e8le s&rsquo;est av\u00e9r\u00e9 lucratif pour les groupes de ransomware op\u00e9rant \u00e0 partir de motivations financi\u00e8res.<\/p>\n\n\n\n<p>Ces acteurs de la menace ont \u00e9galement adopt\u00e9 diff\u00e9rentes \u00e9tapes pr\u00e9alables \u00e0 la ran\u00e7on pour ex\u00e9cuter la charge utile du ransomware. La charge utile est d\u00e9ploy\u00e9e dans le r\u00e9seau de l&rsquo;organisation cibl\u00e9e. Le ransomware pr\u00e9sente \u00e9galement des risques majeurs pour les approches de d\u00e9fense conventionnelles qui ont \u00e9t\u00e9 adopt\u00e9es par certaines organisations.<\/p>\n\n\n\n<p>Les chercheurs ont par ailleurs ajout\u00e9 qu&rsquo;une vigilance accrue \u00e9tait n\u00e9cessaire pour suivre les activit\u00e9s des groupes de ransomware. Ces groupes ont continu\u00e9 \u00e0 faire des ravages dans les organisations et les h\u00e9ritages qui ne mettent pas en \u0153uvre les meilleures pratiques Internet en changeant continuellement de tactique.<\/p>\n\n\n\n<p>\u00ab\u00a0La d\u00e9tection de menaces comme BlackCat, bien que bonne, n&rsquo;est plus suffisante car les ransomwares op\u00e9r\u00e9s par des humains ont continu\u00e9 \u00e0 cro\u00eetre, \u00e0 \u00e9voluer, \u00e0 s&rsquo;adapter aux r\u00e9seaux qu&rsquo;ils d\u00e9ploient ou aux attaquants pour lesquels ils travaillent. Ces types d&rsquo;attaques continuent de tirer parti de la mauvaise hygi\u00e8ne des informations d&rsquo;identification d&rsquo;une organisation et de ses anciennes configurations ou de ses mauvaises configurations pour r\u00e9ussir\u00a0\u00bb, ajoutent les chercheurs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft a mis en garde ses utilisateurs contre le ransomware BlackCat qui exploite une vuln\u00e9rabilit\u00e9 non corrig\u00e9e sur les serveurs Exchange. Le ransomware proc\u00e8de \u00e0 ces exploits pour cibler certains r\u00e9seaux. BlackCat cible un serveur Exchange non corrig\u00e9 Une fois que ces attaquants ont obtenu un point d&rsquo;entr\u00e9e, ils s&#8217;empressent de recueillir des informations sur &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LE RANSOMWARE BLACKCAT D\u00c9PLOY\u00c9 SUR LES SERVEURS EXCHANGE NON CORRIG\u00c9S<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":4237,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-4236","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LE RANSOMWARE BLACKCAT D\u00c9PLOY\u00c9 SUR LES SERVEURS EXCHANGE NON CORRIG\u00c9S - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LE RANSOMWARE BLACKCAT D\u00c9PLOY\u00c9 SUR LES SERVEURS EXCHANGE NON CORRIG\u00c9S - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Microsoft a mis en garde ses utilisateurs contre le ransomware BlackCat qui exploite une vuln\u00e9rabilit\u00e9 non corrig\u00e9e sur les serveurs Exchange. Le ransomware proc\u00e8de \u00e0 ces exploits pour cibler certains r\u00e9seaux. BlackCat cible un serveur Exchange non corrig\u00e9 Une fois que ces attaquants ont obtenu un point d&rsquo;entr\u00e9e, ils s&#8217;empressent de recueillir des informations sur &hellip; Continue reading LE RANSOMWARE BLACKCAT D\u00c9PLOY\u00c9 SUR LES SERVEURS EXCHANGE NON CORRIG\u00c9S\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-17T07:39:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-19T17:25:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2022\/06\/BlackCat-ransomware-deployed-on-unpatched-Exchange-servers.webp?fit=640%2C426&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LE RANSOMWARE BLACKCAT D\u00c9PLOY\u00c9 SUR LES SERVEURS EXCHANGE NON CORRIG\u00c9S\",\"datePublished\":\"2022-06-17T07:39:00+00:00\",\"dateModified\":\"2022-06-19T17:25:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\\\/\"},\"wordCount\":982,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/BlackCat-ransomware-deployed-on-unpatched-Exchange-servers.webp?fit=640%2C426&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\\\/\",\"name\":\"LE RANSOMWARE BLACKCAT D\u00c9PLOY\u00c9 SUR LES SERVEURS EXCHANGE NON CORRIG\u00c9S - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/BlackCat-ransomware-deployed-on-unpatched-Exchange-servers.webp?fit=640%2C426&ssl=1\",\"datePublished\":\"2022-06-17T07:39:00+00:00\",\"dateModified\":\"2022-06-19T17:25:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/BlackCat-ransomware-deployed-on-unpatched-Exchange-servers.webp?fit=640%2C426&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/BlackCat-ransomware-deployed-on-unpatched-Exchange-servers.webp?fit=640%2C426&ssl=1\",\"width\":640,\"height\":426},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LE RANSOMWARE BLACKCAT D\u00c9PLOY\u00c9 SUR LES SERVEURS EXCHANGE NON CORRIG\u00c9S\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LE RANSOMWARE BLACKCAT D\u00c9PLOY\u00c9 SUR LES SERVEURS EXCHANGE NON CORRIG\u00c9S - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/","og_locale":"fr_FR","og_type":"article","og_title":"LE RANSOMWARE BLACKCAT D\u00c9PLOY\u00c9 SUR LES SERVEURS EXCHANGE NON CORRIG\u00c9S - Blog KoDDoS","og_description":"Microsoft a mis en garde ses utilisateurs contre le ransomware BlackCat qui exploite une vuln\u00e9rabilit\u00e9 non corrig\u00e9e sur les serveurs Exchange. Le ransomware proc\u00e8de \u00e0 ces exploits pour cibler certains r\u00e9seaux. BlackCat cible un serveur Exchange non corrig\u00e9 Une fois que ces attaquants ont obtenu un point d&rsquo;entr\u00e9e, ils s&#8217;empressent de recueillir des informations sur &hellip; Continue reading LE RANSOMWARE BLACKCAT D\u00c9PLOY\u00c9 SUR LES SERVEURS EXCHANGE NON CORRIG\u00c9S","og_url":"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2022-06-17T07:39:00+00:00","article_modified_time":"2022-06-19T17:25:13+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2022\/06\/BlackCat-ransomware-deployed-on-unpatched-Exchange-servers.webp?fit=640%2C426&ssl=1","type":"image\/webp"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LE RANSOMWARE BLACKCAT D\u00c9PLOY\u00c9 SUR LES SERVEURS EXCHANGE NON CORRIG\u00c9S","datePublished":"2022-06-17T07:39:00+00:00","dateModified":"2022-06-19T17:25:13+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/"},"wordCount":982,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2022\/06\/BlackCat-ransomware-deployed-on-unpatched-Exchange-servers.webp?fit=640%2C426&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/","url":"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/","name":"LE RANSOMWARE BLACKCAT D\u00c9PLOY\u00c9 SUR LES SERVEURS EXCHANGE NON CORRIG\u00c9S - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2022\/06\/BlackCat-ransomware-deployed-on-unpatched-Exchange-servers.webp?fit=640%2C426&ssl=1","datePublished":"2022-06-17T07:39:00+00:00","dateModified":"2022-06-19T17:25:13+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2022\/06\/BlackCat-ransomware-deployed-on-unpatched-Exchange-servers.webp?fit=640%2C426&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2022\/06\/BlackCat-ransomware-deployed-on-unpatched-Exchange-servers.webp?fit=640%2C426&ssl=1","width":640,"height":426},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/le-ransomware-blackcat-deploye-sur-les-serveurs-exchange-non-corriges\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LE RANSOMWARE BLACKCAT D\u00c9PLOY\u00c9 SUR LES SERVEURS EXCHANGE NON CORRIG\u00c9S"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2022\/06\/BlackCat-ransomware-deployed-on-unpatched-Exchange-servers.webp?fit=640%2C426&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-16k","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/4236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=4236"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/4236\/revisions"}],"predecessor-version":[{"id":4238,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/4236\/revisions\/4238"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/4237"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=4236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=4236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=4236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}