{"id":4288,"date":"2022-07-08T08:47:00","date_gmt":"2022-07-08T06:47:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=4288"},"modified":"2022-07-10T19:59:05","modified_gmt":"2022-07-10T17:59:05","slug":"le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/","title":{"rendered":"LE HACKER QUI A VOL\u00c9 9,6 MILLIONS DE DOLLARS AU PROTOCOLE CREMA REND 8 MILLIONS DE DOLLARS"},"content":{"rendered":"\n<p>Le hacker de Crema qui a vol\u00e9 9,6 millions de dollars en crypto-monnaies <strong><a href=\"https:\/\/www.coindesk.com\/tech\/2022\/07\/07\/crema-finance-attacker-returns-almost-8m-keeps-17m-bounty\/\">a rendu<\/a><\/strong> 8 millions de dollars des fonds et a gard\u00e9 1,6 million de dollars selon l&rsquo;accord avec le protocole. Les 45 455 Solana (SOL) du hacker repr\u00e9sentent 16,7 % de la totalit\u00e9 des fonds vol\u00e9s. L&rsquo;attaque a eu lieu le 2 juillet et a contraint le protocole Crema \u00e0 fermer son service.<\/p>\n\n\n\n<p>L&rsquo;\u00e9quipe de s\u00e9curit\u00e9 de Crema a commenc\u00e9 \u00e0 enqu\u00eater sur l&rsquo;<strong><a href=\"https:\/\/blog.koddos.net\/okta-says-it-was-wrong-with-approach-to-the-lapsus-hacking-incident\/\">incident de piratage<\/a><\/strong> afin de trouver un accord et de r\u00e9cup\u00e9rer les fonds aupr\u00e8s du hacker.<\/p>\n\n\n\n<p><strong>Le hacker conserve 45 455 SOL comme prime de White hat<\/strong><\/p>\n\n\n\n<p>L&rsquo;\u00e9quipe Crema a commenc\u00e9 \u00e0 enqu\u00eater sur le hacker apr\u00e8s avoir surveill\u00e9 son accord Discord et l&rsquo;alimentation principale en gaz de l&rsquo;adresse du hacker. Bien que l&rsquo;\u00e9quipe ait \u00e9t\u00e9 sur le point de d\u00e9couvrir sa v\u00e9ritable identit\u00e9, elle a d\u00e9clar\u00e9 qu&rsquo;elle \u00e9tait en train de n\u00e9gocier avec l&rsquo;auteur du vol.<\/p>\n\n\n\n<p>Apr\u00e8s les n\u00e9gociations, le 6 juillet, le hacker a lib\u00e9r\u00e9 23 967 SOL et 6 064 ETH, les deux \u00e9tant \u00e9valu\u00e9s \u00e0 environ 8 millions de dollars. \u00ab\u00a0Apr\u00e8s une longue n\u00e9gociation, le hacker a accept\u00e9 de prendre 45455 SOL comme prime de white hat\u00a0\u00bb, a tweet\u00e9 CremaFinance.<\/p>\n\n\n\n<p>Les fonds vol\u00e9s ont \u00e9t\u00e9 envoy\u00e9s par le hacker dans une s\u00e9rie de transactions sur les r\u00e9seaux Solana et Ethereum. Un petit nombre de pi\u00e8ces a \u00e9t\u00e9 utilis\u00e9 pour v\u00e9rifier la premi\u00e8re transaction.<\/p>\n\n\n\n<p><strong>L&rsquo;attaquant de Crema a contract\u00e9 un pr\u00eat \u00e0 terme<\/strong><\/p>\n\n\n\n<p>La soci\u00e9t\u00e9 a d\u00e9clar\u00e9 que les fonds retourn\u00e9s ont \u00e9t\u00e9 s\u00e9curis\u00e9s. Elle a toutefois not\u00e9 qu&rsquo;avant l&rsquo;attaque, l&rsquo;\u00e9quipe avait soumis \u00e0 nouveau un nouveau code pour audit, ce qui garantit que la m\u00eame vuln\u00e9rabilit\u00e9 ne sera pas d\u00e9couverte \u00e0 nouveau.<\/p>\n\n\n\n<p>Alors que la communaut\u00e9 Crema attendait des nouvelles de l&rsquo;attaque, le personnel a d\u00e9clar\u00e9 sur Twitter que l&rsquo;attaquant avait contract\u00e9 un pr\u00eat \u00e0 terme dans le protocole de pr\u00eat Solend DeFi. Ceci a \u00e9t\u00e9 inclus comme liquidit\u00e9 sur le pool de Crema.<\/p>\n\n\n\n<p>Les d\u00e9veloppeurs du protocole Crema avaient assur\u00e9 aux membres qu&rsquo;ils publieraient dans les 48 heures un plan de compensation pour les utilisateurs qui ont \u00e9t\u00e9 affect\u00e9s par la violation.<\/p>\n\n\n\n<p><strong>Les hackers s&rsquo;int\u00e9ressent de plus en plus aux protocoles DeFi<\/strong><\/p>\n\n\n\n<p>L&rsquo;attaque contre le protocole Crema est l&rsquo;une des nombreuses attaques men\u00e9es cette ann\u00e9e contre les plateformes de <strong><a href=\"https:\/\/blog.koddos.net\/hackers-steal-1-26-million-worth-of-crypto-from-inverse-finance\/\">finance d\u00e9centralis\u00e9e<\/a><\/strong> (DeFi). Elles attirent les hackers en raison de la nature anonyme de ces plateformes, qui permettent aux utilisateurs de contracter des pr\u00eats.<\/p>\n\n\n\n<p>Le protocole Crema permet aux fournisseurs de liquidit\u00e9s de d\u00e9finir des fourchettes de prix sp\u00e9cifiques, d&rsquo;ex\u00e9cuter des ordres de fourchette et d&rsquo;ajouter des liquidit\u00e9s unilat\u00e9rales. Il ouvre la voie \u00e0 un syst\u00e8me de n\u00e9gociation d\u00e9centralis\u00e9 et sophistiqu\u00e9, mais il n&rsquo;a pas emp\u00each\u00e9 les hackers d&rsquo;explorer de tels syst\u00e8mes. Bien qu&rsquo;ils soient traditionnellement construits avec une forte s\u00e9curit\u00e9 pour garder les fonds en s\u00e9curit\u00e9, les acteurs de la menace pourraient trouver des vuln\u00e9rabilit\u00e9s qu&rsquo;ils peuvent explorer, ce qui met les fonds en danger.<\/p>\n\n\n\n<p>La vuln\u00e9rabilit\u00e9 a permis \u00e0 l&rsquo;acteur de la menace de cr\u00e9er un faux compte tick sur Crema. Il s&rsquo;agit d&rsquo;un compte d\u00e9di\u00e9 qui stocke les donn\u00e9es de tick de prix dans CLMM. Une fois le faux compte cr\u00e9\u00e9, l&rsquo;acteur de la menace a exploit\u00e9 une commande en contournant les mesures de s\u00e9curit\u00e9 et en \u00e9crivant les donn\u00e9es sur le faux compte. Apr\u00e8s que le hacker ait r\u00e9ussi \u00e0 esquiver le syst\u00e8me de s\u00e9curit\u00e9 mis en place, il a utilis\u00e9 un pr\u00eat flash pour manipuler les prix des actifs sur les pools de liquidit\u00e9. En cons\u00e9quence, cela a permis \u00e0 l&rsquo;acteur de la menace de r\u00e9clamer un montant important du pool.<\/p>\n\n\n\n<p><strong>Les utilisateurs touch\u00e9s seront contact\u00e9s avec le plan de compensation le 8 juillet<\/strong><\/p>\n\n\n\n<p>Les d\u00e9veloppeurs de Crema ont admis que ce fut une journ\u00e9e difficile pour la plateforme de d\u00e9couvrir qu&rsquo;un hold-up de cryptomonnaies a eu lieu sur le protocole. Les d\u00e9veloppeurs n&rsquo;ont pas h\u00e9sit\u00e9 \u00e0 partager les d\u00e9tails de ce qui a mal tourn\u00e9 et comment les attaquants ont pu r\u00e9ussir. La plateforme a assur\u00e9 aux utilisateurs que toutes les informations partag\u00e9es avec eux concernant la situation sont exactes et transparentes.<\/p>\n\n\n\n<p>La soci\u00e9t\u00e9 a ajout\u00e9 que le protocole Crema sera restaur\u00e9 et lanc\u00e9 apr\u00e8s la fin de l&rsquo;enqu\u00eate et de l&rsquo;audit. L&rsquo;\u00e9quipe indique qu&rsquo;elle publiera le plan de compensation pour tous les utilisateurs affect\u00e9s le 8 juillet.<\/p>\n\n\n\n<p>L&rsquo;\u00e9quipe a \u00e9galement soumis une nouvelle base de code car elle pr\u00e9voit de renforcer son infrastructure de s\u00e9curit\u00e9 afin d&rsquo;\u00e9viter une nouvelle attaque contre le protocole. \u00ab\u00a0Le protocole Crema sera de nouveau op\u00e9rationnel d\u00e8s que le nouvel audit sera termin\u00e9\u00a0\u00bb, a d\u00e9clar\u00e9 l&rsquo;entreprise.<\/p>\n\n\n\n<p>Crema serait heureux de n\u00e9gocier avec le hacker le retour de la plupart des fonds cryptographiques vol\u00e9s, \u00e9tant donn\u00e9 que plusieurs autres protocoles victimes n&rsquo;ont pas eu cette chance. Dans la plupart des cas, une fois les fonds vol\u00e9s, il y a peu d&rsquo;espoir de les r\u00e9cup\u00e9rer. Plus t\u00f4t cette ann\u00e9e, lorsqu&rsquo;un autre protocole DeFi, Harmoney, a \u00e9t\u00e9 victime d&rsquo;un vol de crypto-monnaies de 10 millions de dollars, le hacker a refus\u00e9 d&rsquo;accepter la prime d&rsquo;un million de dollars offerte par la plateforme.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le hacker de Crema qui a vol\u00e9 9,6 millions de dollars en crypto-monnaies a rendu 8 millions de dollars des fonds et a gard\u00e9 1,6 million de dollars selon l&rsquo;accord avec le protocole. Les 45 455 Solana (SOL) du hacker repr\u00e9sentent 16,7 % de la totalit\u00e9 des fonds vol\u00e9s. L&rsquo;attaque a eu lieu le 2 &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LE HACKER QUI A VOL\u00c9 9,6 MILLIONS DE DOLLARS AU PROTOCOLE CREMA REND 8 MILLIONS DE DOLLARS<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":4289,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-4288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LE HACKER QUI A VOL\u00c9 9,6 MILLIONS DE DOLLARS AU PROTOCOLE CREMA REND 8 MILLIONS DE DOLLARS - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LE HACKER QUI A VOL\u00c9 9,6 MILLIONS DE DOLLARS AU PROTOCOLE CREMA REND 8 MILLIONS DE DOLLARS - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Le hacker de Crema qui a vol\u00e9 9,6 millions de dollars en crypto-monnaies a rendu 8 millions de dollars des fonds et a gard\u00e9 1,6 million de dollars selon l&rsquo;accord avec le protocole. Les 45 455 Solana (SOL) du hacker repr\u00e9sentent 16,7 % de la totalit\u00e9 des fonds vol\u00e9s. L&rsquo;attaque a eu lieu le 2 &hellip; Continue reading LE HACKER QUI A VOL\u00c9 9,6 MILLIONS DE DOLLARS AU PROTOCOLE CREMA REND 8 MILLIONS DE DOLLARS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-08T06:47:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-10T17:59:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fr.koddos.net\/blog\/wp-content\/uploads\/2022\/07\/Ransomware-hackers-could-launch-ransomware-attacks-using-a-Microsoft-365-feature.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LE HACKER QUI A VOL\u00c9 9,6 MILLIONS DE DOLLARS AU PROTOCOLE CREMA REND 8 MILLIONS DE DOLLARS\",\"datePublished\":\"2022-07-08T06:47:00+00:00\",\"dateModified\":\"2022-07-10T17:59:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\\\/\"},\"wordCount\":967,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Ransomware-hackers-could-launch-ransomware-attacks-using-a-Microsoft-365-feature.webp?fit=640%2C400&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\\\/\",\"name\":\"LE HACKER QUI A VOL\u00c9 9,6 MILLIONS DE DOLLARS AU PROTOCOLE CREMA REND 8 MILLIONS DE DOLLARS - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Ransomware-hackers-could-launch-ransomware-attacks-using-a-Microsoft-365-feature.webp?fit=640%2C400&ssl=1\",\"datePublished\":\"2022-07-08T06:47:00+00:00\",\"dateModified\":\"2022-07-10T17:59:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Ransomware-hackers-could-launch-ransomware-attacks-using-a-Microsoft-365-feature.webp?fit=640%2C400&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Ransomware-hackers-could-launch-ransomware-attacks-using-a-Microsoft-365-feature.webp?fit=640%2C400&ssl=1\",\"width\":640,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LE HACKER QUI A VOL\u00c9 9,6 MILLIONS DE DOLLARS AU PROTOCOLE CREMA REND 8 MILLIONS DE DOLLARS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LE HACKER QUI A VOL\u00c9 9,6 MILLIONS DE DOLLARS AU PROTOCOLE CREMA REND 8 MILLIONS DE DOLLARS - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/","og_locale":"fr_FR","og_type":"article","og_title":"LE HACKER QUI A VOL\u00c9 9,6 MILLIONS DE DOLLARS AU PROTOCOLE CREMA REND 8 MILLIONS DE DOLLARS - Blog KoDDoS","og_description":"Le hacker de Crema qui a vol\u00e9 9,6 millions de dollars en crypto-monnaies a rendu 8 millions de dollars des fonds et a gard\u00e9 1,6 million de dollars selon l&rsquo;accord avec le protocole. Les 45 455 Solana (SOL) du hacker repr\u00e9sentent 16,7 % de la totalit\u00e9 des fonds vol\u00e9s. L&rsquo;attaque a eu lieu le 2 &hellip; Continue reading LE HACKER QUI A VOL\u00c9 9,6 MILLIONS DE DOLLARS AU PROTOCOLE CREMA REND 8 MILLIONS DE DOLLARS","og_url":"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2022-07-08T06:47:00+00:00","article_modified_time":"2022-07-10T17:59:05+00:00","og_image":[{"width":640,"height":400,"url":"https:\/\/fr.koddos.net\/blog\/wp-content\/uploads\/2022\/07\/Ransomware-hackers-could-launch-ransomware-attacks-using-a-Microsoft-365-feature.webp","type":"image\/webp"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LE HACKER QUI A VOL\u00c9 9,6 MILLIONS DE DOLLARS AU PROTOCOLE CREMA REND 8 MILLIONS DE DOLLARS","datePublished":"2022-07-08T06:47:00+00:00","dateModified":"2022-07-10T17:59:05+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/"},"wordCount":967,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2022\/07\/Ransomware-hackers-could-launch-ransomware-attacks-using-a-Microsoft-365-feature.webp?fit=640%2C400&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/","url":"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/","name":"LE HACKER QUI A VOL\u00c9 9,6 MILLIONS DE DOLLARS AU PROTOCOLE CREMA REND 8 MILLIONS DE DOLLARS - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2022\/07\/Ransomware-hackers-could-launch-ransomware-attacks-using-a-Microsoft-365-feature.webp?fit=640%2C400&ssl=1","datePublished":"2022-07-08T06:47:00+00:00","dateModified":"2022-07-10T17:59:05+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2022\/07\/Ransomware-hackers-could-launch-ransomware-attacks-using-a-Microsoft-365-feature.webp?fit=640%2C400&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2022\/07\/Ransomware-hackers-could-launch-ransomware-attacks-using-a-Microsoft-365-feature.webp?fit=640%2C400&ssl=1","width":640,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/le-hacker-qui-a-vole-96-millions-de-dollars-au-protocole-crema-rend-8-millions-de-dollars\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LE HACKER QUI A VOL\u00c9 9,6 MILLIONS DE DOLLARS AU PROTOCOLE CREMA REND 8 MILLIONS DE DOLLARS"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2022\/07\/Ransomware-hackers-could-launch-ransomware-attacks-using-a-Microsoft-365-feature.webp?fit=640%2C400&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-17a","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/4288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=4288"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/4288\/revisions"}],"predecessor-version":[{"id":4290,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/4288\/revisions\/4290"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/4289"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=4288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=4288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=4288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}