{"id":5310,"date":"2020-06-17T19:03:00","date_gmt":"2020-06-17T17:03:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=5310"},"modified":"2023-08-27T19:10:35","modified_gmt":"2023-08-27T17:10:35","slug":"des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/","title":{"rendered":"DES OUTILS DE PIRATAGE ULTRASECRETS DE LA CIA VOL\u00c9S EN RAISON D&rsquo;UNE CYBERS\u00c9CURIT\u00c9 LAXISTE"},"content":{"rendered":"\n<p>Un <strong><a href=\"https:\/\/www.nbcnews.com\/politics\/national-security\/alleged-theft-cia-hacking-tools-cia-officer-exposed-woefully-lax-n1231159\">rapport r\u00e9cent<\/a><\/strong> r\u00e9v\u00e8le que le vol d&rsquo;un outil de piratage sophistiqu\u00e9 de la CIA s&rsquo;est produit en raison de mesures de s\u00e9curit\u00e9 insuffisantes. Le rapport r\u00e9v\u00e8le que la CIA n&rsquo;a pas fait de son mieux pour prot\u00e9ger ses op\u00e9rations et que l&rsquo;agence n&rsquo;a pas r\u00e9agi rapidement lorsque les secrets ont \u00e9t\u00e9 <strong><a href=\"https:\/\/blog.koddos.net\/hackers-want-to-use-stolen-data-from-coinsquare-exchange-for-sim-swap\/\">vol\u00e9s<\/a><\/strong>.<\/p>\n\n\n\n<p>Un task force sur la s\u00e9curit\u00e9 a d\u00e9couvert que l&rsquo;agence aurait pu fournir une meilleure s\u00e9curit\u00e9 pour prot\u00e9ger les outils de piratage qui ont \u00e9t\u00e9 vol\u00e9s lors d&rsquo;une violation importante et remis \u00e0 WikiLeaks.<\/p>\n\n\n\n<p>La fuite aurait \u00e9t\u00e9 orchestr\u00e9e par un ancien employ\u00e9 de la CIA en 2016, mais elle a \u00e9t\u00e9 d\u00e9couverte un an plus tard lorsque le groupe anti-secrets WikiLeaks a publi\u00e9 les d\u00e9tails de la faille.<\/p>\n\n\n\n<p><strong>La faille a expos\u00e9 les secrets de l&rsquo;agence<\/strong><\/p>\n\n\n\n<p>WikiLeak a appel\u00e9 la faille \u00ab<strong><a href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2017\/03\/07\/why-the-cia-is-using-your-tvs-smartphones-and-cars-for-spying\/?itid=lk_inline_manual_3\">Vault.7<\/a><\/strong>\u00bb, les autorit\u00e9s Am\u00e9ricaines ayant confirm\u00e9 qu&rsquo;il s&rsquo;agissait de la plus importante perte de donn\u00e9es de l&rsquo;histoire de l&rsquo;agence.<\/p>\n\n\n\n<p><strong><s><a href=\"https:\/\/www.newsbreak.com\/news\/0PMEPiYj\/multiple-cia-failures-led-to-theft-of-agencys-top-secret-hacking-tools\">La violation<\/a><\/s><\/strong> a affect\u00e9 le r\u00e9seau de la CIA qui a d\u00fb interrompre certaines op\u00e9rations de renseignement et a alert\u00e9 des adversaires \u00e9trangers sur les techniques d&rsquo;espionnage de l&rsquo;agence.<\/p>\n\n\n\n<p>Vault 7 a r\u00e9v\u00e9l\u00e9 une s\u00e9rie de secrets parmi les mieux gard\u00e9s de la CIA, y compris certaines op\u00e9rations de piratage de l&rsquo;agence.<\/p>\n\n\n\n<p>La violation concerne notamment des attaques qui ont compromis des Mac et des lignes de commande simples que les agents de la CIA utilisaient pour pirater des commutateurs de r\u00e9seau de Cisco. Il comprenait \u00e9galement des informations sur un <strong><a href=\"https:\/\/blog.koddos.net\/anonymous-hacking-group-threatens-minneapolis-police-in-new-video\/\">groupe de hackers<\/a><\/strong> que l&rsquo;agence suivait depuis 2011.<\/p>\n\n\n\n<p><strong>Laxisme en mati\u00e8re de s\u00e9curit\u00e9<\/strong><\/p>\n\n\n\n<p>Les responsables de la CIA ont ensuite demand\u00e9 au task force WikiLeaks d&rsquo;enqu\u00eater sur les causes de cette importante fuite de donn\u00e9es. Sept mois apr\u00e8s sa cr\u00e9ation, la task force a pr\u00e9sent\u00e9 un rapport sur les causes et l&rsquo;impact des dommages.<\/p>\n\n\n\n<p>La principale conclusion du rapport concerne la culture au sein de la plateforme de piratage de la CIA, appel\u00e9e Center for Cyber Intelligence (CCI). Le groupe de renseignement a accord\u00e9 moins d&rsquo;attention \u00e0 la s\u00e9curit\u00e9 des cybercapacit\u00e9s et s&rsquo;est davantage concentr\u00e9 sur leur prolif\u00e9ration.<\/p>\n\n\n\n<p>Le rapport r\u00e9v\u00e8le que le laxisme quotidien en mati\u00e8re de s\u00e9curit\u00e9 est devenu \u00e9pouvantable. \u00ab\u00a0Les pratiques de s\u00e9curit\u00e9 quotidiennes sont devenues lamentablement laxistes\u00a0\u00bb, a d\u00e9clar\u00e9 le rapport lundi.<\/p>\n\n\n\n<p>Le rapport explique que l&rsquo;ICC a donn\u00e9 la priorit\u00e9 \u00e0 la construction de cyberarmes sans faire beaucoup d&rsquo;efforts pour s\u00e9curiser ses outils d&rsquo;espionnage de donn\u00e9es. Ces lacunes sont le r\u00e9sultat d&rsquo;un comportement de longue date consistant \u00e0 privil\u00e9gier la collaboration et la cr\u00e9ativit\u00e9 au d\u00e9triment de la s\u00e9curit\u00e9. Le mauvais choix de priorit\u00e9 est \u00e0 l&rsquo;origine du plus grand vol de donn\u00e9es de l&rsquo;histoire de l&rsquo;agence, poursuit le rapport.<\/p>\n\n\n\n<p><strong>De multiples lacunes sont \u00e0 l&rsquo;origine d&rsquo;un vol de donn\u00e9es r\u00e9ussi<\/strong><\/p>\n\n\n\n<p>Le task force a r\u00e9v\u00e9l\u00e9 que la porosit\u00e9 de la s\u00e9curit\u00e9 dans la conception du syst\u00e8me \u00e9tait l&rsquo;une des multiples d\u00e9faillances de la CIA qui ont conduit \u00e0 la fuite. Toutefois, elle a r\u00e9v\u00e9l\u00e9 que d&rsquo;autres erreurs avaient \u00e9galement \u00e9t\u00e9 commises.<\/p>\n\n\n\n<p>L&rsquo;une d&rsquo;entre elles est de ne pas avoir r\u00e9agi rapidement aux signaux d&rsquo;alerte indiquant qu&rsquo;une personne en possession d&rsquo;informations classifi\u00e9es de la CIA repr\u00e9sentait un risque important pour l&rsquo;agence et la s\u00e9curit\u00e9 nationale.<\/p>\n\n\n\n<p>L&rsquo;agence n&rsquo;a pas non plus habilit\u00e9 un responsable \u00e0 diriger la s\u00e9curit\u00e9 de tous les syst\u00e8mes d&rsquo;information de l&rsquo;agence tout au long de leur cycle de vie.<\/p>\n\n\n\n<p>Hier, le s\u00e9nateur Am\u00e9ricain Ron Widen a envoy\u00e9 une lettre contenant le rapport en question. Le rapport a \u00e9t\u00e9 re\u00e7u par le directeur du renseignement national de la CIA, John Ractliffe.<\/p>\n\n\n\n<p>Il a d\u00e9clar\u00e9 que le laxisme dans la s\u00e9curit\u00e9 de la CIA signal\u00e9 par WikiLeaks ne semble pas provenir d&rsquo;une seule agence de renseignement. Il s&rsquo;est \u00e9galement demand\u00e9 pourquoi les autorit\u00e9s Am\u00e9ricaines n&rsquo;imposent pas des mesures de s\u00e9curit\u00e9 telles que la validation de l&rsquo;<strong><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/use-dmarc-to-validate-email\">identification des e-mails par le MDMARC<\/a><\/strong> et l&rsquo;authentification \u00e0 double facteur pour les r\u00e9seaux g\u00e9n\u00e9r\u00e9s par les Etats-Unis.<\/p>\n\n\n\n<p><strong>Un ancien agent de la CIA accus\u00e9 du vol<\/strong><\/p>\n\n\n\n<p>En 2018, Joshua Adam Schulte, un ancien employ\u00e9 de la CIA, a \u00e9t\u00e9 inculp\u00e9 pour avoir divulgu\u00e9 les donn\u00e9es de Vault 7.<\/p>\n\n\n\n<p>Il a plaid\u00e9 non coupable lors de son proc\u00e8s, ses avocats de la d\u00e9fense ayant d\u00e9clar\u00e9 que les mauvaises pratiques de s\u00e9curit\u00e9 de la CIA pouvaient permettre \u00e0 n&rsquo;importe quel employ\u00e9 de mettre la main sur des donn\u00e9es importantes, et que de nombreux agents auraient pu faire fuiter les donn\u00e9es Vault 7.<\/p>\n\n\n\n<p>Le jury du proc\u00e8s de Schelte n&rsquo;a pas \u00e9t\u00e9 en mesure de rendre un verdict sur son affaire.<\/p>\n\n\n\n<p>Le rapport <strong><a href=\"https:\/\/www.nytimes.com\/2020\/06\/16\/us\/politics\/cia-vault-7-hacking-breach.html\">r\u00e9v\u00e8le qu<\/a><\/strong>&lsquo;un employ\u00e9 de la CIA responsable de la fuite Vault 7 a vol\u00e9 environ 180 Go de donn\u00e9es. Mais le task force a d\u00e9clar\u00e9 que les donn\u00e9es vol\u00e9es pourraient \u00eatre plus importantes, puisqu&rsquo;il pourrait avoir vol\u00e9 jusqu&rsquo;\u00e0 34 To de donn\u00e9es.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un rapport r\u00e9cent r\u00e9v\u00e8le que le vol d&rsquo;un outil de piratage sophistiqu\u00e9 de la CIA s&rsquo;est produit en raison de mesures de s\u00e9curit\u00e9 insuffisantes. Le rapport r\u00e9v\u00e8le que la CIA n&rsquo;a pas fait de son mieux pour prot\u00e9ger ses op\u00e9rations et que l&rsquo;agence n&rsquo;a pas r\u00e9agi rapidement lorsque les secrets ont \u00e9t\u00e9 vol\u00e9s. Un task &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">DES OUTILS DE PIRATAGE ULTRASECRETS DE LA CIA VOL\u00c9S EN RAISON D&rsquo;UNE CYBERS\u00c9CURIT\u00c9 LAXISTE<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2193,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-5310","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DES OUTILS DE PIRATAGE ULTRASECRETS DE LA CIA VOL\u00c9S EN RAISON D&#039;UNE CYBERS\u00c9CURIT\u00c9 LAXISTE - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DES OUTILS DE PIRATAGE ULTRASECRETS DE LA CIA VOL\u00c9S EN RAISON D&#039;UNE CYBERS\u00c9CURIT\u00c9 LAXISTE - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Un rapport r\u00e9cent r\u00e9v\u00e8le que le vol d&rsquo;un outil de piratage sophistiqu\u00e9 de la CIA s&rsquo;est produit en raison de mesures de s\u00e9curit\u00e9 insuffisantes. Le rapport r\u00e9v\u00e8le que la CIA n&rsquo;a pas fait de son mieux pour prot\u00e9ger ses op\u00e9rations et que l&rsquo;agence n&rsquo;a pas r\u00e9agi rapidement lorsque les secrets ont \u00e9t\u00e9 vol\u00e9s. Un task &hellip; Continue reading DES OUTILS DE PIRATAGE ULTRASECRETS DE LA CIA VOL\u00c9S EN RAISON D&rsquo;UNE CYBERS\u00c9CURIT\u00c9 LAXISTE\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-17T17:03:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-27T17:10:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/06\/CIA-Planning-to-Use-AI-to-Track-Social-Media-Posts.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"533\" \/>\n\t<meta property=\"og:image:height\" content=\"428\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"DES OUTILS DE PIRATAGE ULTRASECRETS DE LA CIA VOL\u00c9S EN RAISON D&rsquo;UNE CYBERS\u00c9CURIT\u00c9 LAXISTE\",\"datePublished\":\"2020-06-17T17:03:00+00:00\",\"dateModified\":\"2023-08-27T17:10:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\\\/\"},\"wordCount\":933,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/CIA-Planning-to-Use-AI-to-Track-Social-Media-Posts.jpg?fit=533%2C428&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\\\/\",\"name\":\"DES OUTILS DE PIRATAGE ULTRASECRETS DE LA CIA VOL\u00c9S EN RAISON D'UNE CYBERS\u00c9CURIT\u00c9 LAXISTE - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/CIA-Planning-to-Use-AI-to-Track-Social-Media-Posts.jpg?fit=533%2C428&ssl=1\",\"datePublished\":\"2020-06-17T17:03:00+00:00\",\"dateModified\":\"2023-08-27T17:10:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/CIA-Planning-to-Use-AI-to-Track-Social-Media-Posts.jpg?fit=533%2C428&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/CIA-Planning-to-Use-AI-to-Track-Social-Media-Posts.jpg?fit=533%2C428&ssl=1\",\"width\":533,\"height\":428},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DES OUTILS DE PIRATAGE ULTRASECRETS DE LA CIA VOL\u00c9S EN RAISON D&rsquo;UNE CYBERS\u00c9CURIT\u00c9 LAXISTE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DES OUTILS DE PIRATAGE ULTRASECRETS DE LA CIA VOL\u00c9S EN RAISON D'UNE CYBERS\u00c9CURIT\u00c9 LAXISTE - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/","og_locale":"fr_FR","og_type":"article","og_title":"DES OUTILS DE PIRATAGE ULTRASECRETS DE LA CIA VOL\u00c9S EN RAISON D'UNE CYBERS\u00c9CURIT\u00c9 LAXISTE - Blog KoDDoS","og_description":"Un rapport r\u00e9cent r\u00e9v\u00e8le que le vol d&rsquo;un outil de piratage sophistiqu\u00e9 de la CIA s&rsquo;est produit en raison de mesures de s\u00e9curit\u00e9 insuffisantes. Le rapport r\u00e9v\u00e8le que la CIA n&rsquo;a pas fait de son mieux pour prot\u00e9ger ses op\u00e9rations et que l&rsquo;agence n&rsquo;a pas r\u00e9agi rapidement lorsque les secrets ont \u00e9t\u00e9 vol\u00e9s. Un task &hellip; Continue reading DES OUTILS DE PIRATAGE ULTRASECRETS DE LA CIA VOL\u00c9S EN RAISON D&rsquo;UNE CYBERS\u00c9CURIT\u00c9 LAXISTE","og_url":"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-06-17T17:03:00+00:00","article_modified_time":"2023-08-27T17:10:35+00:00","og_image":[{"width":533,"height":428,"url":"https:\/\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/06\/CIA-Planning-to-Use-AI-to-Track-Social-Media-Posts.jpg","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"DES OUTILS DE PIRATAGE ULTRASECRETS DE LA CIA VOL\u00c9S EN RAISON D&rsquo;UNE CYBERS\u00c9CURIT\u00c9 LAXISTE","datePublished":"2020-06-17T17:03:00+00:00","dateModified":"2023-08-27T17:10:35+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/"},"wordCount":933,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/06\/CIA-Planning-to-Use-AI-to-Track-Social-Media-Posts.jpg?fit=533%2C428&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/","url":"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/","name":"DES OUTILS DE PIRATAGE ULTRASECRETS DE LA CIA VOL\u00c9S EN RAISON D'UNE CYBERS\u00c9CURIT\u00c9 LAXISTE - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/06\/CIA-Planning-to-Use-AI-to-Track-Social-Media-Posts.jpg?fit=533%2C428&ssl=1","datePublished":"2020-06-17T17:03:00+00:00","dateModified":"2023-08-27T17:10:35+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/06\/CIA-Planning-to-Use-AI-to-Track-Social-Media-Posts.jpg?fit=533%2C428&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/06\/CIA-Planning-to-Use-AI-to-Track-Social-Media-Posts.jpg?fit=533%2C428&ssl=1","width":533,"height":428},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/des-outils-de-piratage-ultrasecrets-de-la-cia-voles-en-raison-dune-cybersecurite-laxiste\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"DES OUTILS DE PIRATAGE ULTRASECRETS DE LA CIA VOL\u00c9S EN RAISON D&rsquo;UNE CYBERS\u00c9CURIT\u00c9 LAXISTE"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/06\/CIA-Planning-to-Use-AI-to-Track-Social-Media-Posts.jpg?fit=533%2C428&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-1nE","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/5310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=5310"}],"version-history":[{"count":2,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/5310\/revisions"}],"predecessor-version":[{"id":5313,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/5310\/revisions\/5313"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/2193"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=5310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=5310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=5310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}