{"id":940,"date":"2019-06-27T13:58:37","date_gmt":"2019-06-27T11:58:37","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=940"},"modified":"2019-06-28T14:02:39","modified_gmt":"2019-06-28T12:02:39","slug":"les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/","title":{"rendered":"LES HACKERS EXPLOITENT LA FAILLE DE MACOS QU&rsquo;APPLE A N\u00c9GLIG\u00c9E"},"content":{"rendered":"\n<p>Contrairement\naux logiciels Android, ceux d&rsquo;Apple sont g\u00e9n\u00e9ralement consid\u00e9r\u00e9s comme beaucoup\nplus s\u00e9curis\u00e9s, avec beaucoup moins de probl\u00e8mes de s\u00e9curit\u00e9, de failles et de\nvuln\u00e9rabilit\u00e9s. Bien que cela ait \u00e9t\u00e9 vrai pendant longtemps, les choses ont\ncommenc\u00e9 \u00e0 changer ces derni\u00e8res ann\u00e9es, lorsque les pirates ont commenc\u00e9 \u00e0 se\nconcentrer davantage sur iOS et macOS. En cons\u00e9quence, les failles de ces\nsyst\u00e8mes ont \u00e9galement commenc\u00e9 \u00e0 appara\u00eetre, et une vuln\u00e9rabilit\u00e9 majeure a\n\u00e9t\u00e9 signal\u00e9e \u00e0 Apple plus t\u00f4t cette ann\u00e9e, le 22 f\u00e9vrier.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.fcvl.net\/vulnerabilities\/macosx-gatekeeper-bypass\">La faille a\n\u00e9t\u00e9 d\u00e9couverte<\/a><\/strong> par Filippo Cavallarin, chercheur en cybers\u00e9curit\u00e9, qui a\nsignal\u00e9 qu&rsquo;une vuln\u00e9rabilit\u00e9 pourrait permettre aux logiciels malveillants de\npasser au-del\u00e0 de la fonctionnalit\u00e9 de s\u00e9curit\u00e9 de Gatekeeper, si rien n&rsquo;est\nfait. De plus, il ne serait probablement pas d\u00e9tect\u00e9 sur l&rsquo;appareil.<\/p>\n\n\n\n<p>Cavallarin\na d\u00e9clar\u00e9 qu&rsquo;Apple a reconnu sa d\u00e9couverte et que la soci\u00e9t\u00e9 a d\u00e9clar\u00e9 qu&rsquo;elle\nr\u00e9glerait le probl\u00e8me d&rsquo;ici la mi-mai. Cependant, ils ne l&rsquo;avaient toujours pas\nfait et, apr\u00e8s l&rsquo;expiration du d\u00e9lai de divulgation de 90 jours, Cavallarin\nd\u00e9cida de le rendre public. Le 24 mai, il a publi\u00e9 la description compl\u00e8te de\nses trouvailles, ainsi que le code de preuve de concept. Cela fait maintenant\nplus d&rsquo;un mois qu&rsquo;<strong><a href=\"https:\/\/koddos.net\/blog\/apple-hides-macos-gatekeeper-malware-vulnerability\/\">Apple<\/a><\/strong>\nn&rsquo;a toujours pas corrig\u00e9 la faille. Toutefois, si l&rsquo;entreprise l&rsquo;ignore, les\nhackers font le contraire, et beaucoup en ont apparemment pris connaissance.<\/p>\n\n\n\n<p><strong>Gatekeeper<\/strong><\/p>\n\n\n\n<p>Des\nentreprises de cybers\u00e9curit\u00e9, telles qu&rsquo;Intego, ont d\u00e9j\u00e0 signal\u00e9 des cr\u00e9ateurs\nde logiciels malveillants testant leurs nouvelles cr\u00e9ations. Selon les\nchercheurs, ils ont effectu\u00e9 des tests sur <strong><a href=\"https:\/\/www.intego.com\/mac-security-blog\/osx-linker-new-mac-malware-attempts-zero-day-gatekeeper-bypass\/\">OSX\/Linker<\/a><\/strong>,\nqui utilise la preuve de concept publi\u00e9e pour infecter macOS de logiciels\nmalveillants. Il semble que la nouvelle menace en soit encore \u00e0 la phase de\ntest et qu\u2019elle n\u2019a pas encore \u00e9t\u00e9 utilis\u00e9e dans la nature. Cependant, le fait\nm\u00eame qu&rsquo;il existe signifie que les utilisateurs de Mac auront bient\u00f4t un\nprobl\u00e8me assez grave. Pendant ce temps, Apple ne fait toujours rien pour\nr\u00e9soudre le probl\u00e8me.<\/p>\n\n\n\n<p>Son\nGatekeeper a \u00e9t\u00e9 introduit en 2012 et faisait partie du syst\u00e8me d&rsquo;exploitation\nOS X Mountain Lion. Depuis lors, cela fait partie de la s\u00e9curit\u00e9 sur les\nappareils Mac, analysant les applications t\u00e9l\u00e9charg\u00e9es et v\u00e9rifiant si elles\n\u00e9taient sign\u00e9es par code. En d&rsquo;autres termes, il v\u00e9rifie si le logiciel\nt\u00e9l\u00e9charg\u00e9 a \u00e9t\u00e9 publi\u00e9 ou non par des d\u00e9veloppeurs v\u00e9rifi\u00e9s, ou si quelqu&rsquo;un\nl&rsquo;a modifi\u00e9. Il poss\u00e8de \u00e9galement une base de donn\u00e9es contenant des logiciels\nmalveillants connus, afin de pouvoir reconna\u00eetre et signaler ceux qui\npourraient tenter d\u2019envahir l&rsquo;appareil.<\/p>\n\n\n\n<p>Cependant,\nle probl\u00e8me r\u00e9side dans le fait que tous les fichiers ne sont pas trait\u00e9s de\nmani\u00e8re \u00e9gale par Gatekeeper. Par exemple, les applications provenant de\nlecteurs externes ou de r\u00e9seaux partag\u00e9s sont consid\u00e9r\u00e9es comme s\u00fbres. Selon\nCavallarin, si quelqu&rsquo;un devait tromper l&rsquo;utilisateur Mac pour qu&rsquo;il ouvre des\nfichiers .zip contenant un lien symbolique vers le serveur NFS que le <strong><a href=\"https:\/\/koddos.net\/blog\/click-fraud-scheme-allowed-hackers-to-make-off-with-millions\/\">hacker\ncontr\u00f4le<\/a><\/strong>, le hacker pourrait infecter le Mac avec n&rsquo;importe quel\nlogiciel malveillant, sans m\u00eame que Gatekeeper essaie de v\u00e9rifier ces fichiers.<\/p>\n\n\n\n<p><strong>Des\nmoments difficiles pour les utilisateurs de Mac arrivent<\/strong><\/p>\n\n\n\n<p>Quant\n\u00e0 Intego, ils n&rsquo;ont pas signal\u00e9 les fichiers .zip, mais plut\u00f4t les cr\u00e9ateurs de\nlogiciel malveillant essayant d&rsquo;alt\u00e9rer les programmes d&rsquo;installation d&rsquo;Adobe\nFlash qui seraient li\u00e9s \u00e0 une application trouv\u00e9e sur un syst\u00e8me de fichiers\nNFS. Jusqu&rsquo;\u00e0 pr\u00e9sent, il semble que les hackers proc\u00e8dent \u00e0 des essais et\nperfectionnent la menace.<\/p>\n\n\n\n<p>Un\nchercheur en s\u00e9curit\u00e9 de <strong><a href=\"https:\/\/koddos.net\/blog\/even-with-the-two-factor-authentication-youre-still-not-safe\/\">Malwarebytes<\/a><\/strong>,\nAdam Thomas, a \u00e9galement d\u00e9clar\u00e9 que le NFS pouvait contenir une application\nPlaceholder, et non le logiciel malveillant lui-m\u00eame. Cependant, d\u00e8s que les\ntests seront termin\u00e9s et que la campagne aura lieu, ces applications\ninoffensives seront sans aucun doute remplac\u00e9es par des applications\nmalveillantes.<\/p>\n\n\n\n<p>En\nce qui concerne la preuve de concept qu&rsquo;Intego a elle-m\u00eame d\u00e9couverte, il est\nprobable qu&rsquo;elle provienne du m\u00eame groupe que celui qui \u00e9tait \u00e0 l&rsquo;origine d&rsquo;une\nfamille de logiciels de publicit\u00e9 OSX \/ Surfbuyer. Ce n&rsquo;est pas une menace\nparticuli\u00e8rement grave, mais la faille pourrait conduire \u00e0 des probl\u00e8mes plus\ngraves. Le groupe utilisait autrefois les adwares, mais avec une faille comme\ncelle-ci, ils pouvaient tout installer, et cela comprenait des choses bien\npires que les adwares.<\/p>\n\n\n\n<p>La\nfaille est de taille et il peut \u00eatre utilis\u00e9 pour infecter n&rsquo;importe qui avec\nn&rsquo;importe quoi. Cela rend d&rsquo;autant plus inqui\u00e9tant qu&rsquo;Apple ne semble rien\nfaire pour y rem\u00e9dier, m\u00eame apr\u00e8s quatre mois depuis que le d\u00e9faut a \u00e9t\u00e9\nsignal\u00e9. Tant qu&rsquo;un correctif n&rsquo;est pas publi\u00e9, il n&rsquo;y a aucun moyen de savoir\nce que les hackers pourraient trouver. Jusqu&rsquo;\u00e0 pr\u00e9sent, un seul groupe a \u00e9t\u00e9\nsurpris en train de faire ce genre d&rsquo;exp\u00e9riences. Et, selon les chercheurs, si\nl&rsquo;un d&rsquo;entre eux \u00e9tait pris \u00e0 exp\u00e9rimenter, nombreux sont ceux qui ont r\u00e9ussi \u00e0\nrester sous le radar.<\/p>\n\n\n\n<p>Quant\n\u00e0 Apple, il est compr\u00e9hensible que la r\u00e9solution des probl\u00e8mes demande du temps\net beaucoup de travail. Toutefois, la soci\u00e9t\u00e9 disposait de plus de 90 jours\navant la publication de la <strong><a href=\"https:\/\/koddos.net\/blog\/a-new-vulnerability-puts-100-million-pc-users-in-danger\/\">vuln\u00e9rabilit\u00e9<\/a><\/strong>\net n&rsquo;a toujours rien fait pendant plus de 30 jours apr\u00e8s la publication des\ninformations sur la faille. C&rsquo;est \u00e9galement assez inhabituel pour Apple, qui\nrespecte g\u00e9n\u00e9ralement ses contraintes de d\u00e9lais. En d&rsquo;autres termes, quelque\nchose \u00e0 propos du Gatekeeper doit causer des probl\u00e8mes \u00e0 l&rsquo;entreprise, ce qui\nrend ce cas d&rsquo;autant plus curieux.<\/p>\n\n\n\n<p>Et,\npuisque la soci\u00e9t\u00e9 n\u2019a publi\u00e9 aucun avertissement officiel, mise \u00e0 jour ou quoi\nque ce soit d\u2019autre pour rem\u00e9dier \u00e0 la faille, personne ne sait vraiment s\u2019ils\nenvisagent de le r\u00e9parer, et dans le cas o\u00f9 ils le feront, personne ne sait\naussi quand.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Contrairement aux logiciels Android, ceux d&rsquo;Apple sont g\u00e9n\u00e9ralement consid\u00e9r\u00e9s comme beaucoup plus s\u00e9curis\u00e9s, avec beaucoup moins de probl\u00e8mes de s\u00e9curit\u00e9, de failles et de vuln\u00e9rabilit\u00e9s. Bien que cela ait \u00e9t\u00e9 vrai pendant longtemps, les choses ont commenc\u00e9 \u00e0 changer ces derni\u00e8res ann\u00e9es, lorsque les pirates ont commenc\u00e9 \u00e0 se concentrer davantage sur iOS et macOS. &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LES HACKERS EXPLOITENT LA FAILLE DE MACOS QU&rsquo;APPLE A N\u00c9GLIG\u00c9E<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":941,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[6],"tags":[],"class_list":["post-940","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LES HACKERS EXPLOITENT LA FAILLE DE MACOS QU&#039;APPLE A N\u00c9GLIG\u00c9E - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LES HACKERS EXPLOITENT LA FAILLE DE MACOS QU&#039;APPLE A N\u00c9GLIG\u00c9E - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Contrairement aux logiciels Android, ceux d&rsquo;Apple sont g\u00e9n\u00e9ralement consid\u00e9r\u00e9s comme beaucoup plus s\u00e9curis\u00e9s, avec beaucoup moins de probl\u00e8mes de s\u00e9curit\u00e9, de failles et de vuln\u00e9rabilit\u00e9s. Bien que cela ait \u00e9t\u00e9 vrai pendant longtemps, les choses ont commenc\u00e9 \u00e0 changer ces derni\u00e8res ann\u00e9es, lorsque les pirates ont commenc\u00e9 \u00e0 se concentrer davantage sur iOS et macOS. &hellip; Continue reading LES HACKERS EXPLOITENT LA FAILLE DE MACOS QU&rsquo;APPLE A N\u00c9GLIG\u00c9E\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-27T11:58:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-28T12:02:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/06\/Fruitfly-Malware-is-Still-Bugging-Mac-Computers.jpg?fit=668%2C334&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"668\" \/>\n\t<meta property=\"og:image:height\" content=\"334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LES HACKERS EXPLOITENT LA FAILLE DE MACOS QU&rsquo;APPLE A N\u00c9GLIG\u00c9E\",\"datePublished\":\"2019-06-27T11:58:37+00:00\",\"dateModified\":\"2019-06-28T12:02:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\\\/\"},\"wordCount\":1066,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/Fruitfly-Malware-is-Still-Bugging-Mac-Computers.jpg?fit=668%2C334&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\\\/\",\"name\":\"LES HACKERS EXPLOITENT LA FAILLE DE MACOS QU'APPLE A N\u00c9GLIG\u00c9E - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/Fruitfly-Malware-is-Still-Bugging-Mac-Computers.jpg?fit=668%2C334&ssl=1\",\"datePublished\":\"2019-06-27T11:58:37+00:00\",\"dateModified\":\"2019-06-28T12:02:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/Fruitfly-Malware-is-Still-Bugging-Mac-Computers.jpg?fit=668%2C334&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/Fruitfly-Malware-is-Still-Bugging-Mac-Computers.jpg?fit=668%2C334&ssl=1\",\"width\":668,\"height\":334},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LES HACKERS EXPLOITENT LA FAILLE DE MACOS QU&rsquo;APPLE A N\u00c9GLIG\u00c9E\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LES HACKERS EXPLOITENT LA FAILLE DE MACOS QU'APPLE A N\u00c9GLIG\u00c9E - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/","og_locale":"fr_FR","og_type":"article","og_title":"LES HACKERS EXPLOITENT LA FAILLE DE MACOS QU'APPLE A N\u00c9GLIG\u00c9E - Blog KoDDoS","og_description":"Contrairement aux logiciels Android, ceux d&rsquo;Apple sont g\u00e9n\u00e9ralement consid\u00e9r\u00e9s comme beaucoup plus s\u00e9curis\u00e9s, avec beaucoup moins de probl\u00e8mes de s\u00e9curit\u00e9, de failles et de vuln\u00e9rabilit\u00e9s. Bien que cela ait \u00e9t\u00e9 vrai pendant longtemps, les choses ont commenc\u00e9 \u00e0 changer ces derni\u00e8res ann\u00e9es, lorsque les pirates ont commenc\u00e9 \u00e0 se concentrer davantage sur iOS et macOS. &hellip; Continue reading LES HACKERS EXPLOITENT LA FAILLE DE MACOS QU&rsquo;APPLE A N\u00c9GLIG\u00c9E","og_url":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2019-06-27T11:58:37+00:00","article_modified_time":"2019-06-28T12:02:39+00:00","og_image":[{"width":668,"height":334,"url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/06\/Fruitfly-Malware-is-Still-Bugging-Mac-Computers.jpg?fit=668%2C334&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LES HACKERS EXPLOITENT LA FAILLE DE MACOS QU&rsquo;APPLE A N\u00c9GLIG\u00c9E","datePublished":"2019-06-27T11:58:37+00:00","dateModified":"2019-06-28T12:02:39+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/"},"wordCount":1066,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/06\/Fruitfly-Malware-is-Still-Bugging-Mac-Computers.jpg?fit=668%2C334&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/","url":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/","name":"LES HACKERS EXPLOITENT LA FAILLE DE MACOS QU'APPLE A N\u00c9GLIG\u00c9E - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/06\/Fruitfly-Malware-is-Still-Bugging-Mac-Computers.jpg?fit=668%2C334&ssl=1","datePublished":"2019-06-27T11:58:37+00:00","dateModified":"2019-06-28T12:02:39+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/06\/Fruitfly-Malware-is-Still-Bugging-Mac-Computers.jpg?fit=668%2C334&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/06\/Fruitfly-Malware-is-Still-Bugging-Mac-Computers.jpg?fit=668%2C334&ssl=1","width":668,"height":334},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-la-faille-de-macos-quapple-a-negligee\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LES HACKERS EXPLOITENT LA FAILLE DE MACOS QU&rsquo;APPLE A N\u00c9GLIG\u00c9E"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/06\/Fruitfly-Malware-is-Still-Bugging-Mac-Computers.jpg?fit=668%2C334&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-fa","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=940"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/940\/revisions"}],"predecessor-version":[{"id":942,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/940\/revisions\/942"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/941"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}