{"id":11435,"date":"2024-01-24T07:54:03","date_gmt":"2024-01-24T07:54:03","guid":{"rendered":"https:\/\/www.e-works.fr\/blog\/?p=11435"},"modified":"2024-01-24T07:54:05","modified_gmt":"2024-01-24T07:54:05","slug":"cyberattaque-pirates-dirigeants-microsoft","status":"publish","type":"post","link":"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/","title":{"rendered":"Cyberattaque : des pirates acc\u00e8dent aux comptes mail de dirigeants de Microsoft"},"content":{"rendered":"\n<p>Microsoft, le g\u00e9ant de la technologie, a r\u00e9cemment \u00e9t\u00e9 la cible d&rsquo;une cyberattaque d&rsquo;envergure men\u00e9e par le groupe Nobelium, suspect\u00e9 d&rsquo;\u00eatre affili\u00e9 aux services russes de renseignement. Cette attaque, ayant eu lieu fin novembre, a conduit \u00e0 l&rsquo;infiltration des comptes mail de plusieurs dirigeants de Microsoft, dont le pr\u00e9sident Brad Smith et la directrice financi\u00e8re Amy Hood.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Chronologie de l&rsquo;attaque<\/h2>\n\n\n\n<p>L&rsquo;assaut cybern\u00e9tique a d\u00e9but\u00e9 fin novembre, mais n&rsquo;a \u00e9t\u00e9 d\u00e9tect\u00e9 qu&rsquo;au 12 janvier, mettant en \u00e9vidence la sophistication des hackers. Ils ont cibl\u00e9 un compte de test inutilis\u00e9, leur ouvrant ainsi la voie pour p\u00e9n\u00e9trer le syst\u00e8me. L&rsquo;impact de cette infiltration s&rsquo;est concentr\u00e9 sur \u00ab\u00a0un pourcentage tr\u00e8s faible des comptes de messagerie d&rsquo;entreprise, y compris des membres de l&rsquo;\u00e9quipe de direction et des employ\u00e9s des services de cybers\u00e9curit\u00e9 et juridiques\u00a0\u00bb de <a href=\"https:\/\/www.e-works.fr\/blog\/microsoft-apple-premiere-capitalisation-boursiere\/\">Microsoft<\/a>, a reconnu la soci\u00e9t\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Objectif des attaquants<\/h2>\n\n\n\n<p>Microsoft a d\u00e9clar\u00e9 que les pirates cherchaient des informations les concernant, en particulier sur la fa\u00e7on dont la soci\u00e9t\u00e9 a r\u00e9agi apr\u00e8s la pr\u00e9c\u00e9dente attaque visant SolarWinds. Cette recherche cibl\u00e9e sugg\u00e8re une volont\u00e9 de comprendre les r\u00e9ponses de Microsoft \u00e0 des incidents pr\u00e9c\u00e9dents, potentiellement pour des motifs strat\u00e9giques.<\/p>\n\n\n\n<p>Malgr\u00e9 cette intrusion, Microsoft assure qu&rsquo;il n&rsquo;y a actuellement aucune preuve que les attaquants aient eu acc\u00e8s \u00e0 des environnements clients, des syst\u00e8mes de production, du code source ou des syst\u00e8mes d&rsquo;IA.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Le Groupe Nobelium et son historique<\/h2>\n\n\n\n<p>Nobelium, \u00e9galement connu sous les noms de Midnight Blizzard et Cozy Bear, est soup\u00e7onn\u00e9 par les autorit\u00e9s am\u00e9ricaines de faire partie du SVR, les services de renseignement ext\u00e9rieur de la Russie. Ce groupe est r\u00e9put\u00e9 pour cibler diverses entit\u00e9s, notamment des administrations, des ONG, et des entreprises, dans le but de collecter des renseignements sur les int\u00e9r\u00eats \u00e9trangers.<\/p>\n\n\n\n<p>Le pass\u00e9 de Nobelium inclut des attaques notables, telles que celle contre le parti d\u00e9mocrate am\u00e9ricain en 2015, visant \u00e0 influencer les \u00e9lections de 2016. En 2020, le groupe a \u00e9t\u00e9 responsable de l&rsquo;incident majeur touchant SolarWinds, qui a affect\u00e9 le minist\u00e8re am\u00e9ricain de la d\u00e9fense et d&rsquo;autres entit\u00e9s gouvernementales.<\/p>\n\n\n\n<p>Cette r\u00e9cente attaque souligne une fois de plus la persistance et la sophistication des acteurs malveillants dans le cyberespace, tout en mettant en lumi\u00e8re les d\u00e9fis constants auxquels sont confront\u00e9es les grandes entreprises technologiques en mati\u00e8re de s\u00e9curit\u00e9 informatique.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft, le g\u00e9ant de la technologie, a r\u00e9cemment \u00e9t\u00e9 la cible d&rsquo;une cyberattaque d&rsquo;envergure men\u00e9e par le groupe Nobelium, suspect\u00e9 d&rsquo;\u00eatre affili\u00e9 aux services russes<\/p>\n","protected":false},"author":1,"featured_media":11436,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[59],"tags":[],"class_list":["post-11435","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lactu-du-web"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattaque Microsoft : des pirates acc\u00e8dent aux comptes<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez dans notre blog, un article sur Microsoft qui a subit une grande cyberattaque sur des comptes de dirigeants.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattaque Microsoft : des pirates acc\u00e8dent aux comptes\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez dans notre blog, un article sur Microsoft qui a subit une grande cyberattaque sur des comptes de dirigeants.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog E-Works\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-24T07:54:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-24T07:54:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.e-works.fr\/blog\/wp-content\/uploads\/2024\/01\/cyberattaque.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sma\u00efl\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sma\u00efl\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/cyberattaque-pirates-dirigeants-microsoft\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/cyberattaque-pirates-dirigeants-microsoft\\\/\"},\"author\":{\"name\":\"Sma\u00efl\",\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/#\\\/schema\\\/person\\\/1d16b2d9fb38e8d6412bc3e852ab02c6\"},\"headline\":\"Cyberattaque : des pirates acc\u00e8dent aux comptes mail de dirigeants de Microsoft\",\"datePublished\":\"2024-01-24T07:54:03+00:00\",\"dateModified\":\"2024-01-24T07:54:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/cyberattaque-pirates-dirigeants-microsoft\\\/\"},\"wordCount\":429,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/cyberattaque-pirates-dirigeants-microsoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/cyberattaque.jpg\",\"articleSection\":[\"L'actu du Web\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/cyberattaque-pirates-dirigeants-microsoft\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/cyberattaque-pirates-dirigeants-microsoft\\\/\",\"url\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/cyberattaque-pirates-dirigeants-microsoft\\\/\",\"name\":\"Cyberattaque Microsoft : des pirates acc\u00e8dent aux comptes\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/cyberattaque-pirates-dirigeants-microsoft\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/cyberattaque-pirates-dirigeants-microsoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/cyberattaque.jpg\",\"datePublished\":\"2024-01-24T07:54:03+00:00\",\"dateModified\":\"2024-01-24T07:54:05+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/#\\\/schema\\\/person\\\/1d16b2d9fb38e8d6412bc3e852ab02c6\"},\"description\":\"D\u00e9couvrez dans notre blog, un article sur Microsoft qui a subit une grande cyberattaque sur des comptes de dirigeants.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/cyberattaque-pirates-dirigeants-microsoft\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/cyberattaque-pirates-dirigeants-microsoft\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/cyberattaque-pirates-dirigeants-microsoft\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/cyberattaque.jpg\",\"contentUrl\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/cyberattaque.jpg\",\"width\":1200,\"height\":800,\"caption\":\"cyberattaque\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/cyberattaque-pirates-dirigeants-microsoft\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L'actu du Web\",\"item\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/category\\\/lactu-du-web\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyberattaque : des pirates acc\u00e8dent aux comptes mail de dirigeants de Microsoft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/\",\"name\":\"Blog E-Works\",\"description\":\"Emploi dans le Webmarketing et le e-Commerce\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/#\\\/schema\\\/person\\\/1d16b2d9fb38e8d6412bc3e852ab02c6\",\"name\":\"Sma\u00efl\",\"sameAs\":[\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/\"],\"url\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/author\\\/gqy4a\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattaque Microsoft : des pirates acc\u00e8dent aux comptes","description":"D\u00e9couvrez dans notre blog, un article sur Microsoft qui a subit une grande cyberattaque sur des comptes de dirigeants.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyberattaque Microsoft : des pirates acc\u00e8dent aux comptes","og_description":"D\u00e9couvrez dans notre blog, un article sur Microsoft qui a subit une grande cyberattaque sur des comptes de dirigeants.","og_url":"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/","og_site_name":"Blog E-Works","article_published_time":"2024-01-24T07:54:03+00:00","article_modified_time":"2024-01-24T07:54:05+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.e-works.fr\/blog\/wp-content\/uploads\/2024\/01\/cyberattaque.jpg","type":"image\/jpeg"}],"author":"Sma\u00efl","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Sma\u00efl","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/#article","isPartOf":{"@id":"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/"},"author":{"name":"Sma\u00efl","@id":"https:\/\/www.e-works.fr\/blog\/#\/schema\/person\/1d16b2d9fb38e8d6412bc3e852ab02c6"},"headline":"Cyberattaque : des pirates acc\u00e8dent aux comptes mail de dirigeants de Microsoft","datePublished":"2024-01-24T07:54:03+00:00","dateModified":"2024-01-24T07:54:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/"},"wordCount":429,"commentCount":0,"image":{"@id":"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.e-works.fr\/blog\/wp-content\/uploads\/2024\/01\/cyberattaque.jpg","articleSection":["L'actu du Web"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/","url":"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/","name":"Cyberattaque Microsoft : des pirates acc\u00e8dent aux comptes","isPartOf":{"@id":"https:\/\/www.e-works.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/#primaryimage"},"image":{"@id":"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.e-works.fr\/blog\/wp-content\/uploads\/2024\/01\/cyberattaque.jpg","datePublished":"2024-01-24T07:54:03+00:00","dateModified":"2024-01-24T07:54:05+00:00","author":{"@id":"https:\/\/www.e-works.fr\/blog\/#\/schema\/person\/1d16b2d9fb38e8d6412bc3e852ab02c6"},"description":"D\u00e9couvrez dans notre blog, un article sur Microsoft qui a subit une grande cyberattaque sur des comptes de dirigeants.","breadcrumb":{"@id":"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/#primaryimage","url":"https:\/\/www.e-works.fr\/blog\/wp-content\/uploads\/2024\/01\/cyberattaque.jpg","contentUrl":"https:\/\/www.e-works.fr\/blog\/wp-content\/uploads\/2024\/01\/cyberattaque.jpg","width":1200,"height":800,"caption":"cyberattaque"},{"@type":"BreadcrumbList","@id":"https:\/\/www.e-works.fr\/blog\/cyberattaque-pirates-dirigeants-microsoft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.e-works.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"L'actu du Web","item":"https:\/\/www.e-works.fr\/blog\/category\/lactu-du-web\/"},{"@type":"ListItem","position":3,"name":"Cyberattaque : des pirates acc\u00e8dent aux comptes mail de dirigeants de Microsoft"}]},{"@type":"WebSite","@id":"https:\/\/www.e-works.fr\/blog\/#website","url":"https:\/\/www.e-works.fr\/blog\/","name":"Blog E-Works","description":"Emploi dans le Webmarketing et le e-Commerce","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.e-works.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.e-works.fr\/blog\/#\/schema\/person\/1d16b2d9fb38e8d6412bc3e852ab02c6","name":"Sma\u00efl","sameAs":["https:\/\/www.e-works.fr\/blog\/"],"url":"https:\/\/www.e-works.fr\/blog\/author\/gqy4a\/"}]}},"_links":{"self":[{"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/posts\/11435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/comments?post=11435"}],"version-history":[{"count":2,"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/posts\/11435\/revisions"}],"predecessor-version":[{"id":11438,"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/posts\/11435\/revisions\/11438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/media\/11436"}],"wp:attachment":[{"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/media?parent=11435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/categories?post=11435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/tags?post=11435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}