
{"id":1626,"date":"2021-06-04T17:10:53","date_gmt":"2021-06-04T15:10:53","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=1626"},"modified":"2021-06-04T17:14:42","modified_gmt":"2021-06-04T15:14:42","slug":"ransomwares-ce-que-la-triple-extorsion","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/","title":{"rendered":"Ransomwares : Qu\u2019est-ce que la \u00ab triple extorsion \u00bb ?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"799\" height=\"565\" src=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/image-11.png\" alt=\"\" class=\"wp-image-1629\" srcset=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/image-11.png 799w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/image-11-300x212.png 300w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/image-11-768x543.png 768w\" sizes=\"auto, (max-width: 799px) 100vw, 799px\" \/><\/figure>\n\n\n\n<p style=\"font-size:24px\"><strong>La notion de \u00ab triple extorsion \u00bb \u00e9merge dans l&rsquo;univers des ransomwares, mais sans consensus sur ce qu&rsquo;elle recoupe pr\u00e9cis\u00e9ment.<\/strong><\/p>\n\n\n\n<p>Dans l\u2019univers\u00a0des\u00a0<em>ransomwares<\/em>, qu\u2019est-ce que la \u00ab triple extorsion \u00bb ? On a vu \u00e9merger le terme il y a quelques semaines, essentiellement en r\u00e9f\u00e9rence \u00e0 l\u2019ajout du DDoS dans l\u2019arsenal de groupes cybercriminels. Notamment Avaddon et REvil. Ils s\u2019engageaient \u00e0 fournir ce service \u00e0 leurs \u00ab affili\u00e9s \u00bb en compl\u00e9ment au socle dit de \u00ab\u00a0<a href=\"https:\/\/blog.f-secure.com\/attack-landscape-update-h1-2021\/?_ga=2.244874309.1793370514.1617091149-247904548.1617091149\" target=\"_blank\" rel=\"noreferrer noopener\">double extorsion<\/a>\u00a0\u00bb, \u00e0 savoir vol + chiffrement de donn\u00e9es.<\/p>\n\n\n\n<p>REvil, entre autres, ne s\u2019est pas arr\u00eat\u00e9 l\u00e0 dans l\u2019extension de ses prestations. Il a aussi enrichi son catalogue de moyens de pression avec les appels t\u00e9l\u00e9phoniques. \u00c0 deux destinataires. D\u2019un c\u00f4t\u00e9, les partenaires commerciaux des victimes. De l\u2019autre, les m\u00e9dias.<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Malware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#Malware<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Ransomware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#Ransomware<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/REvil?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#REvil<\/a><br><br>REvil Ransomware launched a service for contact to news media, companies for the best pressure at no cost, and DDoS (L3, L7) as a paid service.<br><br>Also, they reminded about developing support for VM ESXi and a polymorphic engine for windows. <a href=\"https:\/\/t.co\/MahKROK161\">pic.twitter.com\/MahKROK161<\/a><\/p>&mdash; 3xp0rt (@3xp0rtblog) <a href=\"https:\/\/twitter.com\/3xp0rtblog\/status\/1368149692383719426?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">March 6, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>Chez Check Point, on&nbsp;<a href=\"https:\/\/blog.checkpoint.com\/2021\/05\/12\/the-new-ransomware-threat-triple-extortion\/\" target=\"_blank\" rel=\"noreferrer noopener\">mentionne<\/a>&nbsp;autant le DDoS que les appels t\u00e9l\u00e9phoniques. Mais on consid\u00e8re que le v\u00e9ritable marqueur de la \u00ab triple extorsion \u00bb est ailleurs. En l\u2019occurrence, dans le fait de&nbsp;<strong>demander des ran\u00e7ons \u00e0 des victimes collat\u00e9rales<\/strong>. En premi\u00e8re ligne, celles dont on a r\u00e9cup\u00e9r\u00e9 des donn\u00e9es.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Les micro-ran\u00e7ons de Vastaamo<\/h2>\n\n\n\n<p>Pour illustrer son propos, l\u2019\u00e9diteur am\u00e9ricain cite le&nbsp;<a href=\"https:\/\/www.wired.co.uk\/article\/finland-mental-health-data-breach-vastaamo\" target=\"_blank\" rel=\"noreferrer noopener\">cas<\/a>&nbsp;Vastaamo. Cette entreprise exploite un r\u00e9seau de cliniques en Finlande. En octobre 2020, on a appris qu\u2019elle avait subi une cyberattaque. La chronologie des \u00e9v\u00e9nements reste incertaine (la premi\u00e8re intrusion pourrait remonter \u00e0 2019, voire \u00e0 2018). L\u2019ampleur est plus claire : on a d\u00e9rob\u00e9 les donn\u00e9es de l\u2019essentiel du personnel\u2026 et d\u2019environ 36 000 patients.<\/p>\n\n\n\n<p>Le 24 octobre, ces victimes ont&nbsp;<a href=\"https:\/\/www.theguardian.com\/world\/2020\/oct\/26\/tens-of-thousands-psychotherapy-records-hacked-in-finland\" target=\"_blank\" rel=\"noreferrer noopener\">commenc\u00e9<\/a>&nbsp;\u00e0 recevoir des e-mails. Voire, pour quelques-uns, des lettres et\/ou des coups de t\u00e9l\u00e9phone. Motif : une demande de ran\u00e7on, \u00e0 hauteur de quelques centaines d\u2019euros et \u00e0 payer en bitcoins. Quelques-uns auraient effectu\u00e9 la d\u00e9marche, sous la menace de voir leurs donn\u00e9es publi\u00e9es.<\/p>\n\n\n\n<p>Ce qui s\u2019est jou\u00e9 autour de cette date laisse beaucoup d\u2019hypoth\u00e8ses ouvertes. La tentative d\u2019extorsion des patients semble \u00eatre intervenue dans un second temps. Les cybercriminels ont peut-\u00eatre chang\u00e9 de strat\u00e9gie face \u00e0 la r\u00e9sistance de la clinique, invit\u00e9e \u00e0 r\u00e9gler 40 bitcoins. Mais l\u2019implication d\u2019une tierce partie n\u2019est pas exclure. En particulier du fait d\u2019un curieux fichier de 10 Go publi\u00e9 \u00e0 la veille de l\u2019envoi des e-mails. Accompagnant un \u00e9chantillon de donn\u00e9es relatives \u00e0 300 patients, il avait rapidement disparu de la circulation. A-t-il pu contenir l\u2019int\u00e9gralit\u00e9 de la base des patients et ainsi donner une arme potentiellement fatale \u00e0 qui aurait pu le r\u00e9cup\u00e9rer ?<\/p>\n\n\n\n<p>Un \u00e9v\u00e9nement similaire dans la forme mais de moindre ampleur \u00e9tait survenu en 2019 dans un centre am\u00e9ricain de chirurgie faciale.<\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">The attacker calls himself \u2019ransom_man\u2019, and is running a Tor site on which he has already leaked the therapist session notes of 300 patients. This is a very sad case for the victims, some of which are underage. The attacker has no shame.<\/p>&mdash; @mikko (@mikko) <a href=\"https:\/\/twitter.com\/mikko\/status\/1320061216199446530?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">October 24, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>Silicon<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La notion de \u00ab triple extorsion \u00bb \u00e9merge dans l&rsquo;univers des ransomwares, mais sans consensus sur ce qu&rsquo;elle recoupe pr\u00e9cis\u00e9ment. Dans l\u2019univers\u00a0des\u00a0ransomwares, qu\u2019est-ce que la \u00ab triple extorsion \u00bb ? [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1631,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,195,11,181],"tags":[],"class_list":["post-1626","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cyberespionnage","category-cybersecurite","category-internet"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomwares : Qu\u2019est-ce que la \u00ab triple extorsion \u00bb ? - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomwares : Qu\u2019est-ce que la \u00ab triple extorsion \u00bb ? - Parlons Techs - Store\" \/>\n<meta property=\"og:description\" content=\"La notion de \u00ab triple extorsion \u00bb \u00e9merge dans l&rsquo;univers des ransomwares, mais sans consensus sur ce qu&rsquo;elle recoupe pr\u00e9cis\u00e9ment. Dans l\u2019univers\u00a0des\u00a0ransomwares, qu\u2019est-ce que la \u00ab triple extorsion \u00bb ? [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-04T15:10:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-04T15:14:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/at-16.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"265\" \/>\n\t<meta property=\"og:image:height\" content=\"119\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/ransomwares-ce-que-la-triple-extorsion\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/ransomwares-ce-que-la-triple-extorsion\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Ransomwares : Qu\u2019est-ce que la \u00ab triple extorsion \u00bb ?\",\"datePublished\":\"2021-06-04T15:10:53+00:00\",\"dateModified\":\"2021-06-04T15:14:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/ransomwares-ce-que-la-triple-extorsion\\\/\"},\"wordCount\":533,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/ransomwares-ce-que-la-triple-extorsion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/at-16.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Cyberespionnage\",\"CyberS\u00e9curit\u00e9\",\"Internet\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/ransomwares-ce-que-la-triple-extorsion\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/ransomwares-ce-que-la-triple-extorsion\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/ransomwares-ce-que-la-triple-extorsion\\\/\",\"name\":\"Ransomwares : Qu\u2019est-ce que la \u00ab triple extorsion \u00bb ? - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/ransomwares-ce-que-la-triple-extorsion\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/ransomwares-ce-que-la-triple-extorsion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/at-16.jpg\",\"datePublished\":\"2021-06-04T15:10:53+00:00\",\"dateModified\":\"2021-06-04T15:14:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/ransomwares-ce-que-la-triple-extorsion\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/ransomwares-ce-que-la-triple-extorsion\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/ransomwares-ce-que-la-triple-extorsion\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/at-16.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/at-16.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/ransomwares-ce-que-la-triple-extorsion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomwares : Qu\u2019est-ce que la \u00ab triple extorsion \u00bb ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomwares : Qu\u2019est-ce que la \u00ab triple extorsion \u00bb ? - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/","og_locale":"fr_FR","og_type":"article","og_title":"Ransomwares : Qu\u2019est-ce que la \u00ab triple extorsion \u00bb ? - Parlons Techs - Store","og_description":"La notion de \u00ab triple extorsion \u00bb \u00e9merge dans l&rsquo;univers des ransomwares, mais sans consensus sur ce qu&rsquo;elle recoupe pr\u00e9cis\u00e9ment. Dans l\u2019univers\u00a0des\u00a0ransomwares, qu\u2019est-ce que la \u00ab triple extorsion \u00bb ? [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/","og_site_name":"Parlons Techs - Store","article_published_time":"2021-06-04T15:10:53+00:00","article_modified_time":"2021-06-04T15:14:42+00:00","og_image":[{"width":265,"height":119,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/at-16.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Ransomwares : Qu\u2019est-ce que la \u00ab triple extorsion \u00bb ?","datePublished":"2021-06-04T15:10:53+00:00","dateModified":"2021-06-04T15:14:42+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/"},"wordCount":533,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/at-16.jpg","articleSection":["Actualit\u00e9","Cyberespionnage","CyberS\u00e9curit\u00e9","Internet"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/","url":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/","name":"Ransomwares : Qu\u2019est-ce que la \u00ab triple extorsion \u00bb ? - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/at-16.jpg","datePublished":"2021-06-04T15:10:53+00:00","dateModified":"2021-06-04T15:14:42+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/at-16.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/at-16.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/ransomwares-ce-que-la-triple-extorsion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Ransomwares : Qu\u2019est-ce que la \u00ab triple extorsion \u00bb ?"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=1626"}],"version-history":[{"count":2,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1626\/revisions"}],"predecessor-version":[{"id":1630,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1626\/revisions\/1630"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/1631"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=1626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=1626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=1626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}