
{"id":3505,"date":"2022-09-21T12:32:48","date_gmt":"2022-09-21T10:32:48","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=3505"},"modified":"2022-09-21T12:38:27","modified_gmt":"2022-09-21T10:38:27","slug":"une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\/","title":{"rendered":"Une version malveillante du client SSH PuTTY est utilis\u00e9e pour d\u00e9ployer une porte d\u00e9rob\u00e9e !"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\"><img decoding=\"async\" src=\"blob:https:\/\/parlonstechs.com\/8b4894f3-3009-49d5-a72f-463cec1e5c6e\" alt=\"\"><\/h1>\n\n\n\n<p class=\"has-large-font-size\"><strong>Des pirates nord-cor\u00e9ens utilisent une version modifi\u00e9e et malveillante du client SSH PuTTY pour d\u00e9ployer une porte d\u00e9rob\u00e9e sur les machines des candidats potentiels \u00e0 une offre d&#8217;emploi pour un faux job chez Amazon. Un processus bien ficel\u00e9.<\/strong><\/p>\n\n\n\n<p>L&rsquo;entreprise <a href=\"https:\/\/www.mandiant.com\/resources\/blog\/dprk-whatsapp-phishing\" target=\"_blank\" rel=\"noreferrer noopener\">Mandiant a publi\u00e9 un rapport<\/a> dans lequel cette campagne attribu\u00e9e au groupe de pirates UNC4034 est d\u00e9crite. Ce groupe est \u00e9galement connu sous d&rsquo;autres noms : \u00ab\u00a0<em>Temp.Hermit<\/em>\u00a0\u00bb et \u00ab\u00a0<em>Labyrinth Chollima<\/em>\u00ab\u00a0. Cette campagne n&rsquo;est pas nouvelle puisqu&rsquo;elle existe depuis juin 2020, mais elle semble \u00eatre r\u00e9activ\u00e9e.<\/p>\n\n\n\n<p>Pour infecter les victimes,<strong> les pirates utilisent des versions modifi\u00e9es des logiciels PuTTY et KiTTY SSH qui contiennent une souche malveillante.<\/strong> Mais avant cela, tout commence par <strong>un e-mail de sollicitation qui \u00e9voque une offre d&#8217;emploi all\u00e9chante pour travailler chez Amazon<\/strong>. Ensuite, si l&rsquo;utilisateur mord \u00e0 l&rsquo;hame\u00e7on, il est redirig\u00e9 vers WhatsApp o\u00f9 la discussion se poursuit&#8230; Et o\u00f9 les cybercriminels l&rsquo;invitent \u00e0 passer un test afin d&rsquo;\u00e9valuer ses comp\u00e9tences. L&rsquo;occasion de <strong>faire t\u00e9l\u00e9charger \u00e0 l&rsquo;utilisateur un fichier ISO<\/strong> nomm\u00e9 \u00ab\u00a0<em>amazon_assessment.iso<\/em>\u00ab\u00a0.<\/p>\n\n\n\n<p>Ce fichier ISO contient un fichier texte \u00ab\u00a0readme.txt\u00a0\u00bb o\u00f9 l&rsquo;on peut lire plusieurs informations : <strong>une adresse IP, un nom d&rsquo;utilisateur et un mot de passe.<\/strong> Ces informations vont permettre au candidat de se connecter sur un serveur distant en SSH, pour qu&rsquo;il <strong>effectue un exercice<\/strong>. Pour \u00e9tablir cette connexion, il doit utiliser le client SSH PuTTY ou KiTTY, en utilisant la version int\u00e9gr\u00e9e dans l&rsquo;image ISO.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/www.it-connect.fr\/wp-content-itc\/uploads\/2022\/09\/Putty-SSH-Version-malveillante.jpg\" alt=\"Mandiant - Putty SSH - Version malveillante\" class=\"wp-image-56322\"\/><figcaption><br><\/figcaption><\/figure><\/div>\n\n\n\n<p>Bien que le client PuTTY ou KiTTY soit op\u00e9rationnel puisqu&rsquo;il est bas\u00e9 sur la version d&rsquo;origine, il s&rsquo;agit en fait d&rsquo;<strong>une version modifi\u00e9e qui int\u00e8gre un logiciel malveillant nomm\u00e9 AIRDRY.V2<\/strong> et qui correspond \u00e0 <strong>une porte d\u00e9rob\u00e9e<\/strong>. Pour agir en toute discr\u00e9tion, le client SSH malveillant utilise une vuln\u00e9rabilit\u00e9 dans l&rsquo;outil Windows \u00ab\u00a0colorcpl.exe\u00a0\u00bb afin de charger la DLL malveillante. L<strong>&lsquo;ex\u00e9cution s&rsquo;effectue en m\u00e9moire<\/strong> directement.<\/p>\n\n\n\n<p>\u00c0 partir du moment o\u00f9 la porte d\u00e9rob\u00e9e est d\u00e9ploy\u00e9e sur la machine, <strong>une communication avec un serveur C2 est \u00e9tablie<\/strong>. AIRDRY.V2 prend en charge les communications via HTTP et SMB et les requ\u00eates entre l&rsquo;h\u00f4te infect\u00e9 et le serveur C2 sont chiffr\u00e9es avec une cl\u00e9 AES.<\/p>\n\n\n\n<p>avec it connect<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Des pirates nord-cor\u00e9ens utilisent une version modifi\u00e9e et malveillante du client SSH PuTTY pour d\u00e9ployer une porte d\u00e9rob\u00e9e sur les machines des candidats potentiels \u00e0 une offre d&#8217;emploi pour un [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3507,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,195,11],"tags":[],"class_list":["post-3505","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cyberespionnage","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Une version malveillante du client SSH PuTTY est utilis\u00e9e pour d\u00e9ployer une porte d\u00e9rob\u00e9e ! - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-\ufffc\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Une version malveillante du client SSH PuTTY est utilis\u00e9e pour d\u00e9ployer une porte d\u00e9rob\u00e9e !\" \/>\n<meta property=\"og:description\" content=\"Des pirates nord-cor\u00e9ens utilisent une version modifi\u00e9e et malveillante du client SSH PuTTY pour d\u00e9ployer une porte d\u00e9rob\u00e9e sur les machines des candidats potentiels \u00e0 une offre d&#039;emploi pour un faux job chez Amazon. Un processus bien ficel\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-\ufffc\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-21T10:32:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-21T10:38:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/social-41.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Une version malveillante du client SSH PuTTY est utilis\u00e9e pour d\u00e9ployer une porte d\u00e9rob\u00e9e !\" \/>\n<meta name=\"twitter:description\" content=\"Des pirates nord-cor\u00e9ens utilisent une version modifi\u00e9e et malveillante du client SSH PuTTY pour d\u00e9ployer une porte d\u00e9rob\u00e9e sur les machines des candidats potentiels \u00e0 une offre d&#039;emploi pour un faux job chez Amazon. Un processus bien ficel\u00e9.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/social-41.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/21\\\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/21\\\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Une version malveillante du client SSH PuTTY est utilis\u00e9e pour d\u00e9ployer une porte d\u00e9rob\u00e9e !\",\"datePublished\":\"2022-09-21T10:32:48+00:00\",\"dateModified\":\"2022-09-21T10:38:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/21\\\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\\\/\"},\"wordCount\":419,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/21\\\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ab-37.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Cyberespionnage\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/21\\\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/21\\\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/21\\\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\\\/\",\"name\":\"Une version malveillante du client SSH PuTTY est utilis\u00e9e pour d\u00e9ployer une porte d\u00e9rob\u00e9e ! - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/21\\\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/21\\\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ab-37.jpg\",\"datePublished\":\"2022-09-21T10:32:48+00:00\",\"dateModified\":\"2022-09-21T10:38:27+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/21\\\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/21\\\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/21\\\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ab-37.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ab-37.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/21\\\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Une version malveillante du client SSH PuTTY est utilis\u00e9e pour d\u00e9ployer une porte d\u00e9rob\u00e9e !\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Une version malveillante du client SSH PuTTY est utilis\u00e9e pour d\u00e9ployer une porte d\u00e9rob\u00e9e ! - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-\ufffc\/","og_locale":"fr_FR","og_type":"article","og_title":"Une version malveillante du client SSH PuTTY est utilis\u00e9e pour d\u00e9ployer une porte d\u00e9rob\u00e9e !","og_description":"Des pirates nord-cor\u00e9ens utilisent une version modifi\u00e9e et malveillante du client SSH PuTTY pour d\u00e9ployer une porte d\u00e9rob\u00e9e sur les machines des candidats potentiels \u00e0 une offre d'emploi pour un faux job chez Amazon. Un processus bien ficel\u00e9.","og_url":"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-\ufffc\/","og_site_name":"Parlons Techs - Store","article_published_time":"2022-09-21T10:32:48+00:00","article_modified_time":"2022-09-21T10:38:27+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/social-41.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_title":"Une version malveillante du client SSH PuTTY est utilis\u00e9e pour d\u00e9ployer une porte d\u00e9rob\u00e9e !","twitter_description":"Des pirates nord-cor\u00e9ens utilisent une version modifi\u00e9e et malveillante du client SSH PuTTY pour d\u00e9ployer une porte d\u00e9rob\u00e9e sur les machines des candidats potentiels \u00e0 une offre d'emploi pour un faux job chez Amazon. Un processus bien ficel\u00e9.","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/social-41.jpg","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Une version malveillante du client SSH PuTTY est utilis\u00e9e pour d\u00e9ployer une porte d\u00e9rob\u00e9e !","datePublished":"2022-09-21T10:32:48+00:00","dateModified":"2022-09-21T10:38:27+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\/"},"wordCount":419,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/ab-37.jpg","articleSection":["Actualit\u00e9","Cyberespionnage","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\/","url":"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\/","name":"Une version malveillante du client SSH PuTTY est utilis\u00e9e pour d\u00e9ployer une porte d\u00e9rob\u00e9e ! - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/ab-37.jpg","datePublished":"2022-09-21T10:32:48+00:00","dateModified":"2022-09-21T10:38:27+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/ab-37.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/ab-37.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/21\/une-version-malveillante-du-client-ssh-putty-est-utilisee-pour-deployer-une-porte-derobee-%ef%bf%bc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Une version malveillante du client SSH PuTTY est utilis\u00e9e pour d\u00e9ployer une porte d\u00e9rob\u00e9e !"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/3505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=3505"}],"version-history":[{"count":2,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/3505\/revisions"}],"predecessor-version":[{"id":3509,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/3505\/revisions\/3509"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/3507"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=3505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=3505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=3505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}