
{"id":6486,"date":"2024-04-29T14:09:52","date_gmt":"2024-04-29T12:09:52","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=6486"},"modified":"2024-04-29T14:13:47","modified_gmt":"2024-04-29T12:13:47","slug":"des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/","title":{"rendered":"Des hackers utilisent une faille obsol\u00e8te de Microsoft Office pour d\u00e9ployer le malware Colbalt Strike"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/pic.clubic.com\/v1\/images\/1862551\/raw?fit=max&amp;width=1200&amp;hash=e03b12e7f7588951c452c572c8306bbb44453372\" alt=\"Les hackers utilisent une ancienne faille de s\u00e9curit\u00e9 de Microsoft Office pour lancer Cobalt Strike \u00a9 Koshiro K \/ Shutterstock\" \/><\/p>\n<h2><strong>L&rsquo;attaque, qui n&rsquo;a pas encore \u00e9t\u00e9 revendiqu\u00e9e, a utilis\u00e9 une ancienne faille de type zero day de Microsoft Office, d\u00e9tect\u00e9e en 2017, pour introduire le malware Cobalt Strike dans un faux manuel militaire am\u00e9ricain.<\/strong><\/h2>\n<p class=\"marty-paragraph-left\">D\u00e9cid\u00e9ment, on ne peut pas dire que les hackers ne soient pas sensibles au gaspillage. Apr\u00e8s le groupe\u00a0Lazarus qui a d\u00e9poussi\u00e9r\u00e9 son vieux malware KaolinRAT\u00a0pour le rendre plus puissant, c&rsquo;est au tour d&rsquo;une ancienne faille zero day de Microsoft Office d&rsquo;\u00eatre exploit\u00e9e par un groupe pour l&rsquo;heure encore inconnu des autorit\u00e9s et chercheurs en cybers\u00e9curit\u00e9.<\/p>\n<p class=\"marty-paragraph-left\">Et non content de faire du neuf avec du vieux, les hackers utilisent Cobalt Strike, un outil d\u00e9velopp\u00e9 pour tester les vuln\u00e9rabilit\u00e9s d&rsquo;un syst\u00e8me et dont une partie du code aurait \u00e9t\u00e9 copi\u00e9e. Ce d\u00e9tournement a d\u00e9j\u00e0 \u00e9t\u00e9 op\u00e9r\u00e9 dans une campagne de\u00a0malware bancaire, qui avait \u00e9galement exploit\u00e9 une vieille faille Office. Cette nouvelle mode est-elle en passe de devenir une norme dans le cybercrime ?<\/p>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<h2 class=\"marty-title\">Cobalt Strike, le favori des hackers<\/h2>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<p class=\"marty-paragraph-left\">On sait que le d\u00e9tournement est la base de nombreuses campagnes de cyberpiratage. Mais celui de Cobalt Strike est plut\u00f4t original. Ce dernier a \u00e9t\u00e9 cr\u00e9\u00e9 en 2012 pour am\u00e9liorer les capacit\u00e9s de l&rsquo;outil de simulation d&rsquo;attaque\u00a0Metasploit Framework. En 2015, Cobalt Strike 3.0 est lanc\u00e9 comme une plateforme autonome d&rsquo;\u00e9mulation de menaces. Mais d\u00e8s 2016, les chercheurs en cybers\u00e9curit\u00e9 de Proofpoint ont d\u00e9couvert qu&rsquo;il \u00e9tait utilis\u00e9 par des hackers, et pas des petits clients, mais plut\u00f4t des gros bonnets tels que les APT. La d\u00e9mocratisation de Cobalt Strike est annonc\u00e9e, avec une augmentation de son d\u00e9tournement \u00e0 des fins malveillantes de 161 % entre 2019 et 2021.<\/p>\n<p class=\"marty-paragraph-left\">Il est devenu un outil de choix pour les cybercriminels en raison de sa polyvalence, de sa facilit\u00e9 d&rsquo;utilisation et de sa capacit\u00e9 \u00e0 \u00eatre personnalis\u00e9 pour des\u00a0campagnes sp\u00e9cifiques, comme celle du malware \u00ab\u00a0Lockean\u00a0\u00bb, qui a cibl\u00e9 la France en 2021.<\/p>\n<p class=\"marty-paragraph-left\">Cobalt Strike est polyvalent, il permet d&rsquo;installer des virus, de voler des informations tout en passant sous les radars des machines qu&rsquo;il infecte. Il adore exploiter les failles zero day pour \u00eatre directement op\u00e9rationnel. Il a notamment \u00e9t\u00e9 utilis\u00e9 par un gang de\u00a0pirates ukrainiens, d\u00e9sormais sous les verrous, lors d&rsquo;attaques de ransomwares dans 71 pays.<\/p>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<h2 class=\"marty-title\">Une m\u00e9thode de d\u00e9ploiement qui s\u00e8me le doute sur l&rsquo;identit\u00e9 des hackers et leur cible<\/h2>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<p class=\"marty-paragraph-left\">Une \u00e9quation \u00e0 deux inconnues fait cependant buter les chercheurs. Qui sont les hackers, et qui ciblent-ils ? Si l&rsquo;on se penche sur la m\u00e9thode, on peut conclure que la cible serait l&rsquo;Ukraine. En effet, l&rsquo;exploitation de failles zero day est la m\u00e9thode la plus violente et directe pour atteindre une cible. Les hackers ont utilis\u00e9 la faille CVE-2017-8570 pour lancer Cobalt Strike, d\u00e9j\u00e0 d\u00e9ploy\u00e9 pour cibler l&rsquo;Ukraine en 2022. Il \u00e9tait dissimul\u00e9 dans un faux fichier Excel de salaires de militaires ukrainiens. En l&rsquo;occurrence, il s&rsquo;agit d&rsquo;un PowerPoint SlideShow pr\u00e9sentant un manuel de mat\u00e9riel militaire am\u00e9ricain. Premi\u00e8re similitude.<\/p>\n<p class=\"marty-paragraph-left\">Ensuite, les chercheurs de Deep Instinct ont pu identifier que l&rsquo;\u00e9chantillon avait \u00e9t\u00e9 upload\u00e9 depuis l&rsquo;Ukraine, ce qui pourrait sugg\u00e9rer un exercice de \u00ab Red Teaming \u00bb, technique utilis\u00e9e en cybers\u00e9curit\u00e9 pour tester les menaces cyber. Une deuxi\u00e8me phase de d\u00e9ploiement a \u00e9t\u00e9 effectu\u00e9e avec un VPN en Russie, et enfin, la balise finale Beacon de Cobalt Strike (Beacon est la partie Command &amp; Control de Colbalt Strike, la plus virulente) a \u00e9t\u00e9 enregistr\u00e9e \u00e0 Varsovie, en Pologne.<\/p>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<div class=\"marty-cell-media\">\n<p><span class=\"marty-picture-link\" data-href=\"aHR0cHM6Ly9waWMuY2x1YmljLmNvbS92MS9pbWFnZXMvMjEyMzk4MS9yYXc=\"><picture class=\"marty-picture-no-link\"><source srcset=\"https:\/\/pic.clubic.com\/v1\/images\/2123981\/raw.webp?fit=max&amp;width=1200&amp;hash=04f9ddc72c63f6cf77692019d0676cebcb5dc8c6\" type=\"image\/webp\" \/><source srcset=\"https:\/\/pic.clubic.com\/v1\/images\/2123981\/raw?fit=max&amp;width=1200&amp;hash=ca76373be56103c749ac445bc13c66b9da15c510\" type=\"image\/jpeg\" \/><img loading=\"lazy\" decoding=\"async\" class=\"marty-image\" src=\"https:\/\/pic.clubic.com\/v1\/images\/2123981\/raw?fit=max&amp;width=1200&amp;hash=ca76373be56103c749ac445bc13c66b9da15c510\" alt=\"Les campagnes de malware peuvent toucher les particuliers \u00a9 KS JAY \/ Shutterstock\" width=\"1200\" height=\"800\" border=\"0\" data-src-raw=\"https:\/\/pic.clubic.com\/v1\/images\/2123981\/raw\" \/><\/picture><\/span><\/p>\n<div class=\"marty-caption\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<p class=\"marty-paragraph-left\">Les hackers sont-ils russes ou des alli\u00e9s de l&rsquo;Ukraine ? Rien n&rsquo;est \u00e9tabli, en tous les cas du c\u00f4t\u00e9 des chercheurs, qui \u00e9cartent cependant la Russie comme origine de l&rsquo;attaque. Cette nouvelle campagne montre la vuln\u00e9rabilit\u00e9 des pays face \u00e0 des hackers toujours plus ing\u00e9nieux et doit nous rappeler que nous devons rester vigilants. Les attaques de malwares ou de ransomwares ne proviennent pas que de gangs c\u00e9l\u00e8bres et ne touchent pas que des pays.<\/p>\n<p class=\"marty-paragraph-left\">C&rsquo;est pourquoi Clubic a s\u00e9lectionn\u00e9 pour vous\u00a0des\u00a0outils pour vous pr\u00e9munir contre ces ransomwares\u00a0qui peuvent piller vos donn\u00e9es ainsi que votre compte en banque.<\/p>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<p class=\"marty-paragraph-left\"><small><em>\u00a0<\/em><\/small><small><em>HackRead<\/em><\/small><small><em>,\u00a0<\/em><\/small><small><em>Deep Instinct<\/em><\/small><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;attaque, qui n&rsquo;a pas encore \u00e9t\u00e9 revendiqu\u00e9e, a utilis\u00e9 une ancienne faille de type zero day de Microsoft Office, d\u00e9tect\u00e9e en 2017, pour introduire le malware Cobalt Strike dans un [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6488,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,195,11],"tags":[],"class_list":["post-6486","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cyberespionnage","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Des hackers utilisent une faille obsol\u00e8te de Microsoft Office pour d\u00e9ployer le malware Colbalt Strike - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Des hackers utilisent une faille obsol\u00e8te de Microsoft Office pour d\u00e9ployer le malware Colbalt Strike - Parlons Techs\" \/>\n<meta property=\"og:description\" content=\"L&rsquo;attaque, qui n&rsquo;a pas encore \u00e9t\u00e9 revendiqu\u00e9e, a utilis\u00e9 une ancienne faille de type zero day de Microsoft Office, d\u00e9tect\u00e9e en 2017, pour introduire le malware Cobalt Strike dans un [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-29T12:09:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-29T12:13:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/source-40.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"L\u00e9ticia KWABONG\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Des hackers utilisent une faille obsol\u00e8te de Microsoft Office pour d\u00e9ployer le malware Colbalt Strike - Parlons Techs\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/source-40.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"L\u00e9ticia KWABONG\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/29\\\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/29\\\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\\\/\"},\"author\":{\"name\":\"L\u00e9ticia KWABONG\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/d25fa33e557eb1a1a17047a25737fda9\"},\"headline\":\"Des hackers utilisent une faille obsol\u00e8te de Microsoft Office pour d\u00e9ployer le malware Colbalt Strike\",\"datePublished\":\"2024-04-29T12:09:52+00:00\",\"dateModified\":\"2024-04-29T12:13:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/29\\\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\\\/\"},\"wordCount\":752,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/29\\\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ab-66.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Cyberespionnage\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/29\\\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/29\\\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/29\\\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\\\/\",\"name\":\"Des hackers utilisent une faille obsol\u00e8te de Microsoft Office pour d\u00e9ployer le malware Colbalt Strike - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/29\\\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/29\\\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ab-66.jpg\",\"datePublished\":\"2024-04-29T12:09:52+00:00\",\"dateModified\":\"2024-04-29T12:13:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/d25fa33e557eb1a1a17047a25737fda9\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/29\\\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/29\\\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/29\\\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ab-66.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ab-66.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/29\\\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Des hackers utilisent une faille obsol\u00e8te de Microsoft Office pour d\u00e9ployer le malware Colbalt Strike\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/d25fa33e557eb1a1a17047a25737fda9\",\"name\":\"L\u00e9ticia KWABONG\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g\",\"caption\":\"L\u00e9ticia KWABONG\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/leticia\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Des hackers utilisent une faille obsol\u00e8te de Microsoft Office pour d\u00e9ployer le malware Colbalt Strike - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/","og_locale":"fr_FR","og_type":"article","og_title":"Des hackers utilisent une faille obsol\u00e8te de Microsoft Office pour d\u00e9ployer le malware Colbalt Strike - Parlons Techs","og_description":"L&rsquo;attaque, qui n&rsquo;a pas encore \u00e9t\u00e9 revendiqu\u00e9e, a utilis\u00e9 une ancienne faille de type zero day de Microsoft Office, d\u00e9tect\u00e9e en 2017, pour introduire le malware Cobalt Strike dans un [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/","og_site_name":"Parlons Techs - Store","article_published_time":"2024-04-29T12:09:52+00:00","article_modified_time":"2024-04-29T12:13:47+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/source-40.jpg","type":"image\/jpeg"}],"author":"L\u00e9ticia KWABONG","twitter_card":"summary_large_image","twitter_title":"Des hackers utilisent une faille obsol\u00e8te de Microsoft Office pour d\u00e9ployer le malware Colbalt Strike - Parlons Techs","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/source-40.jpg","twitter_misc":{"\u00c9crit par":"L\u00e9ticia KWABONG","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/"},"author":{"name":"L\u00e9ticia KWABONG","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/d25fa33e557eb1a1a17047a25737fda9"},"headline":"Des hackers utilisent une faille obsol\u00e8te de Microsoft Office pour d\u00e9ployer le malware Colbalt Strike","datePublished":"2024-04-29T12:09:52+00:00","dateModified":"2024-04-29T12:13:47+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/"},"wordCount":752,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/ab-66.jpg","articleSection":["Actualit\u00e9","Cyberespionnage","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/","url":"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/","name":"Des hackers utilisent une faille obsol\u00e8te de Microsoft Office pour d\u00e9ployer le malware Colbalt Strike - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/ab-66.jpg","datePublished":"2024-04-29T12:09:52+00:00","dateModified":"2024-04-29T12:13:47+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/d25fa33e557eb1a1a17047a25737fda9"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/ab-66.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/ab-66.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/29\/des-hackers-utilisent-une-faille-obsolete-de-microsoft-office-pour-deployer-le-malware-colbalt-strike\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Des hackers utilisent une faille obsol\u00e8te de Microsoft Office pour d\u00e9ployer le malware Colbalt Strike"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/d25fa33e557eb1a1a17047a25737fda9","name":"L\u00e9ticia KWABONG","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g","caption":"L\u00e9ticia KWABONG"},"sameAs":["https:\/\/parlonstechs.com\/"],"url":"https:\/\/parlonstechs.com\/all\/author\/leticia\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/6486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=6486"}],"version-history":[{"count":2,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/6486\/revisions"}],"predecessor-version":[{"id":6490,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/6486\/revisions\/6490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/6488"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=6486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=6486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=6486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}