
{"id":7136,"date":"2025-07-29T12:34:52","date_gmt":"2025-07-29T10:34:52","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=7136"},"modified":"2025-07-29T12:34:52","modified_gmt":"2025-07-29T10:34:52","slug":"faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/","title":{"rendered":"Faille SharePoint : Les intrusions se multiplient, un groupe de hackers chinois point\u00e9 du doigt"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/miro.medium.com\/v2\/resize:fit:1400\/0*0-i3U4K1nIg_tgEz\" alt=\"What's New in SharePoint: Recent and Upcoming Features in 2024 | by  Sousouni Bajis | Medium\" \/><\/p>\n<h2><strong>La vuln\u00e9rabilit\u00e9 critique dans SharePoint Server, pourtant corrig\u00e9e, continue de faire l\u2019objet d\u2019attaques cibl\u00e9es. Google attribue certaines intrusions \u00e0 un groupe soutenu par la Chine, et alerte sur une g\u00e9n\u00e9ralisation probable du ph\u00e9nom\u00e8ne.<\/strong><\/h2>\n<p>Ce qui ressemblait au d\u00e9part \u00e0 une s\u00e9rie d\u2019attaques isol\u00e9es prend d\u00e9sormais une toute autre dimension. D\u2019apr\u00e8s plusieurs acteurs de la cybers\u00e9curit\u00e9,\u00a0la faille CVE-2025-53770, qui affecte les instances on-premise de SharePoint Server, est au c\u0153ur d\u2019une campagne d\u2019attaques bien plus vaste qu\u2019anticip\u00e9. Et si Microsoft a depuis corrig\u00e9 la vuln\u00e9rabilit\u00e9, la menace persiste pour de nombreuses structures n\u2019ayant pas encore patch\u00e9 leurs infrastructures \u2013 ou l\u2019ayant fait trop tard.<\/p>\n<p>&nbsp;<\/p>\n<h2 class=\"sc-9e5e0317-0 SrXWJ\">Une vague d\u2019intrusions plus ancienne et plus \u00e9tendue que pr\u00e9vu<\/h2>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<p class=\"sc-29e2a271-0 jjhUrQ\">Il n\u2019aura pas fallu 48 heures apr\u00e8s la divulgation publique de la faille CVE-2025-53770 dans\u00a0SharePoint\u00a0pour que la situation prenne un tout autre relief. Ce qui ressemblait encore \u00e0 une s\u00e9rie d\u2019attaques cibl\u00e9es, ponctuelles et relativement contenues s\u2019est transform\u00e9 en tout autre chose \u2013 plus vaste, plus agressif, et surtout beaucoup plus visible.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div>\n<div class=\"div-breakable\" data-adslot-top=\"2117.4375\"><\/div>\n<\/div>\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<p class=\"sc-29e2a271-0 jjhUrQ\">Selon Check Point, les intrusions remonteraient en r\u00e9alit\u00e9 au 7 juillet, soit pr\u00e8s de deux semaines avant les premi\u00e8res observations rapport\u00e9es par Eye Security, qui situait les premi\u00e8res compromissions \u00e0 la mi-juillet. Un gouvernement occidental non nomm\u00e9 aurait \u00e9t\u00e9 vis\u00e9 d\u00e8s cette phase initiale, avant une intensification brutale des attaques autour des 18 et 19 du mois. Depuis, les cibles se sont multipli\u00e9es\u202f: entreprises \u00e9nerg\u00e9tiques, op\u00e9rateurs t\u00e9l\u00e9coms, administrations publiques, \u00e9diteurs de logiciels\u2026 avec une concentration des attaques en Am\u00e9rique du Nord et en Europe.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div>\n<div class=\"div-breakable\" data-adslot-top=\"2365.637451171875\"><\/div>\n<\/div>\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<p class=\"sc-29e2a271-0 jjhUrQ\">CrowdStrike affirme de son c\u00f4t\u00e9 avoir bloqu\u00e9 plusieurs centaines de tentatives d\u2019exploitation en tr\u00e8s peu de temps, ce qui confirme une activit\u00e9 bien plus soutenue que ne le laissaient supposer les premiers rapports.<\/p>\n<p>Sans surprise, toutes ces attaques s\u2019appuient sur la m\u00eame cha\u00eene de vuln\u00e9rabilit\u00e9s pr\u00e9sent\u00e9e au\u00a0Pwn2Own 2025, pourtant\u00a0patch\u00e9e par Microsoft en d\u00e9but de mois. L\u2019entreprise a depuis reconnu que les correctifs initiaux ne suffisaient pas, et que CVE-2025-53770 permettait malgr\u00e9 tout de compromettre des serveurs th\u00e9oriquement \u00e0 jour.<\/p>\n<p>\u00c9videmment, la publication r\u00e9cente d\u2019un exploit fonctionnel sur GitHub n\u2019a rien arrang\u00e9, et plusieurs acteurs malveillants ont depuis \u00e9t\u00e9 observ\u00e9s en train d\u2019en tirer parti, sans qu\u2019il soit possible, \u00e0 ce stade, de parler d\u2019une campagne coordonn\u00e9e. Dans un post LinkedIn, Charles Carmakal, CTO de Google Mandiant, a confirm\u00e9 qu\u2019au moins l\u2019un d\u2019entre eux \u00e9tait li\u00e9 \u00e0 la Chine, et pr\u00e9venu que les intrusions opportunistes devraient se multiplier dans les jours \u00e0 venir\u2026 y compris sur les serveurs SharePoint d\u00e9j\u00e0 patch\u00e9s.<\/p>\n<div style=\"width: 840px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pic.clubic.com\/58c734952321223\/830x545\/smart\/faille-sharepoint-repartition-ge-ographique-des-attaques.png\" alt=\"R\u00e9partition g\u00e9ographique des organisations cibl\u00e9es par les attaques exploitant la faille SharePoint (CVE-2025-53770). \u00a9 Check Point Research\" width=\"830\" height=\"545\" \/><p class=\"wp-caption-text\">R\u00e9partition g\u00e9ographique des organisations cibl\u00e9es par les attaques exploitant la faille SharePoint (CVE-2025-53770). \u00a9 Check Point Research<\/p><\/div>\n<p>&nbsp;<\/p>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<h2 class=\"sc-9e5e0317-0 SrXWJ\">Les correctifs neutralis\u00e9s par les vols de cl\u00e9s<\/h2>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div class=\"div-breakable\" data-adslot-top=\"3533.625\">\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<p class=\"sc-29e2a271-0 jjhUrQ\">C\u2019est l\u00e0 que r\u00e9side la principale inqui\u00e9tude. Car si certains serveurs n\u2019ont toujours pas \u00e9t\u00e9 mis \u00e0 jour, d\u2019autres restent expos\u00e9s\u2026 m\u00eame apr\u00e8s l\u2019application du patch. En cause, une technique d\u2019attaque document\u00e9e, entre autre, par\u00a0Bitdefender\u00a0et Unit 42, qui consiste \u00e0 exploiter la vuln\u00e9rabilit\u00e9 pour d\u00e9poser un webshell (<code>spinstall0.aspx<\/code>) leur permettant d\u2019extraire les\u00a0<em>ValidationKey<\/em>\u00a0et\u00a0<em>DecryptionKey\u202f<\/em>\u2013\u202fdes cl\u00e9s cryptographiques essentielles. Avec ces informations, ils peuvent g\u00e9n\u00e9rer des tokens ou des payloads VIEWSTATE malveillants, afin de maintenir un acc\u00e8s persistant au syst\u00e8me, malgr\u00e9 le correctif.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div>\n<div class=\"div-breakable\" data-adslot-top=\"3782.625\"><\/div>\n<\/div>\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<p class=\"sc-29e2a271-0 jjhUrQ\">Certaines variantes, d\u00e9crites par SentinelOne, \u00e9vitent m\u00eame toute \u00e9criture sur disque\u202f: les attaquants injectent directement des modules .NET en m\u00e9moire, ce qui complique consid\u00e9rablement la d\u00e9tection et l\u2019analyse a posteriori.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div>\n<div class=\"div-breakable\" data-adslot-top=\"3885.074951171875\"><\/div>\n<\/div>\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<h2 class=\"sc-9e5e0317-0 SrXWJ\">Ce que vous devez faire d\u00e8s maintenant<\/h2>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div>\n<div class=\"div-breakable\" data-adslot-top=\"3950.949951171875\"><\/div>\n<\/div>\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<p class=\"sc-29e2a271-0 jjhUrQ\">Les instances SharePoint Online ne sont pas concern\u00e9es. En revanche, pour les versions 2016, 2019 ou Subscription Edition h\u00e9berg\u00e9es en interne, Microsoft et la CISA recommandent :<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div>\n<div class=\"div-breakable\" data-adslot-top=\"4053.400146484375\"><\/div>\n<\/div>\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<ul class=\"sc-741ad86e-0 jXhTWp\">\n<li class=\"sc-741ad86e-2 iQidrR\">d\u2019<strong>appliquer imm\u00e9diatement les derniers correctifs<\/strong>\u00a0publi\u00e9s entre le 18 et le 21 juillet ;<\/li>\n<li class=\"sc-741ad86e-2 iQidrR\">d\u2019<strong>activer AMSI<\/strong>\u00a0(Antimalware Scan Interface) pour intercepter les scripts malveillants \u00e0 l\u2019ex\u00e9cution ;<\/li>\n<li class=\"sc-741ad86e-2 iQidrR\">de\u00a0<strong>r\u00e9g\u00e9n\u00e9rer les cl\u00e9s ASP.NET apr\u00e8s correctif<\/strong>, faute de quoi les anciennes pourraient \u00eatre r\u00e9utilis\u00e9es ;<\/li>\n<li class=\"sc-741ad86e-2 iQidrR\">d\u2019<strong>analyser les logs IIS<\/strong>\u00a0pour rep\u00e9rer\u00a0<code>spinstall0.aspx\u00a0<\/code>ou tout autre anomalie li\u00e9e \u00e0\u00a0<code>w3wp.exe<\/code>\u00a0;<\/li>\n<li class=\"sc-741ad86e-2 iQidrR\">d\u2019<strong>isoler tout serveur compromis<\/strong>, r\u00e9installer SharePoint \u00e0 partir de sources fiables et surveiller les mouvements lat\u00e9raux sur l\u2019ensemble du r\u00e9seau.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div>\n<div class=\"div-breakable\" data-adslot-top=\"4361.5\"><\/div>\n<\/div>\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<p class=\"sc-29e2a271-0 jjhUrQ\">Dans les cas les plus critiques, Microsoft recommande de limiter temporairement l\u2019exposition \u00e0 Internet des serveurs on-premise concern\u00e9s, le temps de d\u00e9ployer toutes les protections. L&rsquo;activation d\u2019un EDR ou d\u2019une solution\u00a0antivirus\u00a0compatible avec AMSI peut \u00e9galement renforcer la d\u00e9tection en profondeur, notamment face aux charges fileless ou aux mouvements lat\u00e9raux.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div>\n<div class=\"div-breakable\" data-adslot-top=\"4522.25\"><\/div>\n<\/div>\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<p class=\"sc-29e2a271-0 jjhUrQ\"><em><small>Sources :\u00a0<\/small><\/em><a class=\"un-styled-linked sc-d926ad77-0 ivVqqI\" href=\"https:\/\/blog.checkpoint.com\/research\/sharepoint-zero-day-cve-2025-53770-actively-exploited-what-security-teams-need-to-know\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-event=\"click\" data-mrf-recirculation=\"AffiliateLink\" data-mrf-link=\"https:\/\/blog.checkpoint.com\/research\/sharepoint-zero-day-cve-2025-53770-actively-exploited-what-security-teams-need-to-know\/\"><em><small>Check Point<\/small><\/em><\/a><em><small>,\u00a0<\/small><\/em><a class=\"un-styled-linked sc-d926ad77-0 ivVqqI\" href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:7353216656967405570\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-event=\"click\" data-mrf-recirculation=\"AffiliateLink\" data-mrf-link=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:7353216656967405570\/\"><em><small>Google via Linkedin<\/small><\/em><\/a><em><small>,\u00a0<\/small><\/em><a class=\"un-styled-linked sc-d926ad77-0 ivVqqI\" href=\"https:\/\/www.sentinelone.com\/blog\/sharepoint-toolshell-zero-day-exploited-in-the-wild-targets-enterprise-servers\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-event=\"click\" data-mrf-recirculation=\"AffiliateLink\" data-mrf-link=\"https:\/\/www.sentinelone.com\/blog\/sharepoint-toolshell-zero-day-exploited-in-the-wild-targets-enterprise-servers\/\"><em><small>SentinelOne<\/small><\/em><\/a><em><small>,\u00a0<\/small><\/em><a class=\"un-styled-linked sc-d926ad77-0 ivVqqI\" href=\"https:\/\/www.bitdefender.com\/en-us\/blog\/businessinsights\/bitdefender-advisory-rce-vulnerability-microsoft-sharepoint-server-cve-2025-53770ce\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-event=\"click\" data-mrf-recirculation=\"AffiliateLink\" data-mrf-link=\"https:\/\/www.bitdefender.com\/en-us\/blog\/businessinsights\/bitdefender-advisory-rce-vulnerability-microsoft-sharepoint-server-cve-2025-53770ce\"><em><small>Bitdefender<\/small><\/em><\/a><em><small>,\u00a0<\/small><\/em><a class=\"un-styled-linked sc-d926ad77-0 ivVqqI\" href=\"https:\/\/unit42.paloaltonetworks.com\/microsoft-sharepoint-cve-2025-49704-cve-2025-49706-cve-2025-53770\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-event=\"click\" data-mrf-recirculation=\"AffiliateLink\" data-mrf-link=\"https:\/\/unit42.paloaltonetworks.com\/microsoft-sharepoint-cve-2025-49704-cve-2025-49706-cve-2025-53770\/\"><em><small>Unit 42<\/small><\/em><\/a><em><small>,\u00a0<\/small><\/em><a class=\"un-styled-linked sc-d926ad77-0 ivVqqI\" href=\"https:\/\/www.crowdstrike.com\/en-us\/blog\/crowdstrike-detects-blocks-sharepoint-zero-day-exploitation\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-event=\"click\" data-mrf-recirculation=\"AffiliateLink\" data-mrf-link=\"https:\/\/www.crowdstrike.com\/en-us\/blog\/crowdstrike-detects-blocks-sharepoint-zero-day-exploitation\/\"><em><small>CrowdStrike<\/small><\/em><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>La vuln\u00e9rabilit\u00e9 critique dans SharePoint Server, pourtant corrig\u00e9e, continue de faire l\u2019objet d\u2019attaques cibl\u00e9es. Google attribue certaines intrusions \u00e0 un groupe soutenu par la Chine, et alerte sur une g\u00e9n\u00e9ralisation [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7137,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,181,12],"tags":[],"class_list":["post-7136","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-internet","category-logiciels"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Faille SharePoint : Les intrusions se multiplient, un groupe de hackers chinois point\u00e9 du doigt - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Faille SharePoint : Les intrusions se multiplient, un groupe de hackers chinois point\u00e9 du doigt - ParlonsTechs\" \/>\n<meta property=\"og:description\" content=\"La vuln\u00e9rabilit\u00e9 critique dans SharePoint Server, pourtant corrig\u00e9e, continue de faire l\u2019objet d\u2019attaques cibl\u00e9es. Google attribue certaines intrusions \u00e0 un groupe soutenu par la Chine, et alerte sur une g\u00e9n\u00e9ralisation [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-29T10:34:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/07\/social_affiche.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Faille SharePoint : Les intrusions se multiplient, un groupe de hackers chinois point\u00e9 du doigt - ParlonsTechs\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/07\/social_affiche.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/07\\\/29\\\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/07\\\/29\\\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Faille SharePoint : Les intrusions se multiplient, un groupe de hackers chinois point\u00e9 du doigt\",\"datePublished\":\"2025-07-29T10:34:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/07\\\/29\\\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\\\/\"},\"wordCount\":854,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/07\\\/29\\\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/ab.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Internet\",\"Logiciels\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/07\\\/29\\\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/07\\\/29\\\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/07\\\/29\\\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\\\/\",\"name\":\"Faille SharePoint : Les intrusions se multiplient, un groupe de hackers chinois point\u00e9 du doigt - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/07\\\/29\\\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/07\\\/29\\\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/ab.jpg\",\"datePublished\":\"2025-07-29T10:34:52+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/07\\\/29\\\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/07\\\/29\\\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/07\\\/29\\\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/ab.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/ab.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/07\\\/29\\\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Faille SharePoint : Les intrusions se multiplient, un groupe de hackers chinois point\u00e9 du doigt\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Faille SharePoint : Les intrusions se multiplient, un groupe de hackers chinois point\u00e9 du doigt - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/","og_locale":"fr_FR","og_type":"article","og_title":"Faille SharePoint : Les intrusions se multiplient, un groupe de hackers chinois point\u00e9 du doigt - ParlonsTechs","og_description":"La vuln\u00e9rabilit\u00e9 critique dans SharePoint Server, pourtant corrig\u00e9e, continue de faire l\u2019objet d\u2019attaques cibl\u00e9es. Google attribue certaines intrusions \u00e0 un groupe soutenu par la Chine, et alerte sur une g\u00e9n\u00e9ralisation [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/","og_site_name":"Parlons Techs - Store","article_published_time":"2025-07-29T10:34:52+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/07\/social_affiche.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_title":"Faille SharePoint : Les intrusions se multiplient, un groupe de hackers chinois point\u00e9 du doigt - ParlonsTechs","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/07\/social_affiche.jpg","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Faille SharePoint : Les intrusions se multiplient, un groupe de hackers chinois point\u00e9 du doigt","datePublished":"2025-07-29T10:34:52+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/"},"wordCount":854,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/07\/ab.jpg","articleSection":["Actualit\u00e9","Internet","Logiciels"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/","url":"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/","name":"Faille SharePoint : Les intrusions se multiplient, un groupe de hackers chinois point\u00e9 du doigt - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/07\/ab.jpg","datePublished":"2025-07-29T10:34:52+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/07\/ab.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/07\/ab.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2025\/07\/29\/faille-sharepoint-les-intrusions-se-multiplient-un-groupe-de-hackers-chinois-pointe-du-doigt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Faille SharePoint : Les intrusions se multiplient, un groupe de hackers chinois point\u00e9 du doigt"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/7136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=7136"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/7136\/revisions"}],"predecessor-version":[{"id":7139,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/7136\/revisions\/7139"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/7137"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=7136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=7136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=7136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}