{"id":3676,"date":"2020-03-05T10:21:13","date_gmt":"2020-03-05T09:21:13","guid":{"rendered":"https:\/\/werle.pro\/?p=3676"},"modified":"2020-03-05T13:06:47","modified_gmt":"2020-03-05T12:06:47","slug":"des-chercheurs-en-securite-chinois-attribuent-onze-annees-de-cyberattaques-a-la-cia","status":"publish","type":"post","link":"https:\/\/werle.pro\/index.php\/2020\/03\/05\/des-chercheurs-en-securite-chinois-attribuent-onze-annees-de-cyberattaques-a-la-cia\/","title":{"rendered":"SSI APT &#8211; Vault7 &#8211; En Chine on attribue onze ann\u00e9es de cyberattaques \u00e0 la CIA"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3674 alignnone size-full\" src=\"https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2020\/03\/6980fb5877d90fbf2e2d8438e1bc1864820985437084852.jpg?resize=630%2C420&#038;ssl=1\" width=\"630\" height=\"420\" data-temp-aztec-id=\"41713799-c847-4dfd-9d31-7c8cd5003f0f\" srcset=\"https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2020\/03\/6980fb5877d90fbf2e2d8438e1bc1864820985437084852.jpg?w=630&amp;ssl=1 630w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2020\/03\/6980fb5877d90fbf2e2d8438e1bc1864820985437084852.jpg?resize=200%2C133&amp;ssl=1 200w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2020\/03\/6980fb5877d90fbf2e2d8438e1bc1864820985437084852.jpg?resize=512%2C341&amp;ssl=1 512w\" sizes=\"(max-width: 630px) 100vw, 630px\" data-recalc-dims=\"1\" \/><\/p>\n<p>\u00ab\u00a0Pour attribuer les cyberattaques, les experts se sont appuy\u00e9s sur les \u00e9l\u00e9ments techniques r\u00e9v\u00e9l\u00e9s par Vault 7, cet ensemble de documents confidentiels qu\u2019un ancien employ\u00e9 de la CIA a fait fuiter en 2017 au travers de WikiLeaks.\u00a0\u00bb<br \/>\n&#8230;<\/p>\n<p>\u00ab\u00a0Au passage, on d\u00e9couvre que la CIA a \u00e9galement utilis\u00e9 en Chine des outils de la NSA, tel que WISTFULTOLL. Ce <em>plugin<\/em> appara\u00eet dans les documents d\u2019Edward Snowden et permet d\u2019extraire des informations depuis un poste Windows 2000, 2003 ou XP.\u00a0\u00bb<\/p>\n<p><a href=\"https:\/\/www.01net.com\/actualites\/des-chercheurs-en-securite-chinois-attribuent-onze-annees-de-cyberattaques-a-la-cia-1868945.html\">https:\/\/www.01net.com\/actualites\/des-chercheurs-en-securite-chinois-attribuent-onze-annees-de-cyberattaques-a-la-cia-1868945.html<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3675 alignnone size-full\" src=\"https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2020\/03\/82d79fc3980ecbb83f666207df265882119081200347907.jpg?resize=1200%2C657&#038;ssl=1\" width=\"1200\" height=\"657\" srcset=\"https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2020\/03\/82d79fc3980ecbb83f666207df265882119081200347907.jpg?w=1294&amp;ssl=1 1294w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2020\/03\/82d79fc3980ecbb83f666207df265882119081200347907.jpg?resize=200%2C109&amp;ssl=1 200w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2020\/03\/82d79fc3980ecbb83f666207df265882119081200347907.jpg?resize=768%2C420&amp;ssl=1 768w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2020\/03\/82d79fc3980ecbb83f666207df265882119081200347907.jpg?resize=512%2C280&amp;ssl=1 512w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" data-recalc-dims=\"1\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00ab\u00a0Pour attribuer les cyberattaques, les experts se sont appuy\u00e9s sur les \u00e9l\u00e9ments techniques r\u00e9v\u00e9l\u00e9s par Vault 7, cet ensemble de documents confidentiels qu\u2019un ancien employ\u00e9 de la CIA a fait fuiter en 2017 au travers de WikiLeaks.\u00a0\u00bb &#8230; \u00ab\u00a0Au passage, on d\u00e9couvre que la CIA a \u00e9galement utilis\u00e9 en Chine des outils de la NSA, &#8230; <a title=\"SSI APT &#8211; Vault7 &#8211; En Chine on attribue onze ann\u00e9es de cyberattaques \u00e0 la CIA\" class=\"read-more\" href=\"https:\/\/werle.pro\/index.php\/2020\/03\/05\/des-chercheurs-en-securite-chinois-attribuent-onze-annees-de-cyberattaques-a-la-cia\/\" aria-label=\"Read more about SSI APT &#8211; Vault7 &#8211; En Chine on attribue onze ann\u00e9es de cyberattaques \u00e0 la CIA\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ALXt-Xi","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3676"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=3676"}],"version-history":[{"count":2,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3676\/revisions"}],"predecessor-version":[{"id":3678,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3676\/revisions\/3678"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=3676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/categories?post=3676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/tags?post=3676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}