{"id":543,"date":"2023-06-19T22:35:41","date_gmt":"2023-06-19T20:35:41","guid":{"rendered":"https:\/\/bl0g.cedricpernet.net\/?page_id=543"},"modified":"2025-06-24T15:43:50","modified_gmt":"2025-06-24T13:43:50","slug":"miscellaneous","status":"publish","type":"page","link":"https:\/\/bl0g.cedricpernet.net\/?page_id=543","title":{"rendered":"Miscellaneous"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"543\" class=\"elementor elementor-543\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b0ea434 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6b0ea434\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-16a3c0cb\" data-id=\"16a3c0cb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ecb9f22 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3ecb9f22\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26513f06 elementor-widget elementor-widget-heading\" data-id=\"26513f06\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">MISC.<br>WRITINGS<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-74d9af8f\" data-id=\"74d9af8f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50ddd133 elementor-widget elementor-widget-text-editor\" data-id=\"50ddd133\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>INTERVIEWS<\/h3>\n<p>Le Monde:<\/p>\n<p>Qui organise les campagnes d\u2019hame\u00e7onnage visant les abonn\u00e9s du \u00ab Monde \u00bb et de \u00ab T\u00e9l\u00e9rama \u00bb ?<br>(quoting, as the article is not free \ud83d\ude42 )<br><br>Le nombre de clients de Traffyque est inconnu, mais le service semble tr\u00e8s populaire : le Fran\u00e7ais C\u00e9dric Pernet, chercheur en s\u00e9curit\u00e9 informatique, a pu <a href=\"https:\/\/cedricpernet.net\/PacketsEverywhere.pdf\">documenter<\/a> plus de 900 sites pi\u00e9g\u00e9s utilisant son infrastructure, en octobre 2024. Des recherches compl\u00e9mentaires montrent que, depuis, le service a \u00e9t\u00e9 utilis\u00e9 sur plus d\u2019un millier d\u2019autres adresses Web. Ces sites ont en g\u00e9n\u00e9ral une dur\u00e9e de vie tr\u00e8s courte, avant d\u2019\u00eatre bloqu\u00e9s ou supprim\u00e9s par les escrocs eux-m\u00eames.<br><a href=\"https:\/\/www.lemonde.fr\/pixels\/article\/2025\/04\/30\/qui-organise-les-campagnes-d-hameconnage-visant-les-abonnes-du-monde-et-de-telerama_6601909_4408996.html\">Link<\/a><\/p>\n<p><br><\/p>\n<p>Mediapart:<br>Bienvenue \u00e0 I-Soon, chez les cybermercenaires qui espionnent \u00e0 la solde de P\u00e9kin<br>(quoting, as the article is not free \ud83d\ude42 )<\/p>\n<p>\u00ab Ce \u201cleak\u201d fournit des informations non seulement sur les capacit\u00e9s techniques mises en place, mais \u00e9galement sur le staff n\u00e9cessaire pour mener \u00e0 bien ces op\u00e9rations. Enfin, il montre \u00e9galement la capacit\u00e9 \u00e0 mener des attaques de front sur plusieurs entit\u00e9s simultan\u00e9ment \u00bb, souligne pour sa part C\u00e9dric Pernet, expert en menaces informatiques chez Trend Micro. Cependant, poursuit-il, \u00ab les outils document\u00e9s et pr\u00e9sent\u00e9s dans cette fuite ne pr\u00e9sentent pas de technologies particuli\u00e8rement avanc\u00e9es \u00bb. La particularit\u00e9 du cyberespionnage chinois, rel\u00e8ve l\u2019expert, auteur de livres sur les menaces APT, n\u2019est pas d\u2019\u00eatre \u00ab plus \u00e9volu\u00e9, mais efficace et constant \u00bb.<br><a href=\"https:\/\/www.mediapart.fr\/journal\/international\/040324\/bienvenue-i-soon-chez-les-cybermercenaires-qui-espionnent-la-solde-de-pekin\">Link<\/a><\/p>\n<p>Le Monde:<br>La Chine nie tout lien avec i-Soon, la soci\u00e9t\u00e9 de cyberespionnage dont les donn\u00e9es ont fuit\u00e9 sur GitHub<br><a href=\"https:\/\/www.lemonde.fr\/pixels\/article\/2024\/02\/23\/la-chine-nie-tout-lien-avec-i-soon-la-societe-de-cyberespionnage-dont-les-donnees-ont-fuite-sur-github_6218128_4408996.html\">Link<\/a><\/p>\n<p>Le Monde:<br>Un rapport l\u00e8ve le voile sur \u00ab Impulse Team \u00bb, un service qui industrialise l\u2019arnaque aux cryptomonnaies<br><a href=\"https:\/\/www.lemonde.fr\/pixels\/article\/2023\/06\/06\/un-rapport-leve-le-voile-sur-impulse-team-un-service-qui-industrialise-l-arnaque-aux-cryptomonnaies_6176439_4408996.html\">Link<\/a><\/p>\n<p>Le Monde:<br>Cyberarnaques : des dizaines d\u2019entreprises fran\u00e7aises vis\u00e9es par une \u00ab fraude au pr\u00e9sident \u00bb<br><a href=\"https:\/\/www.lemonde.fr\/pixels\/article\/2020\/10\/06\/cyberarnaques-des-dizaines-d-entreprises-francaises-visees-par-une-fraude-au-president_6054885_4408996.html\">Link<\/a><\/p>\n<p>Lib\u00e9ration:<br>Comment la gendarmerie fran\u00e7aise a \u00abd\u00e9sinfect\u00e9\u00bb 850 000 machines infect\u00e9es par un logiciel malveillant<br><a href=\"https:\/\/www.liberation.fr\/france\/2019\/08\/28\/comment-la-gendarmerie-francaise-a-desinfecte-850-000-machines-infectees-par-un-logiciel-malveillant_1747865\/\">Link<\/a><\/p>\n<p>Challenges:<br>Collectivit\u00e9s locales, h\u00f4pitaux&#8230; Les nouveaux terrains de jeu des hackers<br><a href=\"https:\/\/www.challenges.fr\/entreprise\/tech-numerique\/collectivites-locales-hopitaux-les-nouveaux-terrains-de-jeu-des-hackers_712126\">Link<\/a><\/p>\n<p>L&#8217;Express:<br>Hackers &#8220;\u00e9thiques&#8221; : ces chevaliers blancs au service des entreprises<br><a href=\"http:\/\/view-source:https:\/\/www.lexpress.fr\/economie\/high-tech\/hackers-ethiques-ces-chevaliers-blancs-au-service-des-entreprises_2156768.html\">Link<\/a><\/p>\n<p>ZDNet:<br>C\u00e9dric Pernet, Trend Micro : &#8220;2015 verra une multiplication du nombre d\u2019attaques m\u00e9diatis\u00e9es&#8221;<br><a href=\"https:\/\/www.zdnet.fr\/actualites\/cedric-pernet-trend-micro-2015-verra-une-multiplication-du-nombre-d-attaques-mediatisees-39815728.htm\">Link<\/a><\/p>\n<p>Qualys:<br>Incidents de s\u00e9curit\u00e9 : qui sont les \u00ab responders \u00bb ?<br><a href=\"https:\/\/magazine.qualys.fr\/conformite-organisation\/incidents-response-interview\/\">Link<\/a><\/p>\n<p>S\u00e9curit\u00e9Off:<br>Attaques APT: L&#8217;\u00eatre humain doit devenir le maillon fort<br><a href=\"https:\/\/www.securiteoff.com\/attaques-apt-letre-humain-devenir-maillon-fort\/\">Link<\/a><\/p>\n<h3>PAPER MAGAZINES<\/h3>\n<p>Techniques de l&#8217;Ing\u00e9nieur:<br>Cyberespionnage : la menace APT<br><a href=\"https:\/\/www.techniques-ingenieur.fr\/base-documentaire\/technologies-de-l-information-th9\/attaques-et-mesures-de-protection-des-si-42313210\/cyberespionnage-la-menace-apt-h5842\/\">Link<\/a><\/p>\n<p>Dalloz IP \/ IT:<br>Le Darknet<br><a href=\"https:\/\/www.calameo.com\/editions-dalloz\/books\/0046483435896936be596\">Link<\/a><\/p>\n<p>MISC Magazine, Hors S\u00e9rie #23<br>DFIR et CTI, une compl\u00e9mentarit\u00e9 id\u00e9ale<br><a href=\"https:\/\/boutique.ed-diamond.com\/les-hors-series\/1576-misc-hs-23.html\">Link<\/a><\/p>\n<p>MISC Magazine #107<br>Utilisation de services en ligne l\u00e9gitimes par les malwares<br><a href=\"https:\/\/connect.ed-diamond.com\/MISC\/misc-107\">Link<\/a><\/p>\n<p>MISC Magazine #87<br>Business E-Mail Compromise : fraude aux faux ordres de virements internationaux<br><a href=\"https:\/\/boutique.ed-diamond.com\/home\/1076-misc-87.html\">Link<\/a><\/p>\n<p>MISC Magazine #86<br>Simulation d&#8217;attaque APT<br><a href=\"https:\/\/boutique.ed-diamond.com\/numeros-deja-parus\/1062-misc-86.html\">Link<\/a><\/p>\n<p>MISC Magazine #85<br>APT: Qui sont les attaquants ?<br><a href=\"https:\/\/boutique.ed-diamond.com\/numeros-deja-parus\/936-misc-85.html\">Link<\/a><\/p>\n<p>MISC Magazine #79<br>APT 101<br><a href=\"https:\/\/boutique.ed-diamond.com\/home\/859-misc-79.html\">Link<\/a><\/p>\n<p>MISC Magazine #68<br>Forensics: La compatibilit\u00e9 \u00e0 la rescousse<br><a href=\"https:\/\/boutique.ed-diamond.com\/numeros-deja-parus\/488-misc68.html\">Link<\/a><\/p>\n<p>MISC Magazine #65<br>D\u00e9tection et classification de malware par YARA<br><a href=\"https:\/\/boutique.ed-diamond.com\/numeros-deja-parus\/447-misc65.html\">Link<\/a><\/p>\n<p>MISC Magazine #61<br>Forensics Corner: Windows Shellbags<br><a href=\"https:\/\/boutique.ed-diamond.com\/numeros-deja-parus\/420-misc61.html\">Link<\/a><\/p>\n<p>MISC Magazine #60<br>Injections Web Malveillantes<br>(in collaboration with Jean-Philippe Teissier)<br><a href=\"https:\/\/boutique.ed-diamond.com\/numeros-deja-parus\/399-misc60.html\">Link<\/a><\/p>\n<p>MISC Magazine #59<br>Analyse de malware avec Cuckoo Sandbox<br><a href=\"https:\/\/boutique.ed-diamond.com\/numeros-deja-parus\/407-misc59.html\">Link<\/a><\/p>\n<p>MISC Magazine #57<br>Forensic : Recherche \u00ab \u00e0 froid \u00bb de malware sur support num\u00e9rique<br><a href=\"https:\/\/boutique.ed-diamond.com\/numeros-deja-parus\/391-misc57.html\">Link<\/a><\/p>\n<p>MISC Magazine, Hors S\u00e9rie #3<br>Analyse de malwares sans reverse engineering<br><a href=\"https:\/\/boutique.ed-diamond.com\/les-hors-series\/368-mischs3.html\">Link<\/a><\/p>\n<p>MISC Magazine #41<br>Blanchiment d&#8217;argent sur Internet<br><a href=\"https:\/\/boutique.ed-diamond.com\/numeros-deja-parus\/256-misc41.html\">Link<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>MISC.WRITINGS INTERVIEWS Le Monde: Qui organise les campagnes d\u2019hame\u00e7onnage visant les abonn\u00e9s du \u00ab Monde \u00bb et de \u00ab T\u00e9l\u00e9rama \u00bb ?(quoting, as the article is not free \ud83d\ude42 ) Le nombre de clients de Traffyque est inconnu, mais le service semble tr\u00e8s populaire : le Fran\u00e7ais C\u00e9dric Pernet, chercheur en s\u00e9curit\u00e9 informatique, a pu [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-543","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/pages\/543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=543"}],"version-history":[{"count":3,"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/pages\/543\/revisions"}],"predecessor-version":[{"id":1111,"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/pages\/543\/revisions\/1111"}],"wp:attachment":[{"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}