{"id":516,"date":"2021-06-14T10:49:00","date_gmt":"2021-06-14T08:49:00","guid":{"rendered":"http:\/\/cboessy.com\/?p=516"},"modified":"2021-05-27T10:56:10","modified_gmt":"2021-05-27T08:56:10","slug":"piratage-de-colonial-pipeline","status":"publish","type":"post","link":"https:\/\/cboessy.com\/index.php\/2021\/06\/14\/piratage-de-colonial-pipeline\/","title":{"rendered":"Piratage de Colonial Pipeline"},"content":{"rendered":"\n<p>Mis hors ligne. Les serveurs de Darkside, le groupe de pirates informatiques derri\u00e8re la cyberattaque ayant vis\u00e9 l&rsquo;op\u00e9rateur d&rsquo;ol\u00e9oducs am\u00e9ricain Colonial Pipeline la semaine derni\u00e8re, ont \u00e9t\u00e9 mis hors service, a affirm\u00e9 ce vendredi la firme de cybers\u00e9curit\u00e9 Recorded Future. Le hacker a admis que le ran\u00e7ongiciel Darkside avait perdu l\u2019acc\u00e8s \u00e0 plusieurs des serveurs que le groupe utilise pour h\u00e9berger son blog ou se faire payer. Accessible via le navigateur TOR sur le darknet, la version clandestine d\u2019Internet, le site de Darkside \u00e9tait inaccessible ce vendredi matin.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.20minutes.fr\/high-tech\/3041835-20210514-rancongiciel-darkside-pirate-pipeline-etats-unis-filiale-francaise-toshiba-mis-hors-service\" target=\"_blank\" rel=\"noreferrer noopener\">vers l&rsquo;article<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mis hors ligne. Les serveurs de Darkside, le groupe de pirates informatiques derri\u00e8re la cyberattaque ayant vis\u00e9 l&rsquo;op\u00e9rateur d&rsquo;ol\u00e9oducs am\u00e9ricain Colonial Pipeline la semaine derni\u00e8re, ont \u00e9t\u00e9 mis hors service, a affirm\u00e9 ce vendredi la firme de cybers\u00e9curit\u00e9 Recorded Future. Le hacker a admis que le ran\u00e7ongiciel Darkside avait perdu l\u2019acc\u00e8s \u00e0 plusieurs des serveurs&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[44],"class_list":["post-516","post","type-post","status-publish","format-standard","hentry","category-technologies","tag-cyberattaque"],"_links":{"self":[{"href":"https:\/\/cboessy.com\/index.php\/wp-json\/wp\/v2\/posts\/516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cboessy.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cboessy.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cboessy.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cboessy.com\/index.php\/wp-json\/wp\/v2\/comments?post=516"}],"version-history":[{"count":1,"href":"https:\/\/cboessy.com\/index.php\/wp-json\/wp\/v2\/posts\/516\/revisions"}],"predecessor-version":[{"id":521,"href":"https:\/\/cboessy.com\/index.php\/wp-json\/wp\/v2\/posts\/516\/revisions\/521"}],"wp:attachment":[{"href":"https:\/\/cboessy.com\/index.php\/wp-json\/wp\/v2\/media?parent=516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cboessy.com\/index.php\/wp-json\/wp\/v2\/categories?post=516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cboessy.com\/index.php\/wp-json\/wp\/v2\/tags?post=516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}