{"id":4505,"date":"2020-05-12T18:31:14","date_gmt":"2020-05-12T17:31:14","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=4505"},"modified":"2020-05-15T18:41:10","modified_gmt":"2020-05-15T17:41:10","slug":"rapport-de-lanssi-sur-le-groupe-de-cybercriminels-silence","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2020\/05\/12\/rapport-de-lanssi-sur-le-groupe-de-cybercriminels-silence\/","title":{"rendered":"Rapport de l&#8217;ANSSI sur le groupe de cybercriminels Silence"},"content":{"rendered":"<p>L&#8217;ANSSI vient de publier un rapport d\u00e9di\u00e9 au groupe de cybercriminels russophones d\u00e9nomm\u00e9 Silence du fait que ses protagonistes ont pour habitude de rester discrets entre deux campagne d\u2019attaques.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<blockquote><p><em>&#8220;Au total, de juin 2016 \u00e0 juin 2019, Silence aurait d\u00e9rob\u00e9 environ 4,2 millions de dollars \u00e0 des banques&#8221;<\/em><\/p><\/blockquote>\n<p>Le choix des cibles de Silence est diff\u00e9rent de celui d&#8217;autres groupes cybercriminels russophones car il a commenc\u00e9 \u00e0 s&#8217;attaquer aux organisations bas\u00e9es en Russie avant de s&#8217;attaquer aux banques et organisations situ\u00e9es en Asie, Europe, Am\u00e9rique latine et en Afrique.<\/p>\n<p>&nbsp;<\/p>\n<p>Le rapport de l&#8217;ANSSI rel\u00e8ve que le groupe Silence exploite notamment la vuln\u00e9rabilit\u00e9 des\u00a0 \u00e9tablissements bancaires ne b\u00e9n\u00e9ficiant pas de la <strong>certification PCI-DSS.<\/strong> Son mode op\u00e9ratoire est l\u2019utilisation d&#8217;e-mails de phishing cibl\u00e9s, se faisant parfois passer pour des institutions bancaires connues, ou envoy\u00e9s depuis des adresses l\u00e9gitimes d\u2019employ\u00e9s d\u2019institutions pr\u00e9c\u00e9demment compromis par le groupe. Ces e-mails contiennent des pi\u00e8ces jointes malveillantes. Une fois la pi\u00e8ce jointe ouverte par l\u2019une des cibles, le groupe a recours \u00e0 des outils logiciels afin de se propager sur le syst\u00e8me pour analyser et comprendre le fonctionnement du Syst\u00e8me d\u2019Information (SI) de la cible. Une fois en place dans le SI, les attaquants visent les applications de contr\u00f4le des distributeurs automatiques de billets.<\/p>\n<p>&nbsp;<\/p>\n<iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fmouillere.com%2Funiversconvergents%2Fwp-content%2Fuploads%2F2020%2F05%2FLE-GROUPE-CYBERCRIMINEL-SILENCE.pdf&hl=fr&embedded=true\" class=\"gde-frame\" style=\"width:100%; height:500px; border: none;\" scrolling=\"no\"><\/iframe>\n<p class=\"gde-text\"><a href=\"https:\/\/mouillere.com\/universconvergents\/wp-content\/uploads\/2020\/05\/LE-GROUPE-CYBERCRIMINEL-SILENCE.pdf\" class=\"gde-link\">T\u00e9l\u00e9charger (PDF, 438KB)<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.zdnet.fr\/actualites\/cybercriminalite-le-silence-est-d-or-39903527.htm\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.zdnet.fr\/actualites\/cybercriminalite-le-silence-est-d-or-39903527.htm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&#8217;ANSSI vient de publier un rapport d\u00e9di\u00e9 au groupe de cybercriminels russophones d\u00e9nomm\u00e9 Silence du fait que ses protagonistes ont pour habitude de rester discrets entre deux campagne d\u2019attaques.<\/p>\n","protected":false},"author":1,"featured_media":4507,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20,74],"tags":[67],"class_list":["post-4505","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","category-it","tag-anssi"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2020\/05\/EXeKJBZUcAEkOac.png?fit=779%2C438&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-1aF","jetpack-related-posts":[{"id":3820,"url":"https:\/\/mouillere.com\/universconvergents\/2020\/03\/06\/ransomware-et-continuite-dactivite\/","url_meta":{"origin":4505,"position":0},"title":"Ransomware et continuit\u00e9 d\u2019activit\u00e9","author":"Fred","date":"6 mars 2020","format":false,"excerpt":"L\u2019ANSSI a publi\u00e9 le 5 f\u00e9vrier 2020 son rapport sur \"l\u2019\u00e9tat de la menace ran\u00e7ongiciel \u00e0 l\u2019encontre des entreprises et institutions\". \"Un ran\u00e7ongiciel est un code malveillant emp\u00eachant la victime d\u2019acc\u00e9der au contenu de ses fichiers afin de lui extorquer de l\u2019argent\" \"Ces codes malveillants repr\u00e9sentent actuellement la menace informatique\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2020\/03\/Capture-d%E2%80%99e%CC%81cran-2020-03-06-a%CC%80-09.43.34.jpg?fit=1200%2C489&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2020\/03\/Capture-d%E2%80%99e%CC%81cran-2020-03-06-a%CC%80-09.43.34.jpg?fit=1200%2C489&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2020\/03\/Capture-d%E2%80%99e%CC%81cran-2020-03-06-a%CC%80-09.43.34.jpg?fit=1200%2C489&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2020\/03\/Capture-d%E2%80%99e%CC%81cran-2020-03-06-a%CC%80-09.43.34.jpg?fit=1200%2C489&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2020\/03\/Capture-d%E2%80%99e%CC%81cran-2020-03-06-a%CC%80-09.43.34.jpg?fit=1200%2C489&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6322,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/10\/27\/usages-de-lia-et-menaces-informatiques-pesant-sur-les-avocats-juristes\/","url_meta":{"origin":4505,"position":1},"title":"Usages de l&#8217;IA et menaces informatiques pesant sur les Avocats &#038; Juristes","author":"Fred","date":"27 octobre 2024","format":false,"excerpt":"Wolters Kluwer vient de publier un rapport sur le futur des avocats et juristes, ce qui pose la question des usages de l'IA et des menaces informatiques pesant sur les professionnels du droit. L'IA accompagne les professionnels du droit principalement dans la recherche et la synth\u00e8se de la r\u00e8glementation et\u2026","rel":"","context":"Dans &quot;Avocat&quot;","block_context":{"text":"Avocat","link":"https:\/\/mouillere.com\/universconvergents\/category\/avocat\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/10\/2024-RapportAvocatsFaceAuFutur.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/10\/2024-RapportAvocatsFaceAuFutur.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/10\/2024-RapportAvocatsFaceAuFutur.jpg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/10\/2024-RapportAvocatsFaceAuFutur.jpg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1551,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/12\/02\/un-rapport-senatorial-preconise-un-renforcement-des-pouvoirs-de-lanssi\/","url_meta":{"origin":4505,"position":2},"title":"Un rapport s\u00e9natorial pr\u00e9conise un renforcement des pouvoirs de l\u2019Anssi","author":"Fred","date":"2 d\u00e9cembre 2015","format":false,"excerpt":"Le s\u00e9nateur UDI Michel Can\u00e9vet s\u2019est pench\u00e9 sur l\u2019Anssi dans le cadre d\u2019un contr\u00f4le budg\u00e9taire men\u00e9 sur l\u2019ann\u00e9e 2015. Pour l'\u00e9lu, l\u2019agence... http:\/\/www.zdnet.fr\/actualites\/un-rapport-senatorial-preconise-un-renforcement-des-pouvoirs-de-l-anssi-39829168.htm http:\/\/www.senat.fr\/rap\/l15-164-39\/l15-164-391.pdf \u00a0","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/12\/AnssiBudg.jpg?fit=500%2C299&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":6268,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/09\/24\/fuites-de-donnees-dans-le-secteur-social\/","url_meta":{"origin":4505,"position":3},"title":"Fuites de donn\u00e9es dans le secteur social","author":"Fred","date":"24 septembre 2024","format":false,"excerpt":"2023 et 2024 ont \u00e9t\u00e9 marqu\u00e9s par de nombreux incidents ciblant des entit\u00e9s du secteur social g\u00e9rant des donn\u00e9es \u00e0 caract\u00e8re personnel (la CAF, France Travail, etc.). Le Centre gouvernemental de veille, d\u2019alerte et de r\u00e9ponse aux attaques informatiques (CERT-FR) de l'ANSSI propose un retour d\u2019exp\u00e9rience sur la gestion de\u2026","rel":"","context":"Dans &quot;Donn\u00e9es personnelles&quot;","block_context":{"text":"Donn\u00e9es personnelles","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/donnees-personnelles\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/09\/2024-12-18-ANSSI-EXFILTRATION-DE-DONNEES-DU-SECTEUR-SOCIAL.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/09\/2024-12-18-ANSSI-EXFILTRATION-DE-DONNEES-DU-SECTEUR-SOCIAL.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/09\/2024-12-18-ANSSI-EXFILTRATION-DE-DONNEES-DU-SECTEUR-SOCIAL.jpeg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/09\/2024-12-18-ANSSI-EXFILTRATION-DE-DONNEES-DU-SECTEUR-SOCIAL.jpeg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":5810,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/01\/08\/menaces-informatiques-ciblant-le-secteur-des-telecommunications\/","url_meta":{"origin":4505,"position":4},"title":"Menaces informatiques ciblant le secteur des t\u00e9l\u00e9communications","author":"Fred","date":"8 janvier 2024","format":false,"excerpt":"L\u2019ANSSI pr\u00e9sente les menace informatiques ciblant le secteur des t\u00e9l\u00e9communications supercritique au regard de leurs finalit\u00e9s lucratives, d'espionnage et de d\u00e9stabilisation. https:\/\/www.zdnet.fr\/actualites\/espionnage-et-exfiltration-de-donnees-l-anssi-devoile-le-plus-grand-danger-cyber-pour-le-secteur-des-telecoms-39963168.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Virus.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Virus.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Virus.jpeg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Virus.jpeg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":6496,"url":"https:\/\/mouillere.com\/universconvergents\/2025\/03\/06\/cloud-cybersecurite-souverainete\/","url_meta":{"origin":4505,"position":5},"title":"Cloud : cybers\u00e9curit\u00e9 &#038; souverainet\u00e9","author":"Fred","date":"6 mars 2025","format":false,"excerpt":"Alors que Microsoft finalise son projet garantissant \u00e0 ses utilisateurs europ\u00e9ens que leurs donn\u00e9es restent localis\u00e9es dans des centres de donn\u00e9es bas\u00e9es dans dans un pays de l'Union europ\u00e9enne ou au sein d'un pays membre de l'association europ\u00e9enne de libre \u00e9change (Suisse, Liechtenstein, Norv\u00e8ge, Islande), ce qui ne devrait pas\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2025\/03\/2025-02-190-ANSSI-Cloud-MenaceInformatique.jpg?fit=1024%2C768&ssl=1&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/4505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=4505"}],"version-history":[{"count":2,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/4505\/revisions"}],"predecessor-version":[{"id":4561,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/4505\/revisions\/4561"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/4507"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=4505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=4505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=4505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}