{"id":1103,"date":"2017-05-15T09:08:09","date_gmt":"2017-05-15T09:08:09","guid":{"rendered":"https:\/\/www.dsconsultant.net\/blog\/?p=1103"},"modified":"2017-05-15T14:52:23","modified_gmt":"2017-05-15T14:52:23","slug":"cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes","status":"publish","type":"post","link":"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes","title":{"rendered":"Cyber-attaque Ransonsoware &#8211; WanaCrypt attention aux applications obsol\u00e8tes"},"content":{"rendered":"<blockquote><p>Ce lundi 15 mai, de nombreuses DSI vont se r\u00e9veiller avec la gueule de bois apr\u00e8s le passage ce week-end d&rsquo;une tornade non pr\u00e9vue: WanaCrypt.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-1106 size-medium\" src=\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/wanacrypt.jpg?resize=300%2C150&#038;ssl=1\" alt=\"wanacrypt\" width=\"300\" height=\"150\" srcset=\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/wanacrypt.jpg?resize=300%2C150&amp;ssl=1 300w, https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/wanacrypt.jpg?resize=768%2C383&amp;ssl=1 768w, https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/wanacrypt.jpg?w=846&amp;ssl=1 846w\" sizes=\"(max-width: 300px) 100vw, 300px\" data-recalc-dims=\"1\" \/>Source\u00a0: <em><a href=\"https:\/\/www.zdnet.fr\/blogs\/green-si\/heureux-comme-un-wanacrypt-dans-un-jeu-d-applications-obsoletes-39852428.htm\">Heureux comme un WanaCrypt dans un jeu d&rsquo;applications obsol\u00e8tes &#8211; ZDNet<\/a><\/em><\/p><\/blockquote>\n<p>Comme je vous le rappelai encore en mars 2016\u00a0suite aux attaques renouvel\u00e9es de \u00ab\u00a0Locky\u00a0\u00bb, les ransomwares, sont les \u00ab\u00a0nouvelles\u00a0\u00bb\u00a0menaces s\u00e9v\u00e8res qui peuvent co\u00fbter \u00a0tr\u00e8s tr\u00e8s ch\u00e8res.<\/p>\n<p>Facebook.com\/dsconsultant.net\/Locky<\/p>\n<p>Pourtant quelques r\u00e9flexes simples peuvent vous permettre d&rsquo;\u00e9viter le pire.<\/p>\n<p><!--more--><\/p>\n<p>Pour rappel: les ransonwares sont des petits logiciels cr\u00e9\u00e9s par des escrocs qui vont crypter vos fichiers et tenter de vous proposer la cl\u00e9 de d\u00e9cryptage moyennant une ran\u00e7on. Bien entendu souvent payer ne servira \u00e0 rien, les escrocs ne prendront pas toujours le risque de vous recontacter pour vous fournir la cl\u00e9 apr\u00e8s que vous ayez payer&#8230;.<br \/>\nhttps:\/\/www.avast.com\/fr-fr\/c-ransomware<\/p>\n<p>N\u00e9c\u00e9ssaire partout, mais indispensable sur Windows, un simple antivirus m\u00eame gratuit peut souvent vous \u00e9viter le pire, et surtout, plus que jamais, vous devez avoir des sauvegardes de vos donn\u00e9es, sur plusieurs jours et sur un syst\u00e8me ou seul votre sauvegarde peut \u00e9crire. Un rappel \u00e9galement maintenir \u00e0 jour votre syt\u00e8me, car d\u00e8s qu&rsquo;une faille de s\u00e9curit\u00e9 est r\u00e9v\u00e9l\u00e9e, il y a toujours des \u00ab\u00a0criminels\u00a0\u00bb, pour s&rsquo;y engouffrer. \u00a0Criminels ? Un terme un peu fort ? Quand on s&rsquo;attaque \u00e0 des h\u00f4pitaux et\u00a0autres organismes vitaux, il n&rsquo;y a plus\u00a0d&rsquo;autres mots. Ce fl\u00e9au devrait \u00eatre trait\u00e9 comme tel et ces gens comme des grands criminels&#8230;<\/p>\n<p>Avast vous prot\u00e8ge contre le ransomware WanaCrypt0r 2.0 qui a infect\u00e9 NHS et Telefonica. Avec d\u00e9j\u00e0 d\u00e9j\u00e0 plus de 199 000 infections dans 104 pays ne prenez pas de risques, v\u00e9rifier vos mises \u00e0 jour et rest\u00e9 prot\u00e9g\u00e9.<\/p>\n<p>Apr\u00e8s avoir encod\u00e9 vos fichiers, il vous est demand\u00e9 une ran\u00e7on \u00e0 partir de 300 $ en \u00e9quivalent Bitcoins.<\/p>\n<p>Le ransomware change les noms d&rsquo;extension de fichier affect\u00e9s \u00e0 \u00ab .WNCRY \u00bb, donc un fichier infect\u00e9 ressemblera \u00e0 quelque chose comme: original_name_of_file.jpg.WNCRY, par exemple. Les fichiers crypt\u00e9s sont \u00e9galement marqu\u00e9s par la cha\u00eene \u00ab WANACRY! \u00bb<\/p>\n<p>Avast d\u00e9tecte toutes les versions connues de WanaCrypt0r 2.0, mais bien s\u00fbr, il est vivement recommand\u00e9 \u00e0 tous les utilisateurs de Windows de maintenir \u00e0 jour leur syst\u00e8me avec les derniers correctifs disponibles.<br \/>\n<span style=\"text-decoration: underline;\"><a href=\"https:\/\/blog.avast.com\/ransomware-that-infected-telefonica-and-nhs-hospitals-is-spreading-aggressively-with-over-50000-attacks-so-far-today\">Plus de d\u00e9tails sur le blog Avast\u00a0(en anglais)&#8230;\u00a0<\/a><\/span><\/p>\n<p>Avast continuera \u00e0 suivre cette \u00e9pid\u00e9mie et mettre \u00e0 jour son blog lorsque nous avons d&rsquo;autres mises \u00e0 jour.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ce lundi 15 mai, de nombreuses DSI vont se r\u00e9veiller avec la gueule de bois apr\u00e8s le passage ce week-end d&rsquo;une tornade non pr\u00e9vue: WanaCrypt. Source\u00a0: Heureux comme un WanaCrypt dans un jeu d&rsquo;applications obsol\u00e8tes &#8211; ZDNet Comme je vous le rappelai encore en mars 2016\u00a0suite aux attaques renouvel\u00e9es de \u00ab\u00a0Locky\u00a0\u00bb, les ransomwares, sont les [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1106,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":""},"categories":[40,5,4],"tags":[26,70,67,68,69],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber-attaque Ransonsoware - WanaCrypt attention aux applications obsol\u00e8tes - Mes Notes, Astuces &amp; Conseils informatiques<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber-attaque Ransonsoware - WanaCrypt attention aux applications obsol\u00e8tes - Mes Notes, Astuces &amp; Conseils informatiques\" \/>\n<meta property=\"og:description\" content=\"Ce lundi 15 mai, de nombreuses DSI vont se r\u00e9veiller avec la gueule de bois apr\u00e8s le passage ce week-end d&rsquo;une tornade non pr\u00e9vue: WanaCrypt. Source\u00a0: Heureux comme un WanaCrypt dans un jeu d&rsquo;applications obsol\u00e8tes &#8211; ZDNet Comme je vous le rappelai encore en mars 2016\u00a0suite aux attaques renouvel\u00e9es de \u00ab\u00a0Locky\u00a0\u00bb, les ransomwares, sont les [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes\" \/>\n<meta property=\"og:site_name\" content=\"Mes Notes, Astuces &amp; Conseils informatiques\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dsconsultant.net\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-15T09:08:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-05-15T14:52:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/wanacrypt.jpg?fit=846%2C422&#038;ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"846\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dominique Schos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/#website\",\"url\":\"https:\/\/dsconsultant.net\/blog\/\",\"name\":\"Mes Notes, Astuces &amp; Conseils informatiques\",\"description\":\"Dominique Schos Consultant Conseil informatique Maroc\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dsconsultant.net\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/wanacrypt.jpg?fit=846%2C422&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/wanacrypt.jpg?fit=846%2C422&ssl=1\",\"width\":846,\"height\":422},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes#webpage\",\"url\":\"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes\",\"name\":\"Cyber-attaque Ransonsoware - WanaCrypt attention aux applications obsol\u00e8tes - Mes Notes, Astuces &amp; Conseils informatiques\",\"isPartOf\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes#primaryimage\"},\"datePublished\":\"2017-05-15T09:08:09+00:00\",\"dateModified\":\"2017-05-15T14:52:23+00:00\",\"author\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92\"},\"breadcrumb\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/dsconsultant.net\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber-attaque Ransonsoware &#8211; WanaCrypt attention aux applications obsol\u00e8tes\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92\",\"name\":\"Dominique Schos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g\",\"caption\":\"Dominique Schos\"},\"description\":\"De MacOS 1.0 en 1984 \u00e0 OSX12 Monteray en passant par le mythique OSX, de MS-DOS 1 \u00e0 Windows11, de IOS Apple \u00e0 Android, des premiers \\\"Tchat\\\" sur ICQ \u00e0 Facebook Live, je ne me lasse pas de \\\"flirter\\\" avec ces technologies et moyens de communications que j'aime mettre \u00e0 votre service...\",\"sameAs\":[\"https:\/\/www.dsconsultant.net\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber-attaque Ransonsoware - WanaCrypt attention aux applications obsol\u00e8tes - Mes Notes, Astuces &amp; Conseils informatiques","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes","og_locale":"fr_FR","og_type":"article","og_title":"Cyber-attaque Ransonsoware - WanaCrypt attention aux applications obsol\u00e8tes - Mes Notes, Astuces &amp; Conseils informatiques","og_description":"Ce lundi 15 mai, de nombreuses DSI vont se r\u00e9veiller avec la gueule de bois apr\u00e8s le passage ce week-end d&rsquo;une tornade non pr\u00e9vue: WanaCrypt. Source\u00a0: Heureux comme un WanaCrypt dans un jeu d&rsquo;applications obsol\u00e8tes &#8211; ZDNet Comme je vous le rappelai encore en mars 2016\u00a0suite aux attaques renouvel\u00e9es de \u00ab\u00a0Locky\u00a0\u00bb, les ransomwares, sont les [&hellip;]","og_url":"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes","og_site_name":"Mes Notes, Astuces &amp; Conseils informatiques","article_publisher":"https:\/\/www.facebook.com\/dsconsultant.net\/","article_published_time":"2017-05-15T09:08:09+00:00","article_modified_time":"2017-05-15T14:52:23+00:00","og_image":[{"width":846,"height":422,"url":"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/wanacrypt.jpg?fit=846%2C422&ssl=1","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Dominique Schos","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/dsconsultant.net\/blog\/#website","url":"https:\/\/dsconsultant.net\/blog\/","name":"Mes Notes, Astuces &amp; Conseils informatiques","description":"Dominique Schos Consultant Conseil informatique Maroc","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dsconsultant.net\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes#primaryimage","url":"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/wanacrypt.jpg?fit=846%2C422&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/wanacrypt.jpg?fit=846%2C422&ssl=1","width":846,"height":422},{"@type":"WebPage","@id":"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes#webpage","url":"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes","name":"Cyber-attaque Ransonsoware - WanaCrypt attention aux applications obsol\u00e8tes - Mes Notes, Astuces &amp; Conseils informatiques","isPartOf":{"@id":"https:\/\/dsconsultant.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes#primaryimage"},"datePublished":"2017-05-15T09:08:09+00:00","dateModified":"2017-05-15T14:52:23+00:00","author":{"@id":"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92"},"breadcrumb":{"@id":"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dsconsultant.net\/blog\/pcwindows\/cyber-attaque-ransonsoware-wanacrypt-attention-aux-applications-obsoletes#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/dsconsultant.net\/blog"},{"@type":"ListItem","position":2,"name":"Cyber-attaque Ransonsoware &#8211; WanaCrypt attention aux applications obsol\u00e8tes"}]},{"@type":"Person","@id":"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92","name":"Dominique Schos","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g","caption":"Dominique Schos"},"description":"De MacOS 1.0 en 1984 \u00e0 OSX12 Monteray en passant par le mythique OSX, de MS-DOS 1 \u00e0 Windows11, de IOS Apple \u00e0 Android, des premiers \"Tchat\" sur ICQ \u00e0 Facebook Live, je ne me lasse pas de \"flirter\" avec ces technologies et moyens de communications que j'aime mettre \u00e0 votre service...","sameAs":["https:\/\/www.dsconsultant.net"]}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/wanacrypt.jpg?fit=846%2C422&ssl=1","_links":{"self":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/posts\/1103"}],"collection":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/comments?post=1103"}],"version-history":[{"count":0,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/posts\/1103\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/media\/1106"}],"wp:attachment":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/media?parent=1103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/categories?post=1103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/tags?post=1103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}