{"id":137708,"date":"2024-02-13T17:08:46","date_gmt":"2024-02-13T16:08:46","guid":{"rendered":"https:\/\/sftarticles.wpenginepowered.com\/es\/?p=326226"},"modified":"2025-06-12T11:07:31","modified_gmt":"2025-06-12T10:07:31","slug":"microsoft-azure-subit-la-plus-grande-faille-de-securite-de-son-histoire","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/fr\/microsoft-azure-subit-la-plus-grande-faille-de-securite-de-son-histoire\/","title":{"rendered":"Microsoft Azure subit la plus grande faille de s\u00e9curit\u00e9 de son histoire"},"content":{"rendered":"\n<p>Des centaines de comptes <strong>Azure<\/strong>, le service cloud de <strong>Microsoft<\/strong>, auraient \u00e9t\u00e9 compromis lors d&#8217;une violation de s\u00e9curit\u00e9 qui a expos\u00e9 des donn\u00e9es critiques de ses utilisateurs. L&#8217;<a href=\"https:\/\/fr.softonic.com\/articles\/les-donnees-personnelles-de-la-moitie-de-la-france-viennent-detre-divulguees-33-millions-de-francais-sont-en-danger\" target=\"_blank\" rel=\"noopener\" title=\"\">attaque informatique<\/a>, qui a touch\u00e9 de nombreux environnements, a cibl\u00e9 des hauts dirigeants de grandes entreprises.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/2c07ee82-394d-11e7-804a-bc71dd8bf260\/3154456208\/microsoft-azure-logo\" alt=\"Microsoft Azure\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Microsoft Azure<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/microsoft-azure.fr.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\">Acc\u00e9der<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        \r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/microsoft-azure.fr.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<p>Selon la soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/cloud-security\/community-alert-ongoing-malicious-campaign-impacting-azure-cloud-environments\" target=\"_blank\" rel=\"noopener nofollow\" title=\"Proofpoint\"><strong>Proofpoint<\/strong><\/a>, le piratage utilise la m\u00eame campagne malveillante d\u00e9tect\u00e9e en novembre 2023, qui int\u00e8gre des m\u00e9thodes de <strong>vol d&#8217;identifiants par phishing<\/strong> et de prise de contr\u00f4le de comptes dans le cloud (CTO). Cela aiderait les attaquants \u00e0 acc\u00e9der \u00e0 <strong>OfficeHome <\/strong>ainsi qu&#8217;aux applications de <strong>Microsoft 365<\/strong>.<\/p>\n\n\n\n<p>Les auteurs du piratage auraient utilis\u00e9 des <strong>services proxy pour contourner les restrictions g\u00e9ographiques<\/strong> et masquer leur v\u00e9ritable emplacement. Pour mener \u00e0 bien l&#8217;attaque, les cybercriminels ont <strong>incorpor\u00e9 des liens dans les documents<\/strong> qui redirigeaient les utilisateurs vers des sites de phishing. Ces liens avaient g\u00e9n\u00e9ralement pour texte d&#8217;ancrage \u00ab Voir le document \u00bb, ce qui ne soulevait pas de soup\u00e7ons.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/2\/2024\/02\/Phishing-130224-1024x575.jpg\" alt=\"\" class=\"wp-image-326231\" \/><\/figure>\n<\/div>\n\n\n<p>L&#8217;attaque a \u00e9t\u00e9 soigneusement planifi\u00e9e et <strong>a cibl\u00e9 \u00e0 la fois les employ\u00e9s de niveau interm\u00e9diaire et sup\u00e9rieur<\/strong>, bien que la plupart des comptes compromis appartiennent aux premiers. Selon Proofpoint, des postes tels que directeurs des ventes, directeurs de compte, directeurs financiers, vice-pr\u00e9sidents des op\u00e9rations, directeurs financiers, pr\u00e9sidents et PDG \u00e9taient les cibles les plus courantes. Cela a permis aux attaquants d&#8217;acc\u00e9der aux informations \u00e0 travers les niveaux et les domaines des organisations.<\/p>\n\n\n\n<p>Dans ce type d&#8217;attaques, une fois que le compte est compromis, <strong>les cybercriminels d\u00e9ploient leur propre MFA<\/strong> (authentification multifactorielle) pour prolonger l&#8217;acc\u00e8s, par exemple en ajoutant un num\u00e9ro de t\u00e9l\u00e9phone mobile alternatif ou en configurant une application d&#8217;authentification afin que l&#8217;utilisateur ne puisse pas r\u00e9cup\u00e9rer l&#8217;acc\u00e8s. De plus, <strong>les attaquants suppriment toutes les preuves d&#8217;activit\u00e9 suspecte<\/strong> pour effacer leurs traces.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/2c07ee82-394d-11e7-804a-bc71dd8bf260\/3154456208\/microsoft-azure-logo\" alt=\"Microsoft Azure\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Microsoft Azure<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/microsoft-azure.fr.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\">Acc\u00e9der<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        \r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/microsoft-azure.fr.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<p>L&#8217;objectif de ces cyberattaques est le vol de donn\u00e9es et les fraudes financi\u00e8res. Bien qu&#8217;il n&#8217;y ait pas encore de preuves claires pour identifier les auteurs de ces attaques, <strong>on pense qu&#8217;elles ont \u00e9t\u00e9 initi\u00e9es en Russie et au Nigeria<\/strong>, en se basant sur l&#8217;utilisation de fournisseurs d&#8217;acc\u00e8s Internet \u00e0 ligne fixe locaux de ces r\u00e9gions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Des centaines de comptes Azure, le service cloud de Microsoft, auraient \u00e9t\u00e9 compromis lors d&#8217;une violation de s\u00e9curit\u00e9 qui a expos\u00e9 des donn\u00e9es critiques de ses utilisateurs. L&#8217;attaque informatique, qui a touch\u00e9 de nombreux environnements, a cibl\u00e9 des hauts dirigeants de grandes entreprises. Selon la soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 Proofpoint, le piratage utilise la m\u00eame campagne &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/fr\/microsoft-azure-subit-la-plus-grande-faille-de-securite-de-son-histoire\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Microsoft Azure subit la plus grande faille de s\u00e9curit\u00e9 de son histoire&#8221;<\/span><\/a><\/p>\n","protected":false},"author":9256,"featured_media":137709,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":431},"categories":[16761],"tags":[17198,17199,53],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-137708","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-app-subdomain-redirectionmicrosoft-azure","tag-azure","tag-microsoft"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts\/137708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/users\/9256"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/comments?post=137708"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts\/137708\/revisions"}],"predecessor-version":[{"id":161676,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts\/137708\/revisions\/161676"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/media\/137709"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/media?parent=137708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/categories?post=137708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/tags?post=137708"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/usertag?post=137708"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/vertical?post=137708"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/content-category?post=137708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}