{"id":39211,"date":"2017-02-17T11:50:08","date_gmt":"2017-02-17T16:50:08","guid":{"rendered":"http:\/\/isarta.com\/infos\/?p=39211"},"modified":"2017-02-17T14:08:19","modified_gmt":"2017-02-17T19:08:19","slug":"les-mots-de-passe-les-plus-prises-des-pirates","status":"publish","type":"post","link":"https:\/\/isarta.com\/infos\/les-mots-de-passe-les-plus-prises-des-pirates\/","title":{"rendered":"Les mots de passe les plus pris\u00e9s des pirates"},"content":{"rendered":"<p class=\"p1\"><span style=\"font-size: 20px; color: #000080;\"><span class=\"s1\">Les <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.oqlf.gouv.qc.ca\/ressources\/bibliotheque\/dictionnaires\/Internet\/fiches\/8872816.html\" target=\"_blank\">pots de miel <\/a><\/span>(<i>honeypots)<\/i> sont des outils informatiques <\/span><span class=\"s2\">(programmes, syst\u00e8mes, serveurs, etc.) <\/span><span class=\"s1\">servant<\/span> <span class=\"s1\">\u00e0 attirer et \u00e0 pi\u00e9ger les pirates informatiques. Ils<\/span> <span class=\"s5\">r\u00e9v\u00e8lent des informations pr\u00e9cieuses pour pr\u00e9venir d&rsquo;\u00e9ventuelles <\/span><span class=\"s2\">cyberattaques<\/span><span class=\"s6\">.<\/span><span class=\"s5\"> Voici quelques donn\u00e9es rep\u00e9r\u00e9es par <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/www.rapid7.com\/\" target=\"_blank\">Rapid7&#8230;<\/a><\/span><\/span><\/span><\/p>\n<p class=\"p1\"><img loading=\"lazy\" class=\"aligncenter wp-image-40366 \" src=\"http:\/\/isarta.com\/infos\/wp-content\/uploads\/2017\/02\/cyberattaque_pirate_informatique_Fotolia_49045449_S-1.jpg\" width=\"729\" height=\"486\" srcset=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2017\/02\/cyberattaque_pirate_informatique_Fotolia_49045449_S-1.jpg 849w, https:\/\/isarta.com\/infos\/wp-content\/uploads\/2017\/02\/cyberattaque_pirate_informatique_Fotolia_49045449_S-1-300x200.jpg 300w, https:\/\/isarta.com\/infos\/wp-content\/uploads\/2017\/02\/cyberattaque_pirate_informatique_Fotolia_49045449_S-1-768x512.jpg 768w\" sizes=\"(max-width: 729px) 100vw, 729px\" \/><\/p>\n<p class=\"p1\"><span style=\"font-size: 12px; color: #808080;\">17 f\u00e9vrier 2017<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><i> <\/i>Rapid7* &#8211; une entreprise sp\u00e9cialis\u00e9e en <strong>s\u00e9curit\u00e9<\/strong> informatique, \u00e0 la t\u00eate du <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/information.rapid7.com\/rs\/495-KNT-277\/images\/rapid7-project-heisenberg-cloud-research-report.pdf\" target=\"_blank\">projet Heisenberg,<\/a><\/span><b>\u00a0<\/b>s\u2019appuie sur plusieurs <i>honeypots <\/i>\u00e0 travers le monde pour recueillir des renseignements. Les <strong><em>honeypots<\/em><\/strong> permettent de collecter diff\u00e9rentes informations sur les <em><strong>hackers,<\/strong><\/em> notamment sur la mani\u00e8re dont ils proc\u00e8dent pour attaquer certaines infrastructures. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Ces strat\u00e9gies utilis\u00e9es par les soci\u00e9t\u00e9s de s\u00e9curit\u00e9 informatique fonctionnent comme des <strong>leurres<\/strong> et sont donc sp\u00e9cialement con\u00e7ues pour attirer les pirates. En gros, les <i>honeypots<\/i> permettent d\u2019identifier et de suivre toutes les activit\u00e9s des <em>cybercriminels<\/em> en vue de se <strong>prot\u00e9ger<\/strong> contre d\u2019\u00e9ventuelles <strong>attaques. <\/strong><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Depuis un an, l\u2019entreprise a pu <strong>analyser<\/strong> plus de 220\u00a0000\u00a0tentatives de<strong> connexions<\/strong> enregistr\u00e9es, dont plus de 5\u00a0000 adresses IP situ\u00e9es dans 119\u00a0pays diff\u00e9rents, principalement en provenance de la Chine (39,9\u00a0%) et des \u00c9tats-Unis (24,9\u00a0%). <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Selon les <strong>donn\u00e9es<\/strong> recueillies, voici les tops 10 des noms d\u2019utilisateur et des mots de passe les plus utilis\u00e9s par les pirates:<span class=\"Apple-converted-space\">\u00a0 \u00a0<\/span><\/span><\/p>\n<h2 class=\"p3\"><span style=\"font-size: 24px; color: #000080;\"><span class=\"s2\"><b>Top 10 des <\/b><\/span><span class=\"s1\"><b>noms d\u2019utilisateur<\/b><\/span><span class=\"s2\"><b>:<\/b><\/span><\/span><\/h2>\n<ul>\n<li class=\"p4\"><span class=\"s1\">administrator (34,9\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Administrator (24,2\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">user1 (3,9\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">admin (2,2\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">alex (1,8\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">pos (1\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">demo (0,9\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">db2admin 0,8\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Admin (0,6\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">sql (0,6\u00a0%)<\/span><\/li>\n<\/ul>\n<h2 class=\"p3\"><span style=\"font-size: 24px; color: #000080;\"><span class=\"s2\"><b>Top 10 des<\/b><\/span><span class=\"s1\"><b> mots de passe<\/b><\/span><span class=\"s2\"><b>:<\/b><\/span><\/span><\/h2>\n<ul>\n<li class=\"p4\"><span class=\"s1\">x (5,36\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Zz (4,79\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">St@rt123 (3,62\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">1 (2,57\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">P@ssw0rd (2,55\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">bl4ck4ndwhite (2,32\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">admin (2,32\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">alex (1,82\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">\u2026\u2026 (1,21\u00a0%)<\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">administrator (1,01\u00a0%)<\/span><\/li>\n<\/ul>\n<p class=\"p2\"><span class=\"s1\">Si vous utilisez l\u2019un de ces noms d\u2019utilisateur et\/ou l\u2019un de ces mots de passe, il serait pr\u00e9f\u00e9rable pour vous de le <strong>changer<\/strong> imm\u00e9diatement.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">*Fond\u00e9e \u00e0 Boston en 2000, <i><strong>Rapid7<\/strong> est une entreprise qui offre des solutions de s\u00e9curit\u00e9 informatique. Elle compte plus de 550 employ\u00e9s et poss\u00e8de un chiffre d\u2019affaires \u00e9valu\u00e9 \u00e0 plus de 105 millions\u00a0$.<\/i><\/span><\/p>\n<p class=\"p5\">\n<div class=\"brdr2\"><\/div>\n<p class=\"p7\" style=\"text-align: center;\"><em><span style=\"color: #000080;\">Vous avez aim\u00e9 cette publication? <strong><a style=\"color: #000080;\" href=\"http:\/\/www.ars-solutions.ca\/blogue\/\" target=\"_blank\">Cliquez ici pour d\u2019autres articles de Simon Fontaine!<\/a><\/strong><\/span><\/em><\/p>\n<p class=\"p5\">\n<div class=\"brdr2\"><\/div>\n<h2 class=\"p5\" style=\"text-align: center;\"><\/h2>\n<div class=\"likebtn_container\" style=\"clear:both;text-align:center;\"><!-- LikeBtn.com BEGIN --><span class=\"likebtn-wrapper\"  data-identifier=\"post_39211\"  data-site_id=\"5cc1ecd16fd08b776710d1e9\"  data-theme=\"drop\"  data-btn_size=\"100\"  data-icon_l=\"false\"  data-icon_d=\"false\"  data-icon_l_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/happy.png#64794\"  data-icon_d_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/sleep.png#64796\"  data-icon_size=\"58\"  data-icon_l_c=\"#771414\"  data-bg_c=\"#ffffff\"  data-bg_c_v=\"#ffffff\"  data-brdr_c=\"#ffffff\"  data-f_size=\"11\"  data-f_family=\"Tahoma\"  data-counter_fs=\"b\"  data-lang=\"fr\"  data-ef_voting=\"wobble\"  data-dislike_enabled=\"false\"  data-counter_type=\"percent\"  data-counter_show=\"false\"  data-tooltip_enabled=\"false\"  data-tooltip_like_show_always=\"true\"  data-white_label=\"true\"  data-i18n_like=\"Aimer \/ Partager\"  data-i18n_dislike=\"Pas aim\u00e9\"  data-style=\"\"  data-unlike_allowed=\"\"  data-show_copyright=\"\"  data-item_url=\"https:\/\/isarta.com\/infos\/les-mots-de-passe-les-plus-prises-des-pirates\/\"  data-item_title=\"Les mots de passe les plus pris\u00e9s des pirates\"  data-item_image=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2017\/02\/cyberattaque_pirate_informatique_Fotolia_49045449_S.jpg\"  data-item_date=\"2017-02-17T11:50:08-05:00\"  data-engine=\"WordPress\"  data-plugin_v=\"2.6.54\"  data-prx=\"https:\/\/isarta.com\/infos\/wp-admin\/admin-ajax.php?action=likebtn_prx\"  data-event_handler=\"likebtn_eh\" ><\/span><!-- LikeBtn.com END --><\/p>\n<hr size=\"3\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Les pots de miel (honeypots) sont des outils informatiques (programmes, syst\u00e8mes, serveurs, etc.) servant \u00e0 attirer et \u00e0 pi\u00e9ger les pirates informatiques. Ils r\u00e9v\u00e8lent des informations pr\u00e9cieuses pour pr\u00e9venir d&rsquo;\u00e9ventuelles cyberattaques. Voici quelques donn\u00e9es rep\u00e9r\u00e9es par Rapid7&#8230;<\/p>\n<div class=\"likebtn_container\" style=\"clear:both;text-align:center;\"><!-- LikeBtn.com BEGIN --><span class=\"likebtn-wrapper\"  data-identifier=\"post_39211\"  data-site_id=\"5cc1ecd16fd08b776710d1e9\"  data-theme=\"drop\"  data-btn_size=\"100\"  data-icon_l=\"false\"  data-icon_d=\"false\"  data-icon_l_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/happy.png#64794\"  data-icon_d_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/sleep.png#64796\"  data-icon_size=\"58\"  data-icon_l_c=\"#771414\"  data-bg_c=\"#ffffff\"  data-bg_c_v=\"#ffffff\"  data-brdr_c=\"#ffffff\"  data-f_size=\"11\"  data-f_family=\"Tahoma\"  data-counter_fs=\"b\"  data-lang=\"fr\"  data-ef_voting=\"wobble\"  data-dislike_enabled=\"false\"  data-counter_type=\"percent\"  data-counter_show=\"false\"  data-tooltip_enabled=\"false\"  data-tooltip_like_show_always=\"true\"  data-white_label=\"true\"  data-i18n_like=\"Aimer \/ Partager\"  data-i18n_dislike=\"Pas aim\u00e9\"  data-style=\"\"  data-unlike_allowed=\"\"  data-show_copyright=\"\"  data-item_url=\"https:\/\/isarta.com\/infos\/les-mots-de-passe-les-plus-prises-des-pirates\/\"  data-item_title=\"Les mots de passe les plus pris\u00e9s des pirates\"  data-item_image=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2017\/02\/cyberattaque_pirate_informatique_Fotolia_49045449_S.jpg\"  data-item_date=\"2017-02-17T11:50:08-05:00\"  data-engine=\"WordPress\"  data-plugin_v=\"2.6.54\"  data-prx=\"https:\/\/isarta.com\/infos\/wp-admin\/admin-ajax.php?action=likebtn_prx\"  data-event_handler=\"likebtn_eh\" ><\/span><!-- LikeBtn.com END --><hr size=\"3\"><\/div>","protected":false},"author":62,"featured_media":40365,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[175,137,1],"tags":[],"_links":{"self":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/39211"}],"collection":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/comments?post=39211"}],"version-history":[{"count":12,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/39211\/revisions"}],"predecessor-version":[{"id":40566,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/39211\/revisions\/40566"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/media\/40365"}],"wp:attachment":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/media?parent=39211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/categories?post=39211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/tags?post=39211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}