{"id":22106,"date":"2021-04-13T16:32:40","date_gmt":"2021-04-13T14:32:40","guid":{"rendered":"https:\/\/test-blog.mailfence.com\/?p=22106"},"modified":"2024-05-30T11:46:26","modified_gmt":"2024-05-30T09:46:26","slug":"analyse-piratage-serveur-microsoft-exchange","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/","title":{"rendered":"Analyse du piratage du serveur Microsoft Exchange"},"content":{"rendered":"\n<p><br>Cela fait maintenant plus d&rsquo;un mois que Microsoft a admis qu&rsquo;elle avait connu une violation de donn\u00e9es sur son serveur <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Microsoft_Exchange_Server\">Microsoft Exchange<\/a> sur site. Les pirates ont pu obtenir des <a href=\"https:\/\/en.wikipedia.org\/wiki\/Superuser\">privil\u00e8ges d&rsquo;administrateur<\/a> (lien en anglais) sur les serveurs affect\u00e9s, acc\u00e9der aux emails et mots de passe des utilisateurs et aux appareils connect\u00e9s sur le m\u00eame r\u00e9seau. Un certain nombre d&rsquo;autres r\u00e9v\u00e9lations ont \u00e9galement \u00e9t\u00e9 faites.<\/p>\n\n\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-le-contexte-du-piratage-du-serveur-microsoft-exchange\">Le contexte du piratage du serveur Microsoft Exchange<\/h2>\n\n\n\n<p>Le <strong>5 janvier 2021<\/strong>, un chercheur de la soci\u00e9t\u00e9 DEVCORE, sp\u00e9cialis\u00e9e dans les tests de s\u00e9curit\u00e9, <a href=\"https:\/\/twitter.com\/orange_8361\/status\/1346401788811825153\">a signal\u00e9 \u00e0 Microsoft<\/a> la premi\u00e8re vuln\u00e9rabilit\u00e9 connue. Ce rapport a ensuite <a href=\"https:\/\/krebsonsecurity.com\/2021\/03\/a-basic-timeline-of-the-exchange-mass-hack\/\">\u00e9t\u00e9 v\u00e9rifi\u00e9 par Microsoft<\/a> le 8 janvier. Plusieurs violations des serveurs de Microsoft Exchange sur site ont \u00e9t\u00e9 observ\u00e9es par plusieurs intervenants au cours du m\u00eame mois. Tous ont alert\u00e9 Microsoft.<\/p>\n\n\n\n<p>Aux alentours des <strong>26 et 27 f\u00e9vrier<\/strong>, les pirates ont commenc\u00e9 \u00e0 scanner en masse les serveurs Microsoft Exchange afin d&rsquo;y introduire des portes d\u00e9rob\u00e9es. Cela semble avoir \u00e9t\u00e9 fait en particulier <a href=\"https:\/\/www.nbcnews.com\/tech\/security\/really-messy-hack-microsofts-email-system-getting-worse-rcna377\">en pr\u00e9vision d&rsquo;un correctif<\/a> (lien en anglais) de Microsoft.<\/p>\n\n\n\n<p>Le <strong>2 mars<\/strong>, Microsoft a <a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/03\/02\/multiple-security-updates-released-for-exchange-server\/\">publi\u00e9 des mises \u00e0 jour <\/a>pour corriger 4 failles de type \u00ab\u00a0zero-day\u00a0\u00bb dans la base de code du serveur Microsoft Exchange. Simultan\u00e9ment, la soci\u00e9t\u00e9 a mis en cause <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/\">un groupe de pirates connus<\/a> (lien en anglais) avec une grande certitude. Plus tard, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/more-hacking-groups-join-microsoft-exchange-attack-frenzy\/\">d&rsquo;autres groupes de cyberattaquants<\/a> (lien en anglais) ont \u00e9t\u00e9 associ\u00e9s.<\/p>\n\n\n\n<p>Le <strong>5 mars<\/strong>, un journaliste connu dans le domaine de la cybers\u00e9curit\u00e9 <a href=\"https:\/\/krebsonsecurity.com\/2021\/03\/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software\/\">a r\u00e9v\u00e9l\u00e9 un scoop<\/a> (lien en anglais) : au moins 30 000 organisations aux \u00c9tats-Unis et des milliers d&rsquo;autres dans le monde entier sont d\u00e9sormais dot\u00e9es de portes d\u00e9rob\u00e9es. Les experts en s\u00e9curit\u00e9 se sont efforc\u00e9s d&rsquo;informer les victimes. Mais ils ont soulign\u00e9 qu&rsquo;il fallait se pr\u00e9parer \u00e0 une autre s\u00e9rie d&rsquo;attaques en raison des portes d\u00e9rob\u00e9es pr\u00e9c\u00e9demment install\u00e9es sur les serveurs affect\u00e9s.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-situation-actuelle-du-piratage-du-serveur-microsoft-exchange\">Situation actuelle du piratage du Serveur Microsoft Exchange<\/h2>\n\n\n\n<p>Le <strong>12 mars 2021<\/strong>, Microsoft <a href=\"https:\/\/twitter.com\/briankrebs\/status\/1370565978153684994\">a twitt\u00e9<\/a> (lien en anglais) qu&rsquo;il restait encore 82 000 serveurs Microsoft Exchange non corrig\u00e9s et expos\u00e9s au probl\u00e8me. Cependant, comme ils n&rsquo;ont pas \u00e9t\u00e9 mis \u00e0 jour \u00e0 temps, un grand nombre de ces serveurs ont continu\u00e9 \u00e0 \u00eatre viol\u00e9s. Entre-temps, les hackers ont d\u00e9ploy\u00e9 un certain nombre de <a href=\"https:\/\/blog.mailfence.com\/fr\/proteger-votre-appareil-contre-les-ransomwares\/\">ran\u00e7ongiciels<\/a> (ransomwares) sur les serveurs d\u00e9j\u00e0 infect\u00e9s.<\/p>\n\n\n\n<p>Le <strong>22 mars<\/strong>, Microsoft a annonc\u00e9 que la faille avait \u00e9t\u00e9 corrig\u00e9e ou att\u00e9nu\u00e9e sur 92 % des serveurs Microsoft Exchange sur site.<\/p>\n\n\n\n<p>Le <strong>12 avril<\/strong>, le CISA a ajout\u00e9 deux nouveaux rapports d&rsquo;analyse de logiciels malveillants (MARs pour Malware Analysis Reports) \u00e0 l&rsquo;<a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-062a\">Alert AA21-062A : \u00ab\u00a0Mitigate Microsoft Exchange Server Vulnerabilities<\/a>\u00ab\u00a0. Microsoft a continu\u00e9 de corriger les probl\u00e8mes li\u00e9s dans la <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2021-Apr\">mise \u00e0 jour de s\u00e9curit\u00e9 d&rsquo;avril 2021<\/a>.<\/p>\n\n\n\n<p>Comme les pirates ont utilis\u00e9 4 failles zero-day diff\u00e9rentes, les encha\u00eenant pour obtenir un acc\u00e8s administrateur sur les serveurs affect\u00e9s, ils ont pu installer des portes d\u00e9rob\u00e9es. Il est donc tr\u00e8s important pour chaque administrateur de serveur Microsoft Exchange sur site, non seulement d&rsquo;appliquer un correctif, mais aussi de rem\u00e9dier \u00e0 toute exploitation ou \u00e0 toute activit\u00e9 persistante identifi\u00e9e (en utilisant <a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/03\/02\/multiple-security-updates-released-for-exchange-server\/\">les directives<\/a> (lien en anglais) connues de Microsoft et <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/current-activity\/2021\/03\/06\/microsoft-ioc-detection-tool-exchange-server-vulnerabilities\">d&rsquo;autres op\u00e9rateurs ind\u00e9pendants<\/a> (lien en anglais)).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-mailfence-n-a-pas-ete-touche\">Mailfence n&rsquo;a pas \u00e9t\u00e9 touch\u00e9<\/h2>\n\n\n\n<p>Nous ne partageons aucun code avec le serveur Microsoft Exchange offert sur site (ou l&rsquo;un de ses services). De ce fait, notre service n&rsquo;a pas \u00e9t\u00e9 touch\u00e9.<\/p>\n\n\n\n<p>Nous l&rsquo;avons \u00e9galement annonc\u00e9 sur notre compte twitter :<\/p>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">We run our own implementation of Microsoft specifications. Mailfence users are not impacted.<\/p>&mdash; Mailfence (@Mailfence) <a href=\"https:\/\/twitter.com\/Mailfence\/status\/1369701176866930700?ref_src=twsrc%5Etfw\">March 10, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">You may have heard that <a href=\"https:\/\/twitter.com\/hashtag\/Microsoft?src=hash&amp;ref_src=twsrc%5Etfw\">#Microsoft<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Exchange?src=hash&amp;ref_src=twsrc%5Etfw\">#Exchange<\/a> got hacked. \ud83d\udd13<br><br>Exchange is not the same as <a href=\"https:\/\/twitter.com\/hashtag\/ActiveSync?src=hash&amp;ref_src=twsrc%5Etfw\">#ActiveSync<\/a> Exchange the protocol  Mailfence uses.<br><br>If your mail is hosted on exchange servers and you are worried about the hack. <a href=\"https:\/\/twitter.com\/hashtag\/Mailfence?src=hash&amp;ref_src=twsrc%5Etfw\">#Mailfence<\/a> has you covered. 1\/2 <a href=\"https:\/\/t.co\/8POnFDtDLc\">pic.twitter.com\/8POnFDtDLc<\/a><\/p>&mdash; Mailfence (@Mailfence) <a href=\"https:\/\/twitter.com\/Mailfence\/status\/1371438664635580420?ref_src=twsrc%5Etfw\">March 15, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-preferez-les-services-prives-par-construction-et-privilegiez-le-chiffrement\">Pr\u00e9f\u00e9rez les services priv\u00e9s par construction et privil\u00e9giez le chiffrement<\/h2>\n\n\n\n<p>Mailfence est un service de messagerie \u00e9lectronique <a href=\"https:\/\/mailfence.com\/fr\/email-securise.jsp\">s\u00e9curis\u00e9<\/a> et <a href=\"https:\/\/mailfence.com\/fr\/email-prive.jsp\">priv\u00e9 <\/a>qui <a href=\"https:\/\/blog.mailfence.com\/fr\/la-securite-la-confidentialite-et-lanonymat-utilisateur\/\">respecte la confidentialit\u00e9 des donn\u00e9es des utilisateurs<\/a> et offre un <a href=\"https:\/\/blog.mailfence.com\/fr\/cryptage-de-bout-en-bout\/\">chiffrement de bout en bout<\/a> des emails. Les donn\u00e9es chiffr\u00e9es de bout en bout restent prot\u00e9g\u00e9es m\u00eame si le serveur est corrompu. Nous pr\u00e9voyons d&rsquo;\u00e9tendre ce type de chiffrement aux messages en clair envoy\u00e9s\/re\u00e7us, ainsi qu&rsquo;au composant Documents. Nous pr\u00e9voyons \u00e9galement de chiffrer les donn\u00e9es au repos stock\u00e9es dans le courant de cette ann\u00e9e, ce qui ajoutera effectivement une nouvelles couche de protection aux donn\u00e9es des utilisateurs. Restez \u00e0 l&rsquo;\u00e9coute !<\/p>\n\n\n\n<p>Suivez-nous sur <a href=\"https:\/\/twitter.com\/mailfence\">Twitter<\/a>\/<a href=\"https:\/\/www.reddit.com\/r\/mailfence\">Reddit<\/a> et tenez-vous constamment inform\u00e9.<\/p>\n\n\n\n<p class=\"has-text-align-right\">Pour plus de d\u00e9tails, visitez notre <a href=\"https:\/\/mailfence.com\/fr\/presse.jsp\">page presse.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cela fait maintenant plus d&rsquo;un mois que Microsoft a admis qu&rsquo;elle avait connu une violation de donn\u00e9es sur son serveur Microsoft Exchange sur site. Les pirates ont pu obtenir des privil\u00e8ges d&rsquo;administrateur (lien en anglais) sur les serveurs affect\u00e9s, acc\u00e9der aux emails et mots de passe des utilisateurs et aux appareils connect\u00e9s sur le m\u00eame [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":85568,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18591,27],"tags":[],"class_list":["post-22106","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mailfence-news","category-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Analyse du piratage du serveur Microsoft Exchange<\/title>\n<meta name=\"description\" content=\"Violation sur un serveur Microsoft Exchange : 30 000 organisations aux USA et des milliers d&#039;autres ailleurs ont \u00e9t\u00e9 pirat\u00e9es.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analyse du piratage du serveur Microsoft Exchange | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"Analyse du piratage du serveur Microsoft Exchange | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-13T14:32:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-30T09:46:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"M Salman Nadeem\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@0xSalman\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"M Salman Nadeem\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/analyse-piratage-serveur-microsoft-exchange\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/analyse-piratage-serveur-microsoft-exchange\\\/\"},\"author\":{\"name\":\"M Salman Nadeem\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/person\\\/0a1800f7a6842b23ccef1107cec8c962\"},\"headline\":\"Analyse du piratage du serveur Microsoft Exchange\",\"datePublished\":\"2021-04-13T14:32:40+00:00\",\"dateModified\":\"2024-05-30T09:46:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/analyse-piratage-serveur-microsoft-exchange\\\/\"},\"wordCount\":776,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/analyse-piratage-serveur-microsoft-exchange\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/43.png\",\"articleSection\":[\"Quoi de neuf Mailfence\",\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/analyse-piratage-serveur-microsoft-exchange\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/analyse-piratage-serveur-microsoft-exchange\\\/\",\"name\":\"Analyse du piratage du serveur Microsoft Exchange\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/analyse-piratage-serveur-microsoft-exchange\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/analyse-piratage-serveur-microsoft-exchange\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/43.png\",\"datePublished\":\"2021-04-13T14:32:40+00:00\",\"dateModified\":\"2024-05-30T09:46:26+00:00\",\"description\":\"Violation sur un serveur Microsoft Exchange : 30 000 organisations aux USA et des milliers d'autres ailleurs ont \u00e9t\u00e9 pirat\u00e9es.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/analyse-piratage-serveur-microsoft-exchange\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/analyse-piratage-serveur-microsoft-exchange\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/analyse-piratage-serveur-microsoft-exchange\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/43.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/43.png\",\"width\":600,\"height\":600,\"caption\":\"dhfhfhg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/analyse-piratage-serveur-microsoft-exchange\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/category\\\/securite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Analyse du piratage du serveur Microsoft Exchange\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mailfence\\\/\",\"https:\\\/\\\/x.com\\\/mailfence\",\"https:\\\/\\\/www.reddit.com\\\/r\\\/Mailfence\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mailfence\",\"https:\\\/\\\/www.instagram.com\\\/mailfence_\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@mailfence\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/person\\\/0a1800f7a6842b23ccef1107cec8c962\",\"name\":\"M Salman Nadeem\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"caption\":\"M Salman Nadeem\"},\"description\":\"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.\",\"sameAs\":[\"www.linkedin.com\\\/in\\\/mohammadsalmannadeem\",\"https:\\\/\\\/x.com\\\/0xSalman\"],\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/author\\\/msalman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Analyse du piratage du serveur Microsoft Exchange","description":"Violation sur un serveur Microsoft Exchange : 30 000 organisations aux USA et des milliers d'autres ailleurs ont \u00e9t\u00e9 pirat\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/","og_locale":"fr_FR","og_type":"article","og_title":"Analyse du piratage du serveur Microsoft Exchange | Mailfence Blog","og_description":"Analyse du piratage du serveur Microsoft Exchange | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2021-04-13T14:32:40+00:00","article_modified_time":"2024-05-30T09:46:26+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png","type":"image\/png"}],"author":"M Salman Nadeem","twitter_card":"summary_large_image","twitter_creator":"@0xSalman","twitter_site":"@mailfence","twitter_misc":{"\u00c9crit par":"M Salman Nadeem","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/"},"author":{"name":"M Salman Nadeem","@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962"},"headline":"Analyse du piratage du serveur Microsoft Exchange","datePublished":"2021-04-13T14:32:40+00:00","dateModified":"2024-05-30T09:46:26+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/"},"wordCount":776,"publisher":{"@id":"https:\/\/blog.mailfence.com\/fr\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png","articleSection":["Quoi de neuf Mailfence","S\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/","url":"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/","name":"Analyse du piratage du serveur Microsoft Exchange","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png","datePublished":"2021-04-13T14:32:40+00:00","dateModified":"2024-05-30T09:46:26+00:00","description":"Violation sur un serveur Microsoft Exchange : 30 000 organisations aux USA et des milliers d'autres ailleurs ont \u00e9t\u00e9 pirat\u00e9es.","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png","width":600,"height":600,"caption":"dhfhfhg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/fr\/analyse-piratage-serveur-microsoft-exchange\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/fr\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"https:\/\/blog.mailfence.com\/fr\/category\/securite\/"},{"@type":"ListItem","position":3,"name":"Analyse du piratage du serveur Microsoft Exchange"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/fr\/#website","url":"https:\/\/blog.mailfence.com\/fr\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/fr\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962","name":"M Salman Nadeem","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","caption":"M Salman Nadeem"},"description":"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.","sameAs":["www.linkedin.com\/in\/mohammadsalmannadeem","https:\/\/x.com\/0xSalman"],"url":"https:\/\/blog.mailfence.com\/fr\/author\/msalman\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts\/22106","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/comments?post=22106"}],"version-history":[{"count":12,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts\/22106\/revisions"}],"predecessor-version":[{"id":82522,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts\/22106\/revisions\/82522"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/media\/85568"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/media?parent=22106"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/categories?post=22106"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/tags?post=22106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}