{"id":1213,"date":"2024-10-31T18:48:15","date_gmt":"2024-10-31T17:48:15","guid":{"rendered":"https:\/\/ayrilys.com\/?p=1213"},"modified":"2024-10-31T18:50:13","modified_gmt":"2024-10-31T17:50:13","slug":"pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams","status":"publish","type":"post","link":"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/","title":{"rendered":"Pour enr\u00f4ler ses victimes, les cyberpirates de Black Basta passent par Teams"},"content":{"rendered":"\n<p class=\"has-large-font-size\"><strong>Pour enr\u00f4ler ses victimes, les cyberpirates de Black Basta passent par Teams<\/strong><\/p>\n\n\n\n<p>Les membres du groupe Black Basta, \u00e0 l&rsquo;origine du ransomware du m\u00eame nom, se servent de Microsoft Teams pour engager la conversation avec ses victimes et les amener \u00e0 t\u00e9l\u00e9charger des outils de surveillance \u00e0 distance.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099530.jpg\" alt=\"Les cyberpirates de Black Basta utilisent le chat de Teams pour se faire passer pour des personnes de l'assistance informatique. (Cr\u00e9dit Microsoft)\" title=\"Les cyberpirates de Black Basta utilisent le chat de Teams pour se faire passer pour des personnes de l'assistance informatique. (Cr\u00e9dit Microsoft)\"\/><figcaption class=\"wp-element-caption\">Les cyberpirates de Black Basta utilisent le chat de Teams pour se faire passer pour des personnes de l&rsquo;assistance informatique. (Cr\u00e9dit Microsoft)<\/figcaption><\/figure>\n\n\n\n<p>Avec le d\u00e9veloppement des outils collaboratifs en entreprise, les cybercriminels ont trouv\u00e9 un moyen de dialoguer en direct avec des salari\u00e9s et les pousser \u00e0 les aider dans leurs attaques. C\u2019est le cas du cybergang Black Basta, et de leur ransomware du m\u00eame nom, qui a jet\u00e9 son d\u00e9volu sur&nbsp;<a href=\"https:\/\/www.lemondeinformatique.fr\/toute-l-actualite-marque-sur-microsoft-4.html\">Microsoft<\/a>&nbsp;Teams comme vecteur de ses m\u00e9faits. Le groupe cible des entreprises et administrations du monde entier. Pour y arriver, sa m\u00e9thode consiste&nbsp; \u00e0 bombarder ses victimes de spams pour ensuite se faire passer pour un service d\u2019assistance informatique et acc\u00e9der aux syst\u00e8mes d\u2019information de la cible.<\/p>\n\n\n\n<p>Il semble que cette technique a \u00e9t\u00e9 perfectionn\u00e9e comme le montre&nbsp;<a href=\"https:\/\/www.reliaquest.com\/blog\/black-basta-social-engineering-technique-microsoft-teams\/\" target=\"_blank\" rel=\"noreferrer noopener\">les travaux des chercheurs en s\u00e9curit\u00e9 de ReliaQuest<\/a>. Ils ont d\u00e9couvert que Black Basta se servait de Teams pour engager la conversation avec les victimes potentielles. L\u00e0 encore, les attaquants se font passer pour des employ\u00e9s du service d&rsquo;assistance. Selon le rapport, le contact est parfois \u00e9tabli par le biais d&rsquo;invitations \u00e0 des discussions de groupe sur Teams.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-inciter-les-victimes-a-telecharger-des-outils-de-surveillance-a-distance\"><strong>Inciter les victimes \u00e0 t\u00e9l\u00e9charger des outils de surveillance \u00e0 distance<\/strong><\/h2>\n\n\n\n<p>Dans ces discussions, les cybercriminels incitent les utilisateurs \u00e0 cliquer sur des codes QR qui m\u00e8nent \u00e0 un site web frauduleux. Ces derniers sont adapt\u00e9s \u00e0 l&rsquo;organisation cibl\u00e9e et ne peuvent souvent \u00eatre distingu\u00e9s des sites d&rsquo;entreprises authentiques qu&rsquo;en v\u00e9rifiant soigneusement le sous-domaine. Selon les chercheurs, l&rsquo;objectif des attaquants est d&rsquo;inciter les utilisateurs de Teams \u00e0 t\u00e9l\u00e9charger des&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3487743\/attackers-increasingly-using-legitimate-remote-management-tools-to-hack-enterprises.html\">outils de monitoring&nbsp;et de gestion \u00e0 distance (RMM)<\/a>&nbsp;et d&rsquo;acc\u00e9der \u00e0 l&rsquo;environnement cible.<\/p>\n\n\n\n<p>Pour se prot\u00e9ger de ces attaques, ReliaQuest recommande plusieurs mesures. En premier lieu, les entreprises devraient d\u00e9sactiver la communication avec les utilisateurs externes au sein de Teams. Si la communication avec des utilisateurs externes est n\u00e9cessaire, certains domaines de confiance peuvent \u00eatre mis sur liste blanche. Ensuite, la politique anti-spam dans les messageries doit \u00eatre renforc\u00e9e. Il faut par ailleurs s\u2019assurer que la journalisation est activ\u00e9e pour Teams, en particulier pour l&rsquo;\u00e9v\u00e9nement ChatCreated, afin de faciliter la d\u00e9tection et l&rsquo;investigation de ce type d&rsquo;activit\u00e9.<\/p>\n\n\n\n<p>Une erreur dans l&rsquo;article?<a href=\"https:\/\/www.lemondeinformatique.fr\/divers\/formulaire_contact_lmi.php?id=1&amp;type=lmi&amp;arti=95132\">Proposez-nous une correction<\/a><\/p>\n\n\n\n<p>Article r\u00e9dig\u00e9 par<\/p>\n\n\n\n<p>Julia Mutzbauer, IDG NS (adapt\u00e9 par Jacques Cheminat)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pour enr\u00f4ler ses victimes, les cyberpirates de Black Basta passent par Teams Les membres du groupe Black Basta, \u00e0 l&rsquo;origine du ransomware du m\u00eame nom, se servent de Microsoft Teams pour engager la conversation avec ses victimes et les amener \u00e0 t\u00e9l\u00e9charger des outils de surveillance \u00e0 distance. Avec le d\u00e9veloppement des outils collaboratifs en&#8230;<\/p>\n","protected":false},"author":1,"featured_media":1214,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"hide","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":true,"token":"eyJpbWciOiJodHRwczpcL1wvYXlyaWx5cy5jb21cL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjRcLzEwXC9NaWNyb3NvZnQtVGVhbS1jb3VjaGVyLWRlLXNvbGVpbC1yZWFsaXN0ZURlc2lnbmVyLmpwZWciLCJ0eHQiOiJQb3VyIGVuclx1MDBmNGxlciBzZXMgdmljdGltZXMsIGxlcyBjeWJlcnBpcmF0ZXMgZGUgQmxhY2sgQmFzdGEgcGFzc2VudCBwYXIgVGVhbXMiLCJ0ZW1wbGF0ZSI6ImhpZ2h3YXkiLCJibG9nX2lkIjoyMzUzMzUwMjN9.HhfDTRa_NsXBKXdCVCtAwWy-lz5m0nC2Ie95psspMDYMQ"},"version":2,"attached_media":[{"id":1214,"url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Microsoft-Team-coucher-de-soleil-realisteDesigner.jpeg","type":"image\/jpeg"}]}},"categories":[20,22],"tags":[],"class_list":["post-1213","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-accueil","category-securite-informatique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Cybercriminalit\u00e9 : Comment Black Basta utilise Teams pour ses attaques Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -<\/title>\r\n<meta name=\"description\" content=\"D\u00e9couvrez comment les cyberpirates de Black Basta utilisent Microsoft Teams pour lancer leurs attaques de cybercriminalit\u00e9.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/\" \/>\r\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Pour enr\u00f4ler ses victimes, les cyberpirates de Black Basta passent par Teams\" \/>\r\n<meta property=\"og:description\" content=\"Pour enr\u00f4ler ses victimes, les cyberpirates de Black Basta passent par Teams Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-10-31T17:48:15+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-10-31T17:50:13+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Microsoft-Team-coucher-de-soleil-realisteDesigner.jpeg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\r\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"admin\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:site\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\"},\"headline\":\"Pour enr\u00f4ler ses victimes, les cyberpirates de Black Basta passent par Teams\",\"datePublished\":\"2024-10-31T17:48:15+00:00\",\"dateModified\":\"2024-10-31T17:50:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/\"},\"wordCount\":481,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Microsoft-Team-coucher-de-soleil-realisteDesigner.jpeg\",\"articleSection\":[\"Accueil\",\"S\u00e9curit\u00e9 informatique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/\",\"url\":\"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/\",\"name\":\"Cybercriminalit\u00e9 : Comment Black Basta utilise Teams pour ses attaques Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Microsoft-Team-coucher-de-soleil-realisteDesigner.jpeg\",\"datePublished\":\"2024-10-31T17:48:15+00:00\",\"dateModified\":\"2024-10-31T17:50:13+00:00\",\"description\":\"D\u00e9couvrez comment les cyberpirates de Black Basta utilisent Microsoft Teams pour lancer leurs attaques de cybercriminalit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#primaryimage\",\"url\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Microsoft-Team-coucher-de-soleil-realisteDesigner.jpeg\",\"contentUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Microsoft-Team-coucher-de-soleil-realisteDesigner.jpeg\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/ayrilys.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pour enr\u00f4ler ses victimes, les cyberpirates de Black Basta passent par Teams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ayrilys.com\/#website\",\"url\":\"https:\/\/ayrilys.com\/\",\"name\":\"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay\",\"description\":\"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans\",\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"alternateName\":\"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ayrilys.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ayrilys.com\/#organization\",\"name\":\"Ayrilys\",\"url\":\"https:\/\/ayrilys.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"contentUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"width\":119,\"height\":64,\"caption\":\"Ayrilys\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\",\"https:\/\/x.com\/Ayrilys165097\"],\"description\":\"Prestataire informatique depuis plus de 20 ans pour les PME et TPE\",\"email\":\"ayrilys@ayrilys.com\",\"telephone\":\"+33139242197\",\"legalName\":\"Ayrilys\",\"foundingDate\":\"2003-01-01\",\"vatID\":\"FR90449159011\",\"taxID\":\"44915901100013\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/ayrilys.com\"],\"url\":\"https:\/\/ayrilys.com\/index.php\/author\/admin\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybercriminalit\u00e9 : Comment Black Basta utilise Teams pour ses attaques Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","description":"D\u00e9couvrez comment les cyberpirates de Black Basta utilisent Microsoft Teams pour lancer leurs attaques de cybercriminalit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/","og_locale":"fr_FR","og_type":"article","og_title":"Pour enr\u00f4ler ses victimes, les cyberpirates de Black Basta passent par Teams","og_description":"Pour enr\u00f4ler ses victimes, les cyberpirates de Black Basta passent par Teams Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","og_url":"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/","og_site_name":"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61563219240658","article_published_time":"2024-10-31T17:48:15+00:00","article_modified_time":"2024-10-31T17:50:13+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Microsoft-Team-coucher-de-soleil-realisteDesigner.jpeg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@Ayrilys165097","twitter_site":"@Ayrilys165097","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#article","isPartOf":{"@id":"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/"},"author":{"name":"admin","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94"},"headline":"Pour enr\u00f4ler ses victimes, les cyberpirates de Black Basta passent par Teams","datePublished":"2024-10-31T17:48:15+00:00","dateModified":"2024-10-31T17:50:13+00:00","mainEntityOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/"},"wordCount":481,"commentCount":0,"publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#primaryimage"},"thumbnailUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Microsoft-Team-coucher-de-soleil-realisteDesigner.jpeg","articleSection":["Accueil","S\u00e9curit\u00e9 informatique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/","url":"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/","name":"Cybercriminalit\u00e9 : Comment Black Basta utilise Teams pour ses attaques Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","isPartOf":{"@id":"https:\/\/ayrilys.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#primaryimage"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#primaryimage"},"thumbnailUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Microsoft-Team-coucher-de-soleil-realisteDesigner.jpeg","datePublished":"2024-10-31T17:48:15+00:00","dateModified":"2024-10-31T17:50:13+00:00","description":"D\u00e9couvrez comment les cyberpirates de Black Basta utilisent Microsoft Teams pour lancer leurs attaques de cybercriminalit\u00e9.","breadcrumb":{"@id":"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#primaryimage","url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Microsoft-Team-coucher-de-soleil-realisteDesigner.jpeg","contentUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Microsoft-Team-coucher-de-soleil-realisteDesigner.jpeg","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/ayrilys.com\/index.php\/pour-enroler-ses-victimes-les-cyberpirates-de-black-basta-passent-par-teams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ayrilys.com\/"},{"@type":"ListItem","position":2,"name":"Pour enr\u00f4ler ses victimes, les cyberpirates de Black Basta passent par Teams"}]},{"@type":"WebSite","@id":"https:\/\/ayrilys.com\/#website","url":"https:\/\/ayrilys.com\/","name":"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay","description":"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans","publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"alternateName":"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ayrilys.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/ayrilys.com\/#organization","name":"Ayrilys","url":"https:\/\/ayrilys.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/","url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","contentUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","width":119,"height":64,"caption":"Ayrilys"},"image":{"@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61563219240658","https:\/\/x.com\/Ayrilys165097"],"description":"Prestataire informatique depuis plus de 20 ans pour les PME et TPE","email":"ayrilys@ayrilys.com","telephone":"+33139242197","legalName":"Ayrilys","foundingDate":"2003-01-01","vatID":"FR90449159011","taxID":"44915901100013","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/ayrilys.com"],"url":"https:\/\/ayrilys.com\/index.php\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Microsoft-Team-coucher-de-soleil-realisteDesigner.jpeg","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/comments?post=1213"}],"version-history":[{"count":1,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1213\/revisions"}],"predecessor-version":[{"id":1215,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1213\/revisions\/1215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/media\/1214"}],"wp:attachment":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/media?parent=1213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/categories?post=1213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/tags?post=1213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}