{"id":746,"date":"2024-09-03T08:20:51","date_gmt":"2024-09-03T06:20:51","guid":{"rendered":"https:\/\/ayrilys.com\/?p=746"},"modified":"2024-09-03T08:23:53","modified_gmt":"2024-09-03T06:23:53","slug":"le-ransomware-blackbyte-plus-actif-que-prevu","status":"publish","type":"post","link":"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/","title":{"rendered":"Le ransomware BlackByte plus actif que pr\u00e9vu"},"content":{"rendered":"\n<p>Une \u00e9tude de Cisco Talos montre que l&rsquo;activit\u00e9 de la franchise de ransomware BlackByte a \u00e9t\u00e9 plus intense qu&rsquo;estim\u00e9e. Le groupe de cybercriminels a modifi\u00e9 et fait \u00e9voluer ses tactiques et ses outils au fil du temps.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000098625.png\" alt=\"Le ransomware BlackByte fait \u00e9voluer ses capacit\u00e9s de chiffrement et ses tactiques d'attaques. (Cr\u00e9dit Photo : Cisco Talos)\" title=\"Le ransomware BlackByte fait \u00e9voluer ses capacit\u00e9s de chiffrement et ses tactiques d'attaques. (Cr\u00e9dit Photo : Cisco Talos)\"\/><figcaption class=\"wp-element-caption\">Le ransomware BlackByte fait \u00e9voluer ses capacit\u00e9s de chiffrement et ses tactiques d&rsquo;attaques. (Cr\u00e9dit Photo : Cisco Talos)<\/figcaption><\/figure>\n\n\n\n<p>Il ne faut pas se fier aux sites de revendications des groupes de ransomware pour \u00e9tablir un barom\u00e8tre de leurs activit\u00e9s. Des chercheurs de Talos, division cybers\u00e9curit\u00e9 de Cisco, ont trouv\u00e9 que le nombre de victimes r\u00e9pertori\u00e9es par BlackByte sur son site ne repr\u00e9sente que 20 \u00e0 30% des compromissions du groupe de ransomware. De plus, les attaques r\u00e9cemment analys\u00e9es montrent des changements de tactiques et un autre variant de son chiffreur de fichiers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-un-pic-d-activite-passe-sous-le-radar\"><strong>Un pic d\u2019activit\u00e9 pass\u00e9 sous le radar<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/blog.talosintelligence.com\/blackbyte-blends-tried-and-true-tradecraft-with-newly-disclosed-vulnerabilities-to-support-ongoing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dans son rapport<\/a>, les experts de Talos sp\u00e9cialis\u00e9s en r\u00e9ponse \u00e0 incident et threat intelligence ont \u00ab&nbsp;remarqu\u00e9 des similitudes \u00e9troites entre les indicateurs de compromission (IOC) d\u00e9couverts au cours de l&rsquo;enqu\u00eate et d&rsquo;autres \u00e9v\u00e9nements signal\u00e9s dans la t\u00e9l\u00e9m\u00e9trie globale de Talos \u00bb. Ils ajoutent qu\u2019 \u00ab un examen plus approfondi de ces similitudes a permis de mieux comprendre la strat\u00e9gie actuelle de BlackByte et a r\u00e9v\u00e9l\u00e9 que le groupe a \u00e9t\u00e9 beaucoup plus actif qu&rsquo;il n&rsquo;y para\u00eet au vu du nombre de victimes publi\u00e9 sur son site de fuites de donn\u00e9es.&nbsp;\u00bb<\/p>\n\n\n\n<p>La raison pour laquelle le cybergang ne publie pas toutes les compromissions r\u00e9ussies sur son site n\u2019est pas claire. Il se peut que ce soit pour \u00e9viter d&rsquo;attirer trop d&rsquo;attention ou que certaines victimes acceptent de payer avant qu&rsquo;il ne soit n\u00e9cessaire de les r\u00e9pertorier. Il est \u00e9galement possible que toutes les attaques de BlackByte n&rsquo;aboutissent pas \u00e0 une exfiltration de donn\u00e9es. Les chercheurs donnent un exemple o\u00f9 l\u2019outil d\u2019exfiltration des donn\u00e9es nomm\u00e9 ExByte a \u00e9t\u00e9 d\u00e9ploy\u00e9 mais sans confirmer avec certitude que des donn\u00e9es ont \u00e9t\u00e9 d\u00e9rob\u00e9es.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-une-emanation-de-conti\">Une \u00e9manation de Conti<\/h2>\n\n\n\n<p>BlackByte est un groupe de ransomware-as-a-service (RaaS) apparu pour la premi\u00e8re fois fin 2021 et qui est soup\u00e7onn\u00e9e d&rsquo;\u00eatre une ramification de Conti, gang de premier plan qui s&rsquo;est dissous en mai 2022 apr\u00e8s avoir attir\u00e9 trop d&rsquo;attention et commis une s\u00e9rie d&rsquo;erreurs op\u00e9rationnelles. Apr\u00e8s l\u2019invasion de l\u2019Ukraine par la Russie en f\u00e9vrier 2022, de nombreux groupes de cybercriminels se sont d\u00e9clar\u00e9s neutres d\u2019autant plus que beaucoup d\u2019entre eux \u00e9taient \u00e0 la fois en Russie et en Ukraine.<\/p>\n\n\n\n<p>Mais Conti s&rsquo;est publiquement rang\u00e9 du c\u00f4t\u00e9 de la Russie et a menac\u00e9 de cibler les infrastructures critiques occidentales en repr\u00e9sailles, ce qui a probablement incit\u00e9 certains de ses affili\u00e9s \u00e0 prendre leurs distances par rapport au groupe. Apr\u00e8s la fin de Conti, plusieurs franchises sont apparues. BlackByte, Black Basta et KaraKurt se sont rapidement distingu\u00e9s comme trois nouveaux groupes ayant adopt\u00e9 un code, des outils et des tactiques tr\u00e8s similaires \u00e0 ceux pr\u00e9c\u00e9demment associ\u00e9s \u00e0 Conti<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-des-outils-et-des-attaques-affines\"><strong>Des outils et des attaques affin\u00e9s<\/strong><\/h2>\n\n\n\n<p>Si BlackByte a conserv\u00e9 les m\u00eames tactiques, techniques et proc\u00e9dures (TTP) depuis sa cr\u00e9ation, les attaques les plus r\u00e9centes en ont r\u00e9v\u00e9l\u00e9 d&rsquo;autres. Par exemple, le groupe est connu pour avoir d\u00e9ploy\u00e9 un chiffreur de ransomware de type ver qui se propage de lui-m\u00eame et qui est personnalis\u00e9 pour chaque victime \u00e0 l&rsquo;aide d&rsquo;identifiants SMB et NTLM cod\u00e9s en dur et vol\u00e9s \u00e0 l&rsquo;int\u00e9rieur du r\u00e9seau cibl\u00e9. Bien que ce proc\u00e9d\u00e9 serve toujours, le chiffreur de fichiers a \u00e9t\u00e9 remani\u00e9 au fil du temps dans plusieurs langages de programmation : Go, .NET et enfin C++. La derni\u00e8re variante observ\u00e9e par&nbsp;<a href=\"https:\/\/www.lemondeinformatique.fr\/toute-l-actualite-marque-sur-cisco-44.html\">Cisco<\/a>&nbsp;Talos ajoute l&rsquo;extension \u00ab blackbytent_h \u00bb aux fichiers chiffr\u00e9s.<\/p>\n\n\n\n<p>Le groupe \u00e9tait \u00e9galement connu pour d\u00e9ployer plusieurs pilotes officiels mais vuln\u00e9rables sur des syst\u00e8mes compromis afin de les utiliser pour l&rsquo;escalade des privil\u00e8ges et d&rsquo;autres t\u00e2ches. Pour cette technique, connue sous le nom de BYOVD (bring your own vulnerable driver), BlackByte \u00e9tait connu pour utiliser trois pilotes sp\u00e9cifiques : RtCore64.sys, utilis\u00e9 \u00e0 l&rsquo;origine par l&rsquo;utilitaire d&rsquo;overclocking MSI Afterburner ; DBUtil_2_3.sys, issu de l&rsquo;utilitaire de mise \u00e0 jour du firmware Dell Client ; et gdrv.sys, un driver du logiciel Gigabyte Tools pour les cartes m\u00e8res du fournisseur. Lors d&rsquo;attaques r\u00e9centes, le gang a ajout\u00e9 un quatri\u00e8me pilote appel\u00e9 zamguard64.sys, qui fait partie de l&rsquo;application Zemana Anti-Malware (ZAM). Il pr\u00e9sente une vuln\u00e9rabilit\u00e9 qui peut \u00eatre utilis\u00e9e pour mettre fin \u00e0 d&rsquo;autres processus et pour d\u00e9sactiver les produits EDR sur les ordinateurs des victimes. La franchise s\u2019int\u00e9resse par ailleurs aux environnements virtuels avec l\u2019exploitation de la vuln\u00e9rabilit\u00e9 CVE-2024-37085 de contournement de l&rsquo;authentification dans VMware ESXi quelques jours apr\u00e8s sa divulgation publique. La faille permet aux membres d&rsquo;un groupe Active Directory appel\u00e9 \u00ab ESX Admins \u00bb de contr\u00f4ler les machines virtuelles sur les h\u00f4tes ESXi.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-des-mesures-d-attenuations-recommandees\"><strong>Des mesures d&rsquo;att\u00e9nuations recommand\u00e9es<\/strong><\/h2>\n\n\n\n<p>Cisco Talos recommande aux entreprises de mettre en \u0153uvre les MFA pour toutes les connexions \u00e0 distance et dans le cloud et d&rsquo;auditer leurs configurations VPN. Les soci\u00e9t\u00e9s devraient \u00e9galement mettre en place des alertes pour les changements dans les groupes privil\u00e9gi\u00e9s d&rsquo;Active Directory et limiter ou d\u00e9sactiver l&rsquo;utilisation de NTLM \u00e0 l&rsquo;int\u00e9rieur de leurs r\u00e9seaux. Un protocole d&rsquo;authentification&nbsp;<a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-microsoft-tue-le-developpement-de-ntlm-93940.html\">que Microsoft a abandonn\u00e9<\/a>&nbsp;au profit de Kerberos. SMBv1, un autre protocole ancien, devrait \u00e9galement \u00eatre d\u00e9sactiv\u00e9 et les versions plus r\u00e9centes de SMB devraient \u00eatre sign\u00e9es et crypt\u00e9es. Tous les comptes fournisseurs et les fonctions d&rsquo;acc\u00e8s \u00e0 distance qui ne sont pas utilis\u00e9s devraient \u00e9galement \u00eatre d\u00e9sactiv\u00e9s et des d\u00e9tections de politiques Windows Defender et d&rsquo;objets de strat\u00e9gie de groupe non autoris\u00e9s devraient \u00eatre d\u00e9ploy\u00e9es sur les syst\u00e8mes.<\/p>\n\n\n\n<p>Une erreur dans l&rsquo;article?<a href=\"https:\/\/www.lemondeinformatique.fr\/divers\/formulaire_contact_lmi.php?id=1&amp;type=lmi&amp;arti=94588\">Proposez-nous une correction<\/a><\/p>\n\n\n\n<p>Article r\u00e9dig\u00e9 par<\/p>\n\n\n\n<p>Lucian Constantin, IDG NS (adapt\u00e9 par Dominique Filippone)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Une \u00e9tude de Cisco Talos montre que l&rsquo;activit\u00e9 de la franchise de ransomware BlackByte a \u00e9t\u00e9 plus intense qu&rsquo;estim\u00e9e. Le groupe de cybercriminels a modifi\u00e9 et fait \u00e9voluer ses tactiques et ses outils au fil du temps. Il ne faut pas se fier aux sites de revendications des groupes de ransomware pour \u00e9tablir un barom\u00e8tre&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"hide","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":true,"token":"eyJ0eHQiOiJMZSByYW5zb213YXJlIEJsYWNrQnl0ZSBwbHVzIGFjdGlmIHF1ZSBwclx1MDBlOXZ1IiwidGVtcGxhdGUiOiJoaWdod2F5IiwiYmxvZ19pZCI6MjM1MzM1MDIzfQ.M8LY3oFSye0VJDGXe55nW_uHWYLLY-Cmudy7mZ5UFWwMQ"},"version":2}},"categories":[22],"tags":[],"class_list":["post-746","post","type-post","status-publish","format-standard","hentry","category-securite-informatique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Le ransomware BlackByte plus actif que pr\u00e9vu Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -<\/title>\r\n<meta name=\"description\" content=\"Le ransomware BlackByte plus actif que pr\u00e9vu Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/\" \/>\r\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Le ransomware BlackByte plus actif que pr\u00e9vu\" \/>\r\n<meta property=\"og:description\" content=\"Le ransomware BlackByte plus actif que pr\u00e9vu Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-09-03T06:20:51+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-09-03T06:23:53+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000098625.png\" \/>\r\n<meta name=\"author\" content=\"admin\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:site\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\"},\"headline\":\"Le ransomware BlackByte plus actif que pr\u00e9vu\",\"datePublished\":\"2024-09-03T06:20:51+00:00\",\"dateModified\":\"2024-09-03T06:23:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/\"},\"wordCount\":1075,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000098625.png\",\"articleSection\":[\"S\u00e9curit\u00e9 informatique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/\",\"url\":\"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/\",\"name\":\"Le ransomware BlackByte plus actif que pr\u00e9vu Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000098625.png\",\"datePublished\":\"2024-09-03T06:20:51+00:00\",\"dateModified\":\"2024-09-03T06:23:53+00:00\",\"description\":\"Le ransomware BlackByte plus actif que pr\u00e9vu Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -\",\"breadcrumb\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#primaryimage\",\"url\":\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000098625.png\",\"contentUrl\":\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000098625.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/ayrilys.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le ransomware BlackByte plus actif que pr\u00e9vu\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ayrilys.com\/#website\",\"url\":\"https:\/\/ayrilys.com\/\",\"name\":\"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay\",\"description\":\"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans\",\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"alternateName\":\"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ayrilys.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ayrilys.com\/#organization\",\"name\":\"Ayrilys\",\"url\":\"https:\/\/ayrilys.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"contentUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"width\":119,\"height\":64,\"caption\":\"Ayrilys\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\",\"https:\/\/x.com\/Ayrilys165097\"],\"description\":\"Prestataire informatique depuis plus de 20 ans pour les PME et TPE\",\"email\":\"ayrilys@ayrilys.com\",\"telephone\":\"+33139242197\",\"legalName\":\"Ayrilys\",\"foundingDate\":\"2003-01-01\",\"vatID\":\"FR90449159011\",\"taxID\":\"44915901100013\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/ayrilys.com\"],\"url\":\"https:\/\/ayrilys.com\/index.php\/author\/admin\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Le ransomware BlackByte plus actif que pr\u00e9vu Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","description":"Le ransomware BlackByte plus actif que pr\u00e9vu Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/","og_locale":"fr_FR","og_type":"article","og_title":"Le ransomware BlackByte plus actif que pr\u00e9vu","og_description":"Le ransomware BlackByte plus actif que pr\u00e9vu Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","og_url":"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/","og_site_name":"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61563219240658","article_published_time":"2024-09-03T06:20:51+00:00","article_modified_time":"2024-09-03T06:23:53+00:00","og_image":[{"url":"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000098625.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@Ayrilys165097","twitter_site":"@Ayrilys165097","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#article","isPartOf":{"@id":"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/"},"author":{"name":"admin","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94"},"headline":"Le ransomware BlackByte plus actif que pr\u00e9vu","datePublished":"2024-09-03T06:20:51+00:00","dateModified":"2024-09-03T06:23:53+00:00","mainEntityOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/"},"wordCount":1075,"commentCount":0,"publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#primaryimage"},"thumbnailUrl":"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000098625.png","articleSection":["S\u00e9curit\u00e9 informatique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/","url":"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/","name":"Le ransomware BlackByte plus actif que pr\u00e9vu Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","isPartOf":{"@id":"https:\/\/ayrilys.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#primaryimage"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#primaryimage"},"thumbnailUrl":"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000098625.png","datePublished":"2024-09-03T06:20:51+00:00","dateModified":"2024-09-03T06:23:53+00:00","description":"Le ransomware BlackByte plus actif que pr\u00e9vu Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","breadcrumb":{"@id":"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#primaryimage","url":"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000098625.png","contentUrl":"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000098625.png"},{"@type":"BreadcrumbList","@id":"https:\/\/ayrilys.com\/index.php\/le-ransomware-blackbyte-plus-actif-que-prevu\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ayrilys.com\/"},{"@type":"ListItem","position":2,"name":"Le ransomware BlackByte plus actif que pr\u00e9vu"}]},{"@type":"WebSite","@id":"https:\/\/ayrilys.com\/#website","url":"https:\/\/ayrilys.com\/","name":"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay","description":"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans","publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"alternateName":"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ayrilys.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/ayrilys.com\/#organization","name":"Ayrilys","url":"https:\/\/ayrilys.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/","url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","contentUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","width":119,"height":64,"caption":"Ayrilys"},"image":{"@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61563219240658","https:\/\/x.com\/Ayrilys165097"],"description":"Prestataire informatique depuis plus de 20 ans pour les PME et TPE","email":"ayrilys@ayrilys.com","telephone":"+33139242197","legalName":"Ayrilys","foundingDate":"2003-01-01","vatID":"FR90449159011","taxID":"44915901100013","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/ayrilys.com"],"url":"https:\/\/ayrilys.com\/index.php\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/comments?post=746"}],"version-history":[{"count":2,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/746\/revisions"}],"predecessor-version":[{"id":749,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/746\/revisions\/749"}],"wp:attachment":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/media?parent=746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/categories?post=746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/tags?post=746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}