{"id":112667,"date":"2022-04-11T08:10:00","date_gmt":"2022-04-11T06:10:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=112667"},"modified":"2022-03-14T11:12:03","modified_gmt":"2022-03-14T10:12:03","slug":"les-systemes-bases-sur-linux-en-ligne-de-mire","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/linux-basierte-systeme-im-visier\/","title":{"rendered":"Les syst\u00e8mes bas\u00e9s sur Linux dans le collimateur"},"content":{"rendered":"<p>En tant que syst\u00e8me d'exploitation cloud le plus r\u00e9pandu, Linux est un \u00e9l\u00e9ment central de l'infrastructure num\u00e9rique et devient rapidement un ticket d'entr\u00e9e dans un environnement multi-cloud pour les pirates. VMware a publi\u00e9 un rapport sur les menaces intitul\u00e9 \"Exposing Malware in Linux-Based Multi-Cloud Environments\", qui d\u00e9crit entre autres comment les cybercriminels utilisent des logiciels malveillants pour attaquer les syst\u00e8mes d'exploitation bas\u00e9s sur Linux. Les ransomwares sont de plus en plus cibl\u00e9s sur les images h\u00f4tes utilis\u00e9es pour ex\u00e9cuter des charges de travail dans des environnements virtualis\u00e9s. 89 % des attaques de cryptojacking utilisent des biblioth\u00e8ques li\u00e9es \u00e0 XMRig, et plus de la moiti\u00e9 des utilisateurs de Cobalt Strike sont peut-\u00eatre des cybercriminels ou utilisent Cobalt Strike au moins de mani\u00e8re ill\u00e9gale. Comme les logiciels malveillants ciblant les syst\u00e8mes d'exploitation bas\u00e9s sur Linux augmentent en volume et en complexit\u00e9 dans un paysage de menaces en rapide \u00e9volution, les entreprises doivent accorder une plus grande priorit\u00e9 \u00e0 la d\u00e9tection des menaces. Les menaces les plus courantes pour les syst\u00e8mes d'exploitation bas\u00e9s sur Linux dans les environnements multi-cloud : Ransomware, Cryptominers et Outils d'acc\u00e8s \u00e0 distance.<\/p>","protected":false},"excerpt":{"rendered":"<p>Les contre-mesures actuelles contre les logiciels malveillants se concentrent g\u00e9n\u00e9ralement sur les menaces bas\u00e9es sur Windows, ce qui fait des charges de travail bas\u00e9es sur Linux des cibles faciles.<\/p>","protected":false},"author":38,"featured_media":112669,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,40469],"tags":[67,3862,5207,306],"coauthors":[19920],"class_list":["post-112667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-22-03","tag-linux","tag-ransomware","tag-sapanoptikum","tag-vmware","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Aktuelle Malware-Gegenma\u00dfnahmen konzentrieren sich meist auf Windows-basierte Bedrohungen, wodurch Linux-basierte Workloads zum leichten Ziel werden.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/category\/mag-22-03\/\" rel=\"category tag\">Mag 22-03<\/a>","author_info_v2":{"name":"Magazine E-3","url":"https:\/\/e3mag.com\/fr\/author\/e-3-magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/112667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=112667"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/112667\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/112669"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=112667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=112667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=112667"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=112667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}