{"id":160852,"date":"2025-10-14T07:16:54","date_gmt":"2025-10-14T14:16:54","guid":{"rendered":"https:\/\/unit42.paloaltonetworks.com\/?p=160852"},"modified":"2025-10-17T09:17:12","modified_gmt":"2025-10-17T16:17:12","slug":"anatomy-of-an-attack-blacksuit-ransomware-blitz","status":"publish","type":"post","link":"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/","title":{"rendered":"Anatomie d\u2019une attaque\u00a0: \u00ab\u00a0BlackSuit\u00a0Blitz\u00a0\u00bb chez un \u00e9quipementier mondial"},"content":{"rendered":"<p><a id=\"post-160852-_lrfdkvsc6mbg\"><\/a>Unit\u00a042 a r\u00e9cemment assist\u00e9 un grand fabricant victime d\u2019une attaque par ransomware d\u2019envergure orchestr\u00e9e par <a href=\"https:\/\/unit42.paloaltonetworks.com\/threat-assessment-blacksuit-ransomware-ignoble-scorpius\/\" target=\"_blank\" rel=\"noopener\">Ignoble\u00a0Scorpius<\/a>, le groupe responsable de la distribution du ransomware\u00a0BlackSuit. Cet incident rappelle combien un probl\u00e8me apparemment mineur \u2013\u00a0ici, un seul jeu d\u2019identifiants\u00a0VPN compromis\u00a0\u2013 peut d\u00e9clencher une crise d\u2019entreprise majeure et peser lourdement sur le r\u00e9sultat net.<\/p>\n<h2><a id=\"post-160852-_rqs8yzq8aydt\"><\/a>L\u2019attaque\u00a0: une combinaison de reconnaissance et de ransomware<\/h2>\n<p>L\u2019op\u00e9ration d\u2019Ignoble\u00a0Scorpius a d\u00e9but\u00e9 par un appel d\u2019hame\u00e7onnage vocal (vishing). L\u2019attaquant s\u2019est fait passer pour le service d\u2019assistance informatique de l\u2019entreprise et a tromp\u00e9 un employ\u00e9, qui a saisi ses identifiants\u00a0VPN l\u00e9gitimes sur un site de phishing.<\/p>\n<p>Avec ces identifiants, l\u2019acteur de la menace a obtenu un acc\u00e8s initial au r\u00e9seau puis a imm\u00e9diatement escalad\u00e9 ses privil\u00e8ges. Il a ex\u00e9cut\u00e9 une <a href=\"https:\/\/attack.mitre.org\/techniques\/T1003\/006\/\" target=\"_blank\" rel=\"noopener\">attaque\u00a0DCSync<\/a> contre un contr\u00f4leur de domaine pour voler des identifiants hautement privil\u00e9gi\u00e9s, dont un compte de service critique. En utilisant ces identifiants compromis, les <span style=\"font-weight: 400;\">cyber attaquants<\/span> ont pivot\u00e9 lat\u00e9ralement sur le r\u00e9seau via RDP et SMB, s\u2019appuyant sur des outils comme Advanced IP Scanner et SMBExec pour cartographier l\u2019infrastructure et identifier des cibles \u00e0 forte valeur.<\/p>\n<p>Ils ont \u00e9tabli une persistance en d\u00e9ployant AnyDesk et un RAT personnalis\u00e9 sur un contr\u00f4leur de domaine, configur\u00e9 comme t\u00e2che planifi\u00e9e afin de survivre aux red\u00e9marrages. Il est important de pr\u00e9ciser que les acteurs de la menace d\u00e9tournent fr\u00e9quemment des produits l\u00e9gitimes tels qu\u2019AnyDesk \u00e0 des fins malveillantes. Cela ne signifie en aucun cas que le produit l\u00e9gitime pr\u00e9sente une faille de s\u00e9curit\u00e9. Les attaquants ont ensuite compromis un second contr\u00f4leur de domaine, dont ils ont extrait la base de donn\u00e9es\u00a0<span style=\"font-family: 'courier new', courier, monospace;\">NTDS.dit<\/span> contenant l\u2019ensemble des empreintes de mots de passe des utilisateurs. Ils ont exfiltr\u00e9 plus de 400\u00a0Go de donn\u00e9es \u00e0 l\u2019aide d\u2019un utilitaire\u00a0<span style=\"font-family: 'courier new', courier, monospace;\">rclone<\/span> renomm\u00e9. Pour effacer leurs traces, ils ont d\u00e9ploy\u00e9 CCleaner afin de supprimer les preuves forensiques, avant de porter le coup final\u00a0: le ransomware\u00a0BlackSuit, orchestr\u00e9 via Ansible, qui a simultan\u00e9ment chiffr\u00e9 des centaines de machines virtuelles sur pr\u00e8s de 60\u00a0h\u00f4tes VMware\u00a0ESXi, provoquant une interruption massive des op\u00e9rations \u00e0 l\u2019\u00e9chelle de toute l\u2019infrastructure.<\/p>\n<h2><a id=\"post-160852-_zg1i6wyvsb5e\"><\/a>Comment Unit\u00a042 est intervenue<\/h2>\n<p>Lorsque Unit\u00a042 a \u00e9t\u00e9 sollicit\u00e9e, nous avons aid\u00e9 le client \u00e0 \u00e9tendre le d\u00e9ploiement de Cortex\u00a0XDR, passant de 250 \u00e0 plus de 17\u00a0000\u00a0terminaux. Cette extension a permis d\u2019obtenir une visibilit\u00e9 compl\u00e8te \u00e0 l\u2019\u00e9chelle de l\u2019entreprise, afin de suivre chacun des mouvements de l\u2019attaquant. Nous avons \u00e9galement exploit\u00e9 Cortex\u00a0XSOAR pour automatiser les actions de confinement, stoppant ainsi la propagation de l\u2019attaque.<\/p>\n<p>Notre enqu\u00eate a permis d\u2019identifier l\u2019int\u00e9gralit\u00e9 du chemin d\u2019attaque et de formuler plusieurs recommandations essentielles\u00a0:<\/p>\n<ul>\n<li><strong>S\u00e9curit\u00e9 r\u00e9seau\u00a0:<\/strong> remplacer les pare-feu Cisco\u00a0ASA en fin de vie par des pare-feu nouvelle g\u00e9n\u00e9ration\u00a0(NGFW), mettre en place une segmentation du r\u00e9seau et restreindre les acc\u00e8s administratifs aux syst\u00e8mes critiques (tels que les contr\u00f4leurs de domaine et les h\u00f4tes\u00a0ESXi) \u00e0 des VLAN de gestion d\u00e9di\u00e9s.<\/li>\n<li><strong>Gestion des identit\u00e9s et des acc\u00e8s\u00a0:<\/strong> appliquer l\u2019authentification multifacteur\u00a0(MFA) pour tous les acc\u00e8s \u00e0 distance, d\u00e9sactiver NTLM ou exiger EPA, faire pivoter l\u2019ensemble des identifiants et interdire l\u2019utilisation de comptes de service pour les connexions interactives comme RDP.<\/li>\n<li><strong>Renforcement des terminaux et serveurs\u00a0:<\/strong> bloquer EFSRPC \u00e0 l\u2019aide de filtres\u00a0RPC pour pr\u00e9venir les attaques\u00a0PetitPotam\/DCSync, d\u00e9ployer et maintenir une solution\u00a0XDR enti\u00e8rement corrig\u00e9e sur tous les terminaux, et appliquer une politique stricte de retrait des syst\u00e8mes en fin de vie.<\/li>\n<li><strong>Journalisation et surveillance\u00a0:<\/strong> \u00e9tendre la r\u00e9tention des journaux \u00e0 plus de 90\u00a0jours pour les sources critiques (ESXi, pare-feu, Nasuni), garantir que les journaux soient correctement analys\u00e9s pour une corr\u00e9lation efficace, et activer des fonctionnalit\u00e9s comme la validation des journaux\u00a0AWS\u00a0CloudTrail.<\/li>\n<\/ul>\n<h2><a id=\"post-160852-_802q6br0zdo2\"><\/a>R\u00e9sultat<\/h2>\n<p>Le client a pu atteindre plusieurs r\u00e9sultats majeurs\u00a0:<\/p>\n<ul>\n<li><strong>Exigence financi\u00e8re annul\u00e9e\u00a0:<\/strong> nous avons r\u00e9ussi \u00e0 faire annuler la demande de ran\u00e7on de 20\u00a0millions de dollars. Le client n\u2019a donc vers\u00e9 aucun paiement.<\/li>\n<li><strong>Visibilit\u00e9 accrue\u00a0:<\/strong> l\u2019intervention a permis d\u2019\u00e9tendre la visibilit\u00e9 en passant de 250 \u00e0 plus de 17\u00a0000\u00a0terminaux, posant ainsi une base solide pour les futures op\u00e9rations de s\u00e9curit\u00e9.<\/li>\n<li><strong>Orientation strat\u00e9gique\u00a0:<\/strong> nous avons fourni un accompagnement strat\u00e9gique personnalis\u00e9 apr\u00e8s l\u2019incident, aidant le client \u00e0 renforcer ses d\u00e9fenses et \u00e0 pr\u00e9venir de futures attaques.<\/li>\n<li><strong>Surveillance continue\u00a0:<\/strong> \u00e0 la suite de l\u2019incident, le client a adopt\u00e9 les services manag\u00e9s de d\u00e9tection et r\u00e9ponse (MDR) d\u2019Unit\u00a042 pour une surveillance continue, lui permettant d\u2019\u00eatre mieux pr\u00e9par\u00e9 face aux menaces \u00e0 venir.<\/li>\n<\/ul>\n<h2><a id=\"post-160852-_8mzn7pk7wf9h\"><\/a>\u00c0 retenir<\/h2>\n<p>Cette attaque rappelle avec force qu\u2019un seul identifiant compromis peut d\u00e9clencher un effet domino, menant \u00e0 une br\u00e8che de s\u00e9curit\u00e9 catastrophique. La rapidit\u00e9 et la sophistication des tactiques employ\u00e9es par des acteurs de la menace tels qu\u2019Ignoble\u00a0Scorpius illustrent le caract\u00e8re indispensable et critique d\u2019une strat\u00e9gie de d\u00e9fense proactive et multicouche.<\/p>\n<p>En mettant en \u0153uvre l\u2019authentification multifacteur\u00a0(MFA) sur tous les points d\u2019acc\u00e8s \u00e0 distance, et en int\u00e9grant une visibilit\u00e9 renforc\u00e9e des terminaux, des m\u00e9canismes de confinement automatis\u00e9s et un accompagnement d\u2019experts, les organisations peuvent non seulement interrompre une attaque en cours, mais aussi consolider leurs d\u00e9fenses pour pr\u00e9venir de futurs incidents. Surtout, les investissements dans des \u00e9valuations de s\u00e9curit\u00e9 proactives se r\u00e9v\u00e8lent largement rentables, leurs b\u00e9n\u00e9fices d\u00e9passant de loin les co\u00fbts op\u00e9rationnels et financiers d\u2019une attaque par ransomware \u00e0 grande \u00e9chelle.<\/p>\n<p>Vous souhaitez en savoir plus sur les tendances r\u00e9centes des cyberattaques\u00a0? Consultez le <a href=\"https:\/\/www.paloaltonetworks.fr\/resources\/research\/unit-42-incident-response-report\" target=\"_blank\" rel=\"noopener\">Rapport mondial Unit\u00a042 sur la r\u00e9ponse \u00e0 incident\u00a02025<\/a>, qui pr\u00e9sente les enseignements cl\u00e9s issus de nos interventions sur des cyberattaques dans plus de 500\u00a0organisations r\u00e9parties dans 38\u00a0pays.<\/p>\n<h3><a id=\"post-160852-_fkck7leist2v\"><\/a>Pour aller plus loin<\/h3>\n<p><a href=\"https:\/\/start.paloaltonetworks.com\/how-nine-organizations-respond-to-and-prepare-for-cyberthreats-with-Unit-42\" target=\"_blank\" rel=\"noopener\">Neuf t\u00e9moignages relatifs \u00e0 Unit\u00a042 en action<\/a><\/p>\n<p><a href=\"https:\/\/start.paloaltonetworks.com\/forrester-state-of-cybersecurity-incident-response\" target=\"_blank\" rel=\"noopener\">L\u2019\u00e9tat des services Cybersecurity Incident Response<\/a><\/p>\n<p><a href=\"https:\/\/start.paloaltonetworks.com\/incident-response-42-tips-checklist-unit42-vb.html?s_tnt=633727%3A1%3A0&amp;adobe_mc_sdid=SDID%3D437E33B60B6832D7-1A3CFC67E9EBA81C%7CMCORGID%3D9A531C8B532965080A490D4D%40AdobeOrg%7CTS%3D1759854881&amp;adobe_mc_ref=https%3A%2F%2Fstart.paloaltonetworks.com%2FUnit42-how-nine-organizations-respond-to-and-prepare-for-cyberthreats-with-unit-42-success.html&amp;utm_network=marketo-typ\" target=\"_blank\" rel=\"noopener\">42\u00a0conseils pour rester sur la voie de la cyber-r\u00e9silience<\/a><\/p>\n<h2>\u00c0 propos d\u2019Unit\u00a042<\/h2>\n<p><em>Nous fournissons \u00e0 votre \u00e9quipe de s\u00e9curit\u00e9 l\u2019expertise et les outils n\u00e9cessaires pour anticiper les menaces et prot\u00e9ger votre entreprise. Et pour vous aider \u00e0 g\u00e9rer les situations les plus d\u00e9licates en toute s\u00e9r\u00e9nit\u00e9, nous mettons \u00e0 votre service des strat\u00e9gies qui ont fait leurs preuves et les enseignements tir\u00e9s de milliers de missions\u00a0IR.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le ransomware BlackSuit, d\u00e9ploy\u00e9 par le groupe APT Ignoble Scorpius, a d\u00e9but\u00e9 par une attaque de vishing. D\u00e9couvrez comment l'Unit 42 est intervenue et quel a \u00e9t\u00e9 le d\u00e9nouement de cet incident.<\/p>\n","protected":false},"author":366,"featured_media":160720,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[9618,9596],"tags":[9677,9678,9679],"product_categories":[9041,9053,9068,9083,9151],"coauthors":[9666],"class_list":["post-160852","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-fr","category-insights-fr","tag-blacksuit-ransomware-fr","tag-ignoble-scorpius-fr","tag-reconnaissance-fr","product_categories-cortex-fr","product_categories-cortex-xdr-fr","product_categories-cortex-xsoar-fr","product_categories-next-generation-firewall-fr","product_categories-unit-42-incident-response-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Anatomie d\u2019une attaque\u00a0: \u00ab\u00a0BlackSuit\u00a0Blitz\u00a0\u00bb chez un \u00e9quipementier mondial<\/title>\n<meta name=\"description\" content=\"Le ransomware BlackSuit, d\u00e9ploy\u00e9 par le groupe APT Ignoble Scorpius, a d\u00e9but\u00e9 par une attaque de vishing. D\u00e9couvrez comment l&#039;Unit 42 est intervenue et quel a \u00e9t\u00e9 le d\u00e9nouement de cet incident.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anatomie d\u2019une attaque\u00a0: \u00ab\u00a0BlackSuit\u00a0Blitz\u00a0\u00bb chez un \u00e9quipementier mondial\" \/>\n<meta property=\"og:description\" content=\"Le ransomware BlackSuit, d\u00e9ploy\u00e9 par le groupe APT Ignoble Scorpius, a d\u00e9but\u00e9 par une attaque de vishing. D\u00e9couvrez comment l&#039;Unit 42 est intervenue et quel a \u00e9t\u00e9 le d\u00e9nouement de cet incident.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/\" \/>\n<meta property=\"og:site_name\" content=\"Unit 42\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-14T14:16:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-17T16:17:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/10\/07-10-Ignoble-Scorpius-1920x900-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Preston Miller\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Anatomie d\u2019une attaque\u00a0: \u00ab\u00a0BlackSuit\u00a0Blitz\u00a0\u00bb chez un \u00e9quipementier mondial","description":"Le ransomware BlackSuit, d\u00e9ploy\u00e9 par le groupe APT Ignoble Scorpius, a d\u00e9but\u00e9 par une attaque de vishing. D\u00e9couvrez comment l'Unit 42 est intervenue et quel a \u00e9t\u00e9 le d\u00e9nouement de cet incident.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/","og_locale":"fr_FR","og_type":"article","og_title":"Anatomie d\u2019une attaque\u00a0: \u00ab\u00a0BlackSuit\u00a0Blitz\u00a0\u00bb chez un \u00e9quipementier mondial","og_description":"Le ransomware BlackSuit, d\u00e9ploy\u00e9 par le groupe APT Ignoble Scorpius, a d\u00e9but\u00e9 par une attaque de vishing. D\u00e9couvrez comment l'Unit 42 est intervenue et quel a \u00e9t\u00e9 le d\u00e9nouement de cet incident.","og_url":"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/","og_site_name":"Unit 42","article_published_time":"2025-10-14T14:16:54+00:00","article_modified_time":"2025-10-17T16:17:12+00:00","og_image":[{"width":1920,"height":900,"url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/10\/07-10-Ignoble-Scorpius-1920x900-1.jpg","type":"image\/jpeg"}],"author":"Preston Miller","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/#article","isPartOf":{"@id":"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/"},"author":{"name":"Sheida Azimi","@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/7ee97ec6f224446d57c0383eb5fd3639"},"headline":"Anatomie d\u2019une attaque\u00a0: \u00ab\u00a0BlackSuit\u00a0Blitz\u00a0\u00bb chez un \u00e9quipementier mondial","datePublished":"2025-10-14T14:16:54+00:00","dateModified":"2025-10-17T16:17:12+00:00","mainEntityOfPage":{"@id":"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/"},"wordCount":1123,"image":{"@id":"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/#primaryimage"},"thumbnailUrl":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/10\/07-10-Ignoble-Scorpius-1920x900-1.jpg","keywords":["BlackSuit ransomware","Ignoble Scorpius","Reconnaissance"],"articleSection":["General","Insights"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/","url":"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/","name":"Anatomie d\u2019une attaque\u00a0: \u00ab\u00a0BlackSuit\u00a0Blitz\u00a0\u00bb chez un \u00e9quipementier mondial","isPartOf":{"@id":"https:\/\/unit42.paloaltonetworks.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/#primaryimage"},"image":{"@id":"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/#primaryimage"},"thumbnailUrl":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/10\/07-10-Ignoble-Scorpius-1920x900-1.jpg","datePublished":"2025-10-14T14:16:54+00:00","dateModified":"2025-10-17T16:17:12+00:00","author":{"@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/7ee97ec6f224446d57c0383eb5fd3639"},"description":"Le ransomware BlackSuit, d\u00e9ploy\u00e9 par le groupe APT Ignoble Scorpius, a d\u00e9but\u00e9 par une attaque de vishing. D\u00e9couvrez comment l'Unit 42 est intervenue et quel a \u00e9t\u00e9 le d\u00e9nouement de cet incident.","breadcrumb":{"@id":"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/#primaryimage","url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/10\/07-10-Ignoble-Scorpius-1920x900-1.jpg","contentUrl":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/10\/07-10-Ignoble-Scorpius-1920x900-1.jpg","width":1920,"height":900,"caption":"Pictorial representation of APT Ignoble Scorpius. The silhouette of a scorpion and the Scorpius constellation inside an orange abstract planet. Abstract, stylized cosmic setting with vibrant blue and purple shapes, representing space and distant planetary bodies."},{"@type":"BreadcrumbList","@id":"https:\/\/unit42.paloaltonetworks.com\/fr\/anatomy-of-an-attack-blacksuit-ransomware-blitz\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/unit42.paloaltonetworks.com\/"},{"@type":"ListItem","position":2,"name":"Anatomie d\u2019une attaque\u00a0: \u00ab\u00a0BlackSuit\u00a0Blitz\u00a0\u00bb chez un \u00e9quipementier mondial"}]},{"@type":"WebSite","@id":"https:\/\/unit42.paloaltonetworks.com\/#website","url":"https:\/\/unit42.paloaltonetworks.com\/","name":"Unit 42","description":"Palo Alto Networks","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/unit42.paloaltonetworks.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/7ee97ec6f224446d57c0383eb5fd3639","name":"Sheida Azimi","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/image\/4ffb3c2d260a0150fb91b3715442f8b3","url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2018\/11\/unit-news-meta.svg","contentUrl":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2018\/11\/unit-news-meta.svg","caption":"Sheida Azimi"},"url":"https:\/\/unit42.paloaltonetworks.com\/fr\/author\/sheida-azimi\/"}]}},"_links":{"self":[{"href":"https:\/\/unit42.paloaltonetworks.com\/fr\/wp-json\/wp\/v2\/posts\/160852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/unit42.paloaltonetworks.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/unit42.paloaltonetworks.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/fr\/wp-json\/wp\/v2\/users\/366"}],"replies":[{"embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/fr\/wp-json\/wp\/v2\/comments?post=160852"}],"version-history":[{"count":2,"href":"https:\/\/unit42.paloaltonetworks.com\/fr\/wp-json\/wp\/v2\/posts\/160852\/revisions"}],"predecessor-version":[{"id":161146,"href":"https:\/\/unit42.paloaltonetworks.com\/fr\/wp-json\/wp\/v2\/posts\/160852\/revisions\/161146"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/fr\/wp-json\/wp\/v2\/media\/160720"}],"wp:attachment":[{"href":"https:\/\/unit42.paloaltonetworks.com\/fr\/wp-json\/wp\/v2\/media?parent=160852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/fr\/wp-json\/wp\/v2\/categories?post=160852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/fr\/wp-json\/wp\/v2\/tags?post=160852"},{"taxonomy":"product_categories","embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/fr\/wp-json\/wp\/v2\/product_categories?post=160852"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/unit42.paloaltonetworks.com\/fr\/wp-json\/wp\/v2\/coauthors?post=160852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}