{"id":7071,"date":"2024-03-18T11:54:29","date_gmt":"2024-03-18T10:54:29","guid":{"rendered":"https:\/\/gstf.site-preview.ch\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/"},"modified":"2024-11-27T14:34:00","modified_gmt":"2024-11-27T13:34:00","slug":"un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines","status":"publish","type":"post","link":"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/","title":{"rendered":"Un groupe de pirates chinois attaque des organisations tib\u00e9taines"},"content":{"rendered":"\n<p>Le groupe de pirates informatiques chinois \u00ab\u00a0Evasive Panda\u00a0\u00bb a profit\u00e9 de la f\u00eate tib\u00e9taine de la pri\u00e8re de la M\u00f6nlam pour lancer une attaque d&rsquo;espionnage contre des individus et des organisations tib\u00e9tains. La f\u00eate de la M\u00f6nlam, \u00e9galement appel\u00e9e Grande f\u00eate de la pri\u00e8re, est c\u00e9l\u00e9br\u00e9e du 4e au 11e jour du premier mois de la nouvelle ann\u00e9e tib\u00e9taine et remonte \u00e0 une tradition datant de 1402. <\/p>\n\n<p>Des Tib\u00e9tains de plusieurs pays ont \u00e9t\u00e9 touch\u00e9s, notamment \u00e0 Taiwan, en Australie et aux \u00c9tats-Unis. En septembre 2023, Evasive Panda a compromis le site Internet du Kagyu International Monlam Trust, bas\u00e9 en Inde, qui organise la f\u00eate de la M\u00f6nlam \u00e0 Bodhgaya et attire donc l&rsquo;int\u00e9r\u00eat de nombreux individus et organisations. Le site Internet a \u00e9t\u00e9 dot\u00e9 d&rsquo;un code malveillant qui a infect\u00e9 les ordinateurs de tous ceux qui ont visit\u00e9 ce site. Le logiciel malveillant a ensuite pu r\u00e9cup\u00e9rer des donn\u00e9es sensibles, y compris le nom de l&rsquo;ordinateur, le nom de l&rsquo;utilisateur, les adresses MAC et IP.   <\/p>\n\n<p>Le groupe a \u00e9galement infect\u00e9 le site Internet d&rsquo;un d\u00e9veloppeur de logiciels indien qui produit des programmes de traduction en langue tib\u00e9taine. Les personnes qui t\u00e9l\u00e9chargeaient ces logiciels de traduction transmettaient des programmes malveillants sur leurs propres ordinateurs, qui les ouvraient \u00e0 d&rsquo;autres attaques. <\/p>\n\n<p>Selon l&rsquo;entreprise de cybers\u00e9curit\u00e9 ESET, Evasive Panda a des racines claires en Chine et est actif dans le domaine de l&rsquo;espionnage informatique depuis 2012. Elle a jusqu&rsquo;\u00e0 pr\u00e9sent cibl\u00e9 des individus en Chine continentale, \u00e0 Hong Kong, Macao et au Nigeria, ainsi que des institutions et organisations gouvernementales \u00e0 Ta\u00efwan, au Vietnam et aux Philippines. Le Georgia Institute of Technology fait \u00e9galement partie des victimes. Par exemple, un chercheur a \u00e9t\u00e9 emprisonn\u00e9 en Chine afin de forcer la publication des r\u00e9sultats de ses recherches.   <\/p>\n\n<p><em>welivesecurity.com, 7 mars 2024<\/em> \/\/ Dr. Uwe Meya<\/p>\n\n<p>Photo : <em>Capture d&rsquo;\u00e9cran ESET<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le groupe de pirates informatiques chinois \u00ab\u00a0Evasive Panda\u00a0\u00bb a profit\u00e9 de la f\u00eate tib\u00e9taine de la pri\u00e8re de la M\u00f6nlam pour lancer une attaque d&rsquo;espionnage contre des individus et des organisations tib\u00e9tains. La f\u00eate de la M\u00f6nlam, \u00e9galement appel\u00e9e Grande f\u00eate de la pri\u00e8re, est c\u00e9l\u00e9br\u00e9e du 4e au 11e jour du premier mois de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7072,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[21],"tags":[],"class_list":["post-7071","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tibet-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Un groupe de pirates chinois attaque des organisations tib\u00e9taines - GSTF<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Un groupe de pirates chinois attaque des organisations tib\u00e9taines - GSTF\" \/>\n<meta property=\"og:description\" content=\"Le groupe de pirates informatiques chinois \u00ab\u00a0Evasive Panda\u00a0\u00bb a profit\u00e9 de la f\u00eate tib\u00e9taine de la pri\u00e8re de la M\u00f6nlam pour lancer une attaque d&rsquo;espionnage contre des individus et des organisations tib\u00e9tains. La f\u00eate de la M\u00f6nlam, \u00e9galement appel\u00e9e Grande f\u00eate de la pri\u00e8re, est c\u00e9l\u00e9br\u00e9e du 4e au 11e jour du premier mois de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/\" \/>\n<meta property=\"og:site_name\" content=\"GSTF\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-18T10:54:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-27T13:34:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gstf.org\/wp-content\/uploads\/2024\/10\/Hacker_attacke.png\" \/>\n\t<meta property=\"og:image:width\" content=\"286\" \/>\n\t<meta property=\"og:image:height\" content=\"128\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/#\\\/schema\\\/person\\\/67c7ae2b7567a05fa720632cf1a11bd6\"},\"headline\":\"Un groupe de pirates chinois attaque des organisations tib\u00e9taines\",\"datePublished\":\"2024-03-18T10:54:29+00:00\",\"dateModified\":\"2024-11-27T13:34:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\\\/\"},\"wordCount\":347,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gstf.org\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Hacker_attacke.png\",\"articleSection\":[\"Tibet\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/gstf.org\\\/fr\\\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\\\/\",\"url\":\"https:\\\/\\\/gstf.org\\\/fr\\\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\\\/\",\"name\":\"Un groupe de pirates chinois attaque des organisations tib\u00e9taines - GSTF\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gstf.org\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Hacker_attacke.png\",\"datePublished\":\"2024-03-18T10:54:29+00:00\",\"dateModified\":\"2024-11-27T13:34:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/#\\\/schema\\\/person\\\/67c7ae2b7567a05fa720632cf1a11bd6\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/gstf.org\\\/fr\\\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\\\/#primaryimage\",\"url\":\"https:\\\/\\\/gstf.org\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Hacker_attacke.png\",\"contentUrl\":\"https:\\\/\\\/gstf.org\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Hacker_attacke.png\",\"width\":286,\"height\":128},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/gstf.org\\\/fr\\\/page-daccueil\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Un groupe de pirates chinois attaque des organisations tib\u00e9taines\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/gstf.org\\\/fr\\\/\",\"name\":\"GSTF\",\"description\":\"Gesellschaft Schweizerisch-Tibetische Freundschaft\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/gstf.org\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/#\\\/schema\\\/person\\\/67c7ae2b7567a05fa720632cf1a11bd6\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3d3f2fcb093e9c2d13668a154a0a0f6cd486b88af630485da5e7873949764c3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3d3f2fcb093e9c2d13668a154a0a0f6cd486b88af630485da5e7873949764c3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3d3f2fcb093e9c2d13668a154a0a0f6cd486b88af630485da5e7873949764c3a?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/gstf.org\"],\"url\":\"https:\\\/\\\/gstf.org\\\/fr\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Un groupe de pirates chinois attaque des organisations tib\u00e9taines - GSTF","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/","og_locale":"fr_FR","og_type":"article","og_title":"Un groupe de pirates chinois attaque des organisations tib\u00e9taines - GSTF","og_description":"Le groupe de pirates informatiques chinois \u00ab\u00a0Evasive Panda\u00a0\u00bb a profit\u00e9 de la f\u00eate tib\u00e9taine de la pri\u00e8re de la M\u00f6nlam pour lancer une attaque d&rsquo;espionnage contre des individus et des organisations tib\u00e9tains. La f\u00eate de la M\u00f6nlam, \u00e9galement appel\u00e9e Grande f\u00eate de la pri\u00e8re, est c\u00e9l\u00e9br\u00e9e du 4e au 11e jour du premier mois de [&hellip;]","og_url":"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/","og_site_name":"GSTF","article_published_time":"2024-03-18T10:54:29+00:00","article_modified_time":"2024-11-27T13:34:00+00:00","og_image":[{"width":286,"height":128,"url":"https:\/\/gstf.org\/wp-content\/uploads\/2024\/10\/Hacker_attacke.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/#article","isPartOf":{"@id":"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/"},"author":{"name":"admin","@id":"https:\/\/gstf.org\/fr\/#\/schema\/person\/67c7ae2b7567a05fa720632cf1a11bd6"},"headline":"Un groupe de pirates chinois attaque des organisations tib\u00e9taines","datePublished":"2024-03-18T10:54:29+00:00","dateModified":"2024-11-27T13:34:00+00:00","mainEntityOfPage":{"@id":"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/"},"wordCount":347,"commentCount":0,"image":{"@id":"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/#primaryimage"},"thumbnailUrl":"https:\/\/gstf.org\/wp-content\/uploads\/2024\/10\/Hacker_attacke.png","articleSection":["Tibet"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/","url":"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/","name":"Un groupe de pirates chinois attaque des organisations tib\u00e9taines - GSTF","isPartOf":{"@id":"https:\/\/gstf.org\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/#primaryimage"},"image":{"@id":"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/#primaryimage"},"thumbnailUrl":"https:\/\/gstf.org\/wp-content\/uploads\/2024\/10\/Hacker_attacke.png","datePublished":"2024-03-18T10:54:29+00:00","dateModified":"2024-11-27T13:34:00+00:00","author":{"@id":"https:\/\/gstf.org\/fr\/#\/schema\/person\/67c7ae2b7567a05fa720632cf1a11bd6"},"breadcrumb":{"@id":"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/#primaryimage","url":"https:\/\/gstf.org\/wp-content\/uploads\/2024\/10\/Hacker_attacke.png","contentUrl":"https:\/\/gstf.org\/wp-content\/uploads\/2024\/10\/Hacker_attacke.png","width":286,"height":128},{"@type":"BreadcrumbList","@id":"https:\/\/gstf.org\/fr\/un-groupe-de-pirates-chinois-attaque-des-organisations-tibetaines\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/gstf.org\/fr\/page-daccueil\/"},{"@type":"ListItem","position":2,"name":"Un groupe de pirates chinois attaque des organisations tib\u00e9taines"}]},{"@type":"WebSite","@id":"https:\/\/gstf.org\/fr\/#website","url":"https:\/\/gstf.org\/fr\/","name":"GSTF","description":"Gesellschaft Schweizerisch-Tibetische Freundschaft","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gstf.org\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/gstf.org\/fr\/#\/schema\/person\/67c7ae2b7567a05fa720632cf1a11bd6","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/3d3f2fcb093e9c2d13668a154a0a0f6cd486b88af630485da5e7873949764c3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3d3f2fcb093e9c2d13668a154a0a0f6cd486b88af630485da5e7873949764c3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d3f2fcb093e9c2d13668a154a0a0f6cd486b88af630485da5e7873949764c3a?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/gstf.org"],"url":"https:\/\/gstf.org\/fr\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/posts\/7071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/comments?post=7071"}],"version-history":[{"count":1,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/posts\/7071\/revisions"}],"predecessor-version":[{"id":7073,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/posts\/7071\/revisions\/7073"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/media\/7072"}],"wp:attachment":[{"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/media?parent=7071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/categories?post=7071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/tags?post=7071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}