{"id":1877,"date":"2012-06-05T10:22:50","date_gmt":"2012-06-05T09:22:50","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=1877"},"modified":"2019-12-30T17:56:31","modified_gmt":"2019-12-30T16:56:31","slug":"apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/","title":{"rendered":"Apparition de Flame et r\u00e9v\u00e9lation sur Stuxnet, quelles cons\u00e9quences pour la s\u00e9curit\u00e9 de l\u2019information ?"},"content":{"rendered":"<h2>Comment r\u00e9agir \u00e0 la d\u00e9couverte du nouveau malware Flame\u00a0?<\/h2>\n<p>Flame est un virus ultra-sophistiqu\u00e9, con\u00e7u comme une bo\u00eete \u00e0 outil pour cyber-espion. Il permet de r\u00e9cup\u00e9rer sur les ordinateurs infect\u00e9s n\u2019importe quel document\u00a0: email, liste de contacts, de faire des copies d\u2019\u00e9cran, d\u2019enregistrer le son ambiant mais aussi d\u2019enregistrer les mots de passe tap\u00e9s ou les conversations par <em>chat<\/em>. Il s\u2019agit d\u2019un virus particulier du fait de sa taille\u00a0: plus de 20 Mo, ce qui le rend difficilement d\u00e9tectable. Ses fonctionnalit\u00e9s et sa complexit\u00e9 d\u00e9montrent clairement qu\u2019il a \u00e9t\u00e9 con\u00e7u par des d\u00e9veloppeurs chevronn\u00e9s, fonctionnant en \u00e9quipe. Il faudra de nombreux mois avant que les chercheurs en s\u00e9curit\u00e9 ne soient capables d\u2019en comprendre compl\u00e8tement le fonctionnement.<\/p>\n<p>Il repr\u00e9sente un risque s\u00e9rieux, en particulier pour les entreprises et les infrastructures critiques des \u00e9tats. Les derni\u00e8res annonces sont inqui\u00e9tantes, en particulier sur l\u2019usurpation des m\u00e9canismes de confiance de Windows Update. La d\u00e9couverte de Flame pousse m\u00eame une agence des Nations Unis \u00e0 lancer une <a href=\"http:\/\/www.reuters.com\/article\/2012\/05\/29\/cyberwar-flame-idUSL1E8GT7X120120529\" target=\"_blank\" rel=\"noopener noreferrer\">alerte officielle<\/a> aux diff\u00e9rents \u00e9tats membres pour qu\u2019ils prennent des mesures conservatoires. Cependant, bien qu\u2019en circulation depuis plusieurs ann\u00e9es, ce virus n\u2019aurait touch\u00e9 qu\u2019un millier de PC, principalement au Moyen Orient. Le parall\u00e8le avec le virus Stuxnet est certes frappant, mais il est trop t\u00f4t pour y voir un lien direct.<\/p>\n<h2>En parall\u00e8le, des informations sur l\u2019origine du virus Stuxnet ont \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9es par la presse am\u00e9ricaine\u00a0; doit-on voir les Etats-Unis et Isra\u00ebl derri\u00e8re ce projet\u00a0?<\/h2>\n<p>Les informations circulant actuellement mentionnent une collaboration entre ces deux pays afin de viser le programme nucl\u00e9aire iranien par le biais d\u2019une cyberattaque. Les d\u00e9tails de cette histoire sont passionnants, comme l\u2019explique l\u2019article du <a href=\"http:\/\/www.nytimes.com\/2012\/06\/01\/world\/middleeast\/obama-ordered-wave-of-cyberattacks-against-iran.html\" target=\"_blank\" rel=\"noopener noreferrer\">New York Times<\/a>. Ces r\u00e9v\u00e9lations corroborent ce que les experts s\u00e9curit\u00e9 avaient envisag\u00e9\u00a0: la complexit\u00e9 de l\u2019attaque et ses particularit\u00e9s ne pouvaient \u00eatre qu\u2019une attaque cibl\u00e9e en provenance de puissance \u00e9tatique. L\u2019attaque a \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9e au grand public car le code malicieux a \u00e9chapp\u00e9 \u00e0 son concepteur et s\u2019est r\u00e9pandu plus largement que pr\u00e9vu.<\/p>\n<h2>Que pr\u00e9figurent ces deux \u00e9v\u00e8nements\u00a0?<\/h2>\n<p>Elles d\u00e9montrent clairement que les attaques deviennent de plus en plus cibl\u00e9es. Dans le cas de Flame et de Stuxnet, des Etats sont \u00e0 l\u2019origine des attaques. Mais ce mouvement de ciblage touche aujourd\u2019hui \u00e9galement les services financiers avec des attaques tr\u00e8s pr\u00e9cises sur les sites de banque en ligne, avec des malwares comme Zeux ou Torpig qui sont adapt\u00e9s pour comprendre la logique des sites et modifier leurs attaques en fonctions, en y impliquant aussi les t\u00e9l\u00e9phones mobiles des clients. Ce ciblage se retrouve \u00e9galement dans les attaques contre les entreprises, o\u00f9 les pirates enqu\u00eatent par exemple par l\u2019interm\u00e9diaire des r\u00e9seaux sociaux et utilisent des moyens sp\u00e9cifiques, adapt\u00e9s \u00e0 leur cible, pour d\u00e9rober des informations sensibles internes.<\/p>\n<p>Il appara\u00eet clairement que la menace se pr\u00e9cise, qu\u2019elle se professionnalise et que les attaquants sont en mesure de mobiliser moyens importants au vu les gains financiers qu\u2019ils tirent des attaques.<\/p>\n<p>Les entreprises et les grandes organisations doivent suivre le m\u00eame chemin et augmenter leur niveau de s\u00e9curit\u00e9 en fonction de leurs enjeux,\u00a0une refonte des mod\u00e8les de s\u00e9curit\u00e9 est bien souvent n\u00e9cessaire pour se recentrer sur les p\u00e9rim\u00e8tres les plus critiques (cf <a href=\"http:\/\/www.solucominsight.fr\/2011\/09\/du-%C2%AB-secret-defense-%C2%BB-au-%C2%AB-secret-entreprise-%C2%BB-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/\" target=\"_blank\" rel=\"noopener noreferrer\">tribune attaques cibl\u00e9es<\/a>).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Comment r\u00e9agir \u00e0 la d\u00e9couverte du nouveau malware Flame\u00a0? Flame est un virus ultra-sophistiqu\u00e9, con\u00e7u comme une bo\u00eete \u00e0 outil pour cyber-espion. Il permet de r\u00e9cup\u00e9rer sur les ordinateurs infect\u00e9s n\u2019importe quel document\u00a0: email, liste de contacts, de faire des&#8230;<\/p>\n","protected":false},"author":15,"featured_media":6343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3225],"tags":[1241,183,497,500],"coauthors":[837],"class_list":["post-1877","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response","tag-cyberattaque","tag-cybercriminalite","tag-stuxnet","tag-virus-informatique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apparition de Flame et r\u00e9v\u00e9lation sur Stuxnet, quelles cons\u00e9quences pour la s\u00e9curit\u00e9 de l\u2019information ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apparition de Flame et r\u00e9v\u00e9lation sur Stuxnet, quelles cons\u00e9quences pour la s\u00e9curit\u00e9 de l\u2019information ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Comment r\u00e9agir \u00e0 la d\u00e9couverte du nouveau malware Flame\u00a0? Flame est un virus ultra-sophistiqu\u00e9, con\u00e7u comme une bo\u00eete \u00e0 outil pour cyber-espion. Il permet de r\u00e9cup\u00e9rer sur les ordinateurs infect\u00e9s n\u2019importe quel document\u00a0: email, liste de contacts, de faire des...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-05T09:22:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-30T16:56:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Apparition de Flame et r\u00e9v\u00e9lation sur Stuxnet, quelles cons\u00e9quences pour la s\u00e9curit\u00e9 de l\u2019information ?\",\"datePublished\":\"2012-06-05T09:22:50+00:00\",\"dateModified\":\"2019-12-30T16:56:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/\"},\"wordCount\":634,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"keywords\":[\"Cyberattaque\",\"Cybercriminalit\u00e9\",\"stuxnet\",\"virus informatique\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/\",\"name\":\"Apparition de Flame et r\u00e9v\u00e9lation sur Stuxnet, quelles cons\u00e9quences pour la s\u00e9curit\u00e9 de l\u2019information ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"datePublished\":\"2012-06-05T09:22:50+00:00\",\"dateModified\":\"2019-12-30T16:56:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apparition de Flame et r\u00e9v\u00e9lation sur Stuxnet, quelles cons\u00e9quences pour la s\u00e9curit\u00e9 de l\u2019information ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apparition de Flame et r\u00e9v\u00e9lation sur Stuxnet, quelles cons\u00e9quences pour la s\u00e9curit\u00e9 de l\u2019information ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/","og_locale":"en_US","og_type":"article","og_title":"Apparition de Flame et r\u00e9v\u00e9lation sur Stuxnet, quelles cons\u00e9quences pour la s\u00e9curit\u00e9 de l\u2019information ? - RiskInsight","og_description":"Comment r\u00e9agir \u00e0 la d\u00e9couverte du nouveau malware Flame\u00a0? Flame est un virus ultra-sophistiqu\u00e9, con\u00e7u comme une bo\u00eete \u00e0 outil pour cyber-espion. Il permet de r\u00e9cup\u00e9rer sur les ordinateurs infect\u00e9s n\u2019importe quel document\u00a0: email, liste de contacts, de faire des...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/","og_site_name":"RiskInsight","article_published_time":"2012-06-05T09:22:50+00:00","article_modified_time":"2019-12-30T16:56:31+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Apparition de Flame et r\u00e9v\u00e9lation sur Stuxnet, quelles cons\u00e9quences pour la s\u00e9curit\u00e9 de l\u2019information ?","datePublished":"2012-06-05T09:22:50+00:00","dateModified":"2019-12-30T16:56:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/"},"wordCount":634,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","keywords":["Cyberattaque","Cybercriminalit\u00e9","stuxnet","virus informatique"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/","name":"Apparition de Flame et r\u00e9v\u00e9lation sur Stuxnet, quelles cons\u00e9quences pour la s\u00e9curit\u00e9 de l\u2019information ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","datePublished":"2012-06-05T09:22:50+00:00","dateModified":"2019-12-30T16:56:31+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/apparition-de-flame-et-revelation-sur-stuxnet-quelles-consequences-pour-la-securite-de-linformation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Apparition de Flame et r\u00e9v\u00e9lation sur Stuxnet, quelles cons\u00e9quences pour la s\u00e9curit\u00e9 de l\u2019information ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=1877"}],"version-history":[{"count":8,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1877\/revisions"}],"predecessor-version":[{"id":12471,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1877\/revisions\/12471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6343"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=1877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=1877"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=1877"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=1877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}