{"id":7758,"date":"2015-05-26T10:29:33","date_gmt":"2015-05-26T09:29:33","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=7758"},"modified":"2019-12-31T10:38:29","modified_gmt":"2019-12-31T09:38:29","slug":"tv5monde-une-cyberattaque-de-grande-ampleur-mediatique","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/","title":{"rendered":"TV5Monde : une cyberattaque de grande ampleur\u2026 m\u00e9diatique !"},"content":{"rendered":"<p><em>L\u2019attaque de de la cha\u00eene t\u00e9l\u00e9vis\u00e9e TV5Monde, ayant notamment abouti \u00e0 l\u2019interruption des programmes dans la nuit du 8 au 9 avril 2015, aura occup\u00e9 un large espace m\u00e9diatique et fait couler beaucoup d\u2019encre.\u00a0Plus d\u2019un mois apr\u00e8s, plusieurs questions se posent toujours, auxquelles Chadi Hantouche, manager en cybers\u00e9curit\u00e9 au sein du cabinet Solucom, se propose de r\u00e9pondre.<\/em><\/p>\n<h2>Que sait-on de l\u2019attaque contre TV5Monde ? Qui sont les attaquants ?<\/h2>\n<p>Le 8 avril au soir, les comptes de <a href=\"http:\/\/www.tv5monde.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">TV5Monde<\/a> sur les r\u00e9seaux sociaux diffusent des messages favorables \u00e0 l\u2019\u00c9tat Islamique. En parall\u00e8le, la cha\u00eene arr\u00eate d\u2019\u00e9mettre et les t\u00e9l\u00e9spectateurs se retrouvent devant un \u00e9cran noir.\u00a0D\u00e8s le 9 avril au matin, de nombreux articles manquant de s\u00e9rieux ont pr\u00e9tendu d\u00e9crypter l\u2019attaque en d\u00e9tail, et ont malheureusement \u00e9t\u00e9 repris par de nombreux m\u00e9dias. Peu d\u2019informations sont en fait disponibles publiquement \u00e0 ce jour, et il faudra sans doute attendre les r\u00e9sultats de l\u2019enqu\u00eate pour en savoir davantage.<\/p>\n<p>Cela \u00e9tant, quelques \u00e9l\u00e9ments sont d\u00e9j\u00e0 connus avec un bon niveau de certitude. Tout d\u2019abord, il s\u2019agit d\u2019une attaque pr\u00e9par\u00e9e et coordonn\u00e9e. De nombreuses sources \u00e9voquent un mail de <em>phishing<\/em> ayant pi\u00e9g\u00e9 un ou plusieurs employ\u00e9s de la cha\u00eene, permettant \u00e0 des attaquant de prendre le contr\u00f4le de leur poste de travail, puis de rebondir \u00e0 l\u2019int\u00e9rieur du syst\u00e8me d\u2019information. Les premiers comptes compromis ont peut-\u00eatre \u00e9t\u00e9 ceux des <em>community managers<\/em> de r\u00e9seaux sociaux.\u00a0Rappelons au passage que m\u00eame un mot de passe tr\u00e8s long et tr\u00e8s complexe ne r\u00e9sisterait pas \u00e0 cette m\u00e9thode, puisque c\u2019est l\u2019utilisateur qui le \u00ab donne \u00bb \u00e0 l\u2019attaquant sans le savoir.<\/p>\n<p>Une fois que les attaquants ont r\u00e9ussi \u00e0 atteindre les serveurs assurant le multiplexage et permettant d\u2019interrompre la diffusion. Ils ont lanc\u00e9 toutes les actions malfaisantes en parall\u00e8le : r\u00e9seaux sociaux et diffusion.\u00a0Ces \u00e9l\u00e9ments laissent \u00e0 penser que l\u2019attaque a n\u00e9cessit\u00e9 une \u00e9quipe de r\u00e9alisation compos\u00e9e de plusieurs personnes et comp\u00e9tences. Attention toutefois \u00e0 une attribution de l\u2019attaque trop h\u00e2tive : elle pourrait effectivement avoir \u00e9t\u00e9 men\u00e9e par un groupe id\u00e9ologique, mais elle pourrait \u00e9galement avoir \u00e9t\u00e9 commandit\u00e9e \u00e0 un groupe de \u00ab cyber mercenaires \u00bb avec une unique motivation financi\u00e8re.<\/p>\n<h2>S\u2019agit-il d\u2019une attaque exceptionnelle ?<\/h2>\n<p>De ce que l\u2019on sait aujourd\u2019hui, <a href=\"http:\/\/www.20minutes.fr\/societe\/1582647-20150409-piratage-tv5monde-attaque-montre-determination-hackers-faire-maximum-bruit\" target=\"_blank\" rel=\"noopener noreferrer\">l\u2019attaque n\u2019est pas extraordinaire par son mode op\u00e9ratoire<\/a>. Les attaquants ont probablement suivi le sch\u00e9ma classique : une phase de reconnaissance, puis d\u2019intrusion, et enfin de propagation jusqu\u2019\u00e0 atteindre les syst\u00e8mes cibl\u00e9s. Son objectif, une destruction \u00e0 vis\u00e9e id\u00e9ologique, n\u2019est pas nouveau non plus en soi.<\/p>\n<p>On ne peut pas parler de \u00ab cyberguerre \u00bb \u00e0 ce stade, mais plut\u00f4t de \u00ab cyber-vandalisme \u00bb, comme l\u2019a fait Barack Obama pour le cas Sony Pictures fin 2014. Si l\u2019attaque a \u00e9t\u00e9 exceptionnelle, c\u2019est surtout par sa couverture m\u00e9diatique : tous les m\u00e9dias g\u00e9n\u00e9ralistes ou presque en ont parl\u00e9 (cha\u00eenes t\u00e9l\u00e9vis\u00e9es, journaux papiers et web, magazines), en France comme \u00e0 l\u2019international.<\/p>\n<p>\u00c0 cela, il y a plusieurs explications. D\u2019une part, l\u2019aspect symbolique et tr\u00e8s visible de l\u2019attaque : TV5Monde est une cha\u00eene francophone, diffus\u00e9e partout dans le monde. Elle porte donc indirectement l\u2019image de la France, et se retrouve au milieu d\u2019une guerre m\u00e9diatique.\u00a0D\u2019autre part, l\u2019impact de l\u2019attaque : la cha\u00eene a arr\u00eat\u00e9 d\u2019\u00e9mettre ses programmes, ce qui est son principal m\u00e9tier. Cela a cr\u00e9\u00e9 une frayeur dans beaucoup de m\u00e9dias, qui redoutent d\u2019\u00eatre les prochaines victimes et ont donc tent\u00e9 de comprendre l\u2019attaque.<\/p>\n<h2>Les m\u00e9dias vont-ils devenir une cible privil\u00e9gi\u00e9e pour les pirates ? Y a-t-il un moyen pour eux de se pr\u00e9munir contre\u00a0ce type d\u2019attaque ?<\/h2>\n<p>L\u2019essence d\u2019un m\u00e9dia est sa visibilit\u00e9, ce qui en fait une cible de choix pour qui veut diffuser un message de propagande id\u00e9ologique.\u00a0Il est donc aujourd\u2019hui important pour les m\u00e9dias, comme pour beaucoup d\u2019entreprises, de se pr\u00e9occuper de leur s\u00e9curit\u00e9 informatique. C\u2019est tout de m\u00eame d\u00e9j\u00e0 bien souvent le cas, mais nous pouvons rappeler quelques priorit\u00e9s pour r\u00e9duire la probabilit\u00e9 qu\u2019une telle attaque r\u00e9ussisse.<\/p>\n<p>Tout d\u2019abord, il faut syst\u00e9matiquement faire auditer les infrastructures informatiques expos\u00e9es sur Internet, et bien s\u00fbr corriger les \u00e9ventuelles faiblesses d\u00e9couvertes. Il est \u00e9galement n\u00e9cessaire de sensibiliser les collaborateurs aux bonnes pratiques \u00ab d\u2019hygi\u00e8ne \u00bb en s\u00e9curit\u00e9 informatique, en portant une attention particuli\u00e8re aux utilisateurs disposant de donn\u00e9es ou de droits particuliers (tels que les <em>community managers<\/em> de r\u00e9seaux sociaux, les administrateurs informatiques, et les dirigeants).<\/p>\n<p>Enfin, l\u2019affaire TV5Monde a mis en exergue un point int\u00e9ressant \u00e0 garder \u00e0 l\u2019esprit : il est vital que la cybers\u00e9curit\u00e9 soit un domaine de collaboration entre entreprises, et non de comp\u00e9tition ! En particulier, le partage des IOC (indicateurs de compromission permettant de d\u00e9tecter les traces d\u2019une attaque) entre entreprises du m\u00eame secteur devient une priorit\u00e9. C\u2019est l\u2019un des axes que l\u2019ANSSI promeut aupr\u00e8s des diff\u00e9rents acteurs et qui a \u00e9t\u00e9 mis en oeuvre lors de cette attaque.<\/p>\n<h2>Apr\u00e8s une cha\u00eene de t\u00e9l\u00e9vision, qu\u2019est-ce qui emp\u00eache l\u2019attaque d\u2019infrastructures plus critiques de notre pays ?<\/h2>\n<p>Les sp\u00e9cialistes de la s\u00e9curit\u00e9 n\u2019ont pas d\u00e9couvert l\u2019existence d\u2019attaques avec celle de TV5Monde, loin de l\u00e0. Des entreprises aux activit\u00e9s sensibles sont attaqu\u00e9es tous les jours, parfois avec succ\u00e8s : ce risque est connu !\u00a0C\u2019est bien pour cela que les soci\u00e9t\u00e9s concern\u00e9es travaillent depuis des ann\u00e9es sur leur s\u00e9curit\u00e9 informatique, et que le sujet est pris de plus en plus au s\u00e9rieux par les directions g\u00e9n\u00e9rales.<\/p>\n<p>Par ailleurs, l\u2019\u00e9tat se donne aujourd\u2019hui les moyens de s\u00e9curiser les infrastructures informatiques les plus sensibles : d\u2019importants budgets sont mis en \u0153uvre pour prot\u00e9ger les services \u00e9tatiques et accompagner celle des entreprises (Op\u00e9rateurs d\u2019Importance Vitale en particulier), voire leur imposer dans certains cas.<\/p>\n<p>Une attaque n\u2019est bien s\u00fbr pas exclue, et il faudrait id\u00e9alement pouvoir en faire davantage sur le sujet de la cybers\u00e9curit\u00e9. Mais la situation va dans la bonne direction et il est important de rester rationnels suite \u00e0 l\u2019attaque contre TV5Monde, tout en continuant les efforts de s\u00e9curisation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019attaque de de la cha\u00eene t\u00e9l\u00e9vis\u00e9e TV5Monde, ayant notamment abouti \u00e0 l\u2019interruption des programmes dans la nuit du 8 au 9 avril 2015, aura occup\u00e9 un large espace m\u00e9diatique et fait couler beaucoup d\u2019encre.\u00a0Plus d\u2019un mois apr\u00e8s, plusieurs questions se&#8230;<\/p>\n","protected":false},"author":13,"featured_media":7592,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3225],"tags":[1241,183,3038],"coauthors":[801],"class_list":["post-7758","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response","tag-cyberattaque","tag-cybercriminalite","tag-threat-intelligence"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TV5Monde : une cyberattaque de grande ampleur - SolucomINSIGHT<\/title>\n<meta name=\"description\" content=\"Chadi Hantouche, manager en cybers\u00e9curit\u00e9 chez Solucom, r\u00e9pond aux questions qui se posent encore apr\u00e8s la cyberattaque de la cha\u00eene t\u00e9l\u00e9vis\u00e9e TV5Monde.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TV5Monde : une cyberattaque de grande ampleur - SolucomINSIGHT\" \/>\n<meta property=\"og:description\" content=\"Chadi Hantouche, manager en cybers\u00e9curit\u00e9 chez Solucom, r\u00e9pond aux questions qui se posent encore apr\u00e8s la cyberattaque de la cha\u00eene t\u00e9l\u00e9vis\u00e9e TV5Monde.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2015-05-26T09:29:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:38:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/04\/Fotolia_49045449_Subscription_Monthly_M-Copie.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1075\" \/>\n\t<meta property=\"og:image:height\" content=\"772\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chadi Hantouche\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chadi Hantouche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/\"},\"author\":{\"name\":\"Chadi Hantouche\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc\"},\"headline\":\"TV5Monde : une cyberattaque de grande ampleur\u2026 m\u00e9diatique !\",\"datePublished\":\"2015-05-26T09:29:33+00:00\",\"dateModified\":\"2019-12-31T09:38:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/\"},\"wordCount\":1140,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/04\/Fotolia_49045449_Subscription_Monthly_M-Copie.jpg\",\"keywords\":[\"Cyberattaque\",\"Cybercriminalit\u00e9\",\"Threat intelligence\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/\",\"name\":\"TV5Monde : une cyberattaque de grande ampleur - SolucomINSIGHT\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/04\/Fotolia_49045449_Subscription_Monthly_M-Copie.jpg\",\"datePublished\":\"2015-05-26T09:29:33+00:00\",\"dateModified\":\"2019-12-31T09:38:29+00:00\",\"description\":\"Chadi Hantouche, manager en cybers\u00e9curit\u00e9 chez Solucom, r\u00e9pond aux questions qui se posent encore apr\u00e8s la cyberattaque de la cha\u00eene t\u00e9l\u00e9vis\u00e9e TV5Monde.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/04\/Fotolia_49045449_Subscription_Monthly_M-Copie.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/04\/Fotolia_49045449_Subscription_Monthly_M-Copie.jpg\",\"width\":1075,\"height\":772},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TV5Monde : une cyberattaque de grande ampleur\u2026 m\u00e9diatique !\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc\",\"name\":\"Chadi Hantouche\",\"description\":\"Chadi Hantouche is a Cybersecurity and Digital Trust Senior Manager at Wavestone. For more than a decade, he has helped companies assessing their risk and maturity level, and defining associated solutions. He has a focus on security to support innovative technologies (Big Data, Internet of Things, Cloud computing, Mobility) as well as prevention and reaction against cyberattacks. Chadi is a CISSP, ISO 27001 LI and ITIL certified professional. He is a regular speaker on French and international TV channels, newspapers and conferences, and lecturer in several computer science universities.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/chadi-hantouche\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TV5Monde : une cyberattaque de grande ampleur - SolucomINSIGHT","description":"Chadi Hantouche, manager en cybers\u00e9curit\u00e9 chez Solucom, r\u00e9pond aux questions qui se posent encore apr\u00e8s la cyberattaque de la cha\u00eene t\u00e9l\u00e9vis\u00e9e TV5Monde.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/","og_locale":"en_US","og_type":"article","og_title":"TV5Monde : une cyberattaque de grande ampleur - SolucomINSIGHT","og_description":"Chadi Hantouche, manager en cybers\u00e9curit\u00e9 chez Solucom, r\u00e9pond aux questions qui se posent encore apr\u00e8s la cyberattaque de la cha\u00eene t\u00e9l\u00e9vis\u00e9e TV5Monde.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/","og_site_name":"RiskInsight","article_published_time":"2015-05-26T09:29:33+00:00","article_modified_time":"2019-12-31T09:38:29+00:00","og_image":[{"width":1075,"height":772,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/04\/Fotolia_49045449_Subscription_Monthly_M-Copie.jpg","type":"image\/jpeg"}],"author":"Chadi Hantouche","twitter_misc":{"Written by":"Chadi Hantouche","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/"},"author":{"name":"Chadi Hantouche","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc"},"headline":"TV5Monde : une cyberattaque de grande ampleur\u2026 m\u00e9diatique !","datePublished":"2015-05-26T09:29:33+00:00","dateModified":"2019-12-31T09:38:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/"},"wordCount":1140,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/04\/Fotolia_49045449_Subscription_Monthly_M-Copie.jpg","keywords":["Cyberattaque","Cybercriminalit\u00e9","Threat intelligence"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/","url":"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/","name":"TV5Monde : une cyberattaque de grande ampleur - SolucomINSIGHT","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/04\/Fotolia_49045449_Subscription_Monthly_M-Copie.jpg","datePublished":"2015-05-26T09:29:33+00:00","dateModified":"2019-12-31T09:38:29+00:00","description":"Chadi Hantouche, manager en cybers\u00e9curit\u00e9 chez Solucom, r\u00e9pond aux questions qui se posent encore apr\u00e8s la cyberattaque de la cha\u00eene t\u00e9l\u00e9vis\u00e9e TV5Monde.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/04\/Fotolia_49045449_Subscription_Monthly_M-Copie.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/04\/Fotolia_49045449_Subscription_Monthly_M-Copie.jpg","width":1075,"height":772},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"TV5Monde : une cyberattaque de grande ampleur\u2026 m\u00e9diatique !"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc","name":"Chadi Hantouche","description":"Chadi Hantouche is a Cybersecurity and Digital Trust Senior Manager at Wavestone. For more than a decade, he has helped companies assessing their risk and maturity level, and defining associated solutions. He has a focus on security to support innovative technologies (Big Data, Internet of Things, Cloud computing, Mobility) as well as prevention and reaction against cyberattacks. Chadi is a CISSP, ISO 27001 LI and ITIL certified professional. He is a regular speaker on French and international TV channels, newspapers and conferences, and lecturer in several computer science universities.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/chadi-hantouche\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/7758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=7758"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/7758\/revisions"}],"predecessor-version":[{"id":12411,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/7758\/revisions\/12411"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/7592"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=7758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=7758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=7758"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=7758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}